SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE)
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 2, Ver. IV (Mar - Apr.2015), PP 31-36
www.iosrjournals.org
DOI: 10.9790/2834-10243136 www.iosrjournals.org 31 | Page
Improvised Asymmetric Key Encryption Algorithm Using
MATLAB
K.Sony1
, Desowja Shaik1,
B.Divya Sri2
, G.Anitha3
1
Assistant Professor, K L University, Vaddeswaram, Guntur District, AP
2,3, 4
ECE Department, K L University, Vaddeswaram, Guntur District, AP
Abstract: In this paper, A new technique is deployed to improve Asymmetric Key Encryption Technique with
multiple keys and Chinese remainder theorem(CRT) .The main aim of this Technique is to provide secure
transmission of data between any networks through a channel. The Scope of this paper deals with Multiple
Public and Private keys and its computation time. RSA algorithm is used to utilize asymmetric key encryption
technique .In proposed model RSA will be implemented using MATLAB with original RSA Algorithm
,Proposed RSA Algorithm and RSA using Chinese Remainder Theorem(CRT). The Computational time and its
mere effects are briefly dealt by varying the multiple number of keys .
Keywords: RSA, Multiple key, Chinese Remainder Theorem (CRT), Secure, MATLAB.
I. Introduction
In Communications regardless of the platform such as email, Voice messages or direct messages the
end users ultimate motive is to send or receive the information without any intervention from the intruder. So a
mechanism is to be deployed such that only the users should understand the information and for others it should
be in the unreadable format .The process of encoding the plain text messages into cipher text is referred as
Encryption and the reverse transforming process is decryption. In a Computer to Computer communications, the
sender usually does the encryption and at the receiving end the decryption is done[1] .
Every encryption and decryption process has two primarily goals : Algorithm and the key generation .
Algorithm is made public to all the users an it’s the key which makes the communication secure
between the user domain. If the same key is used at both the ends then it is referred as Symmetric Key
Cryptography and if different keys(Public and private key ) are used at both the ends its Asymmetric key
Cryptography[16]. The above mentioned process is depicted in the figure.
In this paper we deal about the Asymmetric key cryptography[3] since it overcomes the disadvantages
of symmetric key cryptography such as key exchange and also digital signature can be deployed using this
technique .It also deals about doing the encryption and decryption using two keys at both the ends so that the
information can be sent more securely using the Modified RSA Algorithm and with Chinese Remainder
Theorem .
II. RSA Crypto System
The RSA Algorithm was developed by Ron Rivest, Adi Shamir and Leonard in 1978[17]. The original
RSA algorithm follows 4 phases: Key Generation, Encryption, Decryption and Digital signature [9].
Improvised Asymmetric Key Encryption Algorithm Using MATLAB
DOI: 10.9790/2834-10243136 www.iosrjournals.org 32 | Page
Keygeneration
In key generation we typically need keys that are public and private keys. We will generate public and
private key using below steps [2]. Public key is visible to both sender and receiver, where as private key is kept
secret and is generated and made invisible to the end user. Public key is used during encryption process where
as private key is used during decryption process. The steps to find out public and private key in key generation
is given below.
1). Select two random prime numbers: r, s and find n=r*s.
2). Compute the value of ϕ(n)=(r-1)*(s-1)
3). Select a random integer e[12], such that 1<e<n and gcd(e, ϕ(n))=1.
4). Compute value of d, such that d*e ≡1 mod(n).
5). Public Key {e, n}, Private key {d, n}
Encryption
We generated public and private keys using Key generation. Now, we have to encrypt the message
using Public key. The process is dealt as given below
1). Take the message which represents Plain text. The Plain text should be encrypted using public key e. If a
sender wants to transmit the information to receiver, the receiver should send the public key to the sender ,and
then the sender will encrypt the message(M) with a Public key(e).
2). Now calculate the cipher text (C) by using given formula.
C=M ^ e mod(n)
Decryption
In decryption we will find out decrypted message(M) by using cipher text(C) and Private key(d).Then Compare
if the original message is equal to decrypted message[5]. If it is equal then algorithm is proven .
M=C ^ d mod(n)
Digital Signature
In order to find whether the process we followed in designing the algorithm is accurate or not we use
the concept of digital signature[6]. Here we will find signature(s) using private key(d) and H(m). And we will
find verification m‟ using signature(s) and public key(e) where H is the hash function. If m‟=H(m) then our
signature is correct[7]. The following formula are given below:
s = (H(m)^d)mod n
m‟=(s^ e) mod n.
.
2.1 Modified RSA Algorithm Using Multiple Keys
Here in Modified RSA algorithm we will generate multiple public and private keys. In modified RSA
algorithm the computational time is more due to multiple keys but security is more compared to original RSA
algorithm[10]. In modified RSA algorithm we are using two public and private keys it is less subjected to brute
force attack. Here in this we are having 3 phases are: key generation, encryption, decryption[14].
Key Generation In Modified RSA Algorithm
In key generation process we will generate multiple public and private keys using below steps. Here in
order to increase security we are generating multiple keys. Here public keys are visible to both sender and
receiver. And private keys are kept secret and. The following steps for key generation process in given below:
1). Select two set random numbers say p, q and r, s.
2). Find the value of n, z i.e., n=p*q, z=r*s
3). Compute the value of ϕ(n)=(p-1)*(q-1), k(z)=(p-1)*(q-1).
4). Select a random integer e, g such that 1<e<n, 1<g<z and gcd(e, ϕ (n))=1gcd(e, k(z))=1
5). Compute value of d, T such that d*e ≡1 mod(n) and t*g ≡1 mod(z)
6). Public Key {e, g, n, z}, Private key {d, t, n, z}
Encryption
We have generated multiple public and private key in above key generation. Now we will encrypt
using public keys. Since we will do two times encryption such a way reliability will be more compared to that
Improvised Asymmetric Key Encryption Algorithm Using MATLAB
DOI: 10.9790/2834-10243136 www.iosrjournals.org 33 | Page
of original RSA algorithm. We take message(M) and first public key(e) during encryption and find out C1=M^
e mod(n). By using c1 and second public key(g) we will find cipher text in encryption process.
C=C1^ g mod(z)
Decryption
In decryption we decrypt original message using private keys d, g. Here first we will decrypt using first
private key (d) which is m1=C ^ d mod(n).
And we will find out decrypted message using second private key (t).
M=m1 ^ t mod(z)
2.3 RSA Algorithm Using Chinese Remainder Theorem
By using Chinese remainder theorem(CRT)[4] we will increase processing time and security of
algorithm. By using CRT an efficient implementation of RSA algorithm can be implemented. Chinese
remainder theorem(CRT) states that, if input M, raise it to the eth
(or dth
) power modulo P and modulo Q the
intermediate results are then combined through multiplication and addition with some pre defined constant to
compute final result. By using CRT in RSA algorithm it requires four times less processing time compared and
smaller amount of memory for final decoded result. By Using Multi Prime Concept[19] we implement RSA
using CRT. They are 3 operations present in RSA using CRT are:
Key Generation Operation
The steps included in the key generation operation of multi-prime RSA-CRT are illustrated as:
i. Select three large prime r, s and w at random, each of which is n/3-bit in length.
ii. Set N = r x s x w and φ (N) = (r−1) x (s−1) x (w−1).
iii. Randomly pick an odd integer e such that gcd (e, φ (N)) = 1.
iv. After that compute d = e−1 mod (N).
v. Finally, calculate dr = d mod (r − 1), ds = d mod (s − 1) and dw = d mod (w − 1).
vi. The public key would be (e, N) and the private key would be (dr, ds, dw, r, s, w)[20].
Encryption Operation
For a given plain text m which belongs to Zn the encryption algorithm is the same as that of the original RSA:
c = m^ e mod N
Decryption Operation
In order to decrypt a cipher-text c:
i. The decipher first computes m1 =cr^ dr mod r, m2 = cs^ dq mod s, and m3 = cw^ dw mod w where cr = c
mod r, cs = c mod s and cw = c mod w
ii. Next, using CRT m can be obtained as m = c^ d mod N, in order to increase its efficiency.
III. Implementation And Results
3.1Original RSA Algorithm Implemented Using Alphabetic Message and Numerical Message
Improvised Asymmetric Key Encryption Algorithm Using MATLAB
DOI: 10.9790/2834-10243136 www.iosrjournals.org 34 | Page
3.2Modified RSA Algorithm Using Multiple Public and Private Keys
Improvised Asymmetric Key Encryption Algorithm Using MATLAB
DOI: 10.9790/2834-10243136 www.iosrjournals.org 35 | Page
3.3 RSA Algorithm Using Chinese Remainder Theorem(CRT)
IV. Graphs
Computation Time V/s Prime numbers
V. Conclusion
The observed results from our work clearly mention that by using a single (public and private key)the
computational time required is less but problem is less secure. To have more secured transmission of
information we can use Chinese remainder theorem so that there will be reduction of time of evaluation. So to
have both secure transmission and time bound application we can use two key methods.
Acknowledgements
Authors like to express their deep gratitude to K Sony, Assistant Professor Department of ECE K L
University for her great support and encouragement during the implementation of this work and also we would
also like to thank our communications research members and also our friends for their help in completion of this
paper.
References
[1]. William Stallings, “Cryptography and Network Security”, ISBN 81-7758-011-6, Pearson Education, Third Edition
[2]. R.L.Rivest,A. Shamir, and L.Adleman, ”A method for obtaining digital signature and public key cryptosystem”,
[3]. comm..ACM feb1978, 21(2):120-126
[4]. W.Diffie and M.E.Hellman, ”New directions in cryptography”, IEEE Trans. Inform. Theory, Nov.1976,22: 644-654.
Improvised Asymmetric Key Encryption Algorithm Using MATLAB
DOI: 10.9790/2834-10243136 www.iosrjournals.org 36 | Page
[5]. Chung-Hsien Wu; Jin-Hua Hong; Cheng-Wen Wu, "RSA cryptosystem design based on the Chinese remainder theorem," Design
Automation Conference, 2001. Proceedings of the ASP-DAC 2001. Asia and South Pacific , vol., no., pp.391,395, 2001
[6]. H. Ren-Junn, S. Feng-Fu, Y. Yi-Shiung and C. Chia-Yao “An efficient decryption method for RSA cryptosystem” Advanced
Information Networking and Applications, 2005 (AINA 2005). 19th International Conference on, 2005, pp. 585-590 vol.1.
[7]. Z. Shao. Security of a new digital signature scheme based on factoring and discrete logarithms. International Journal of Computer
Mathematics, 82(10):1215-1219,2005.
[8]. D. Poulakis. A variant of Digital Signature Algorithm. Designs, Codes and Cryptography, 51(1):99-104, 2009
[9]. C. Kaufman, R. Perlman, M. Speciner, “Network security,” Prentice Hall 1995
[10]. Ronald L. Rivest, Adi Shamir, Len Adelman, "On Digital Signatures and Public Key Cryptosystems," MIT Laboratory for
Computer Science Technical Memorandum82 (April 1977).
[11]. Behrouz A. Forouzen, “Cryptography and Network Security”, Tata McGraw-Hill Publishing Company Ltd, New Delhi, ISBN-13:
987-0-07-066046-5, 2010.
[12]. http://www.rsa.com/rsalabs/node.asp?id=2167
[13]. Niven, I., and Zuckerman, H.S. An Introduction to the Theory of Numbers. Wile , New York, 1972.
[14]. http://www.scribd.com/doc/55154238/31/DISADVANTAGES-OF-RSA
[15]. Atul Kahate ―Cryptography and Network Security‖ 3rd edition.
[16]. Gagandeep shahi Charanjit Singh “Cryptography and its Implementation Approaches” International Journal of Innovative Research
in Computer and communication Engineering, Vol.1,Issue 3,May 2013,PP 668-672
[17]. M. Bellare and P. Rogaway. “Optimal Asymmetric Encryption.” In A. De Santis, ed., Proceedings of Eurocrypt 1994, vol. 950 of
LNCS, pp.92-111. Spinger-Verlag, May 1994
[18]. http://en.wikipedia.org/wiki/RSA
[19]. M. Wiener. “Cryptanalysis of Short RSA Secret Exponents.” IEEE Transactions on Information Theory, Vol. 36, No. 3, pp,553-
558, 1990
[20]. M.J.Hinek, M.K.Low, and E.Teske. On some attacks on multi prime RSA. In K.Nyberg and H.M.Heys, editors, Selected areas in
Cryptography, volume 2595 of Lecture Notes in Computer Science ,pages 385-404. Springer, 2002.
[21]. N. Ojha and S. Padhye," Cryptanalysis of Multi Prime RSA with Secret Key Greater than Public Key", International Journal of
Network Security, Vol.16, No.1, PP.53-57, Jan, 2014
Authors Profile
K.SONY is Assistant Professor in KL University. She Completed M.Tech Electronics and Communication
Engineering from ANNA University. He is getting his specialization in Signal processing
applications.. He is member of IETE. Her interest in research areas includes Optical
Communication and Image processing applications
DESOWJA SHAIK was born in India, A.P, in 1994.He is pursuing her B.Tech in Electronics and
Communication Engineering from K L University. He is getting his specialization in
communication. He presented 3 papers in International technical fests at reputed engineering
colleges. He is member of IETE. His interest in research areas includes Networking and
Cryptography and Communication.
B.DIVYA SRI was born in India, A.P, in 1994. She is pursuing her B.Tech in Electronics and Communication
Engineering from K L University. She is getting her specialization in communication. She is
member of IETE. Her interest in research includes VLSI and Image processing.
G.ANITHA was born in India, A.P, in 1994. She is pursuing her B.Tech in Electronics and Communication
Engineering from K L University. She is getting her specialization in communication. She is
member of IETE. Her interest in research includes Antennas and Networking.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

The rsa algorithm JooSeok Song
The rsa algorithm JooSeok SongThe rsa algorithm JooSeok Song
The rsa algorithm JooSeok Song
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
Rsa
RsaRsa
Rsa
 
Rsa
RsaRsa
Rsa
 
RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
RSA
RSARSA
RSA
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
 
RSA Algorithm report
RSA Algorithm reportRSA Algorithm report
RSA Algorithm report
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
 
public-key cryptography Shamir
public-key cryptography Shamirpublic-key cryptography Shamir
public-key cryptography Shamir
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystem
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
20CS2008 Computer Networks
20CS2008 Computer Networks 20CS2008 Computer Networks
20CS2008 Computer Networks
 
Rsa rivest shamir adleman
Rsa rivest shamir adlemanRsa rivest shamir adleman
Rsa rivest shamir adleman
 
rsa-1
rsa-1rsa-1
rsa-1
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 

Destacado

De-Noising Corrupted ECG Signals By Empirical Mode Decomposition (EMD) With A...
De-Noising Corrupted ECG Signals By Empirical Mode Decomposition (EMD) With A...De-Noising Corrupted ECG Signals By Empirical Mode Decomposition (EMD) With A...
De-Noising Corrupted ECG Signals By Empirical Mode Decomposition (EMD) With A...IOSR Journals
 
Longitudinal Skeleton Dimensionality Characteristics of Nigerian Junior Male ...
Longitudinal Skeleton Dimensionality Characteristics of Nigerian Junior Male ...Longitudinal Skeleton Dimensionality Characteristics of Nigerian Junior Male ...
Longitudinal Skeleton Dimensionality Characteristics of Nigerian Junior Male ...IOSR Journals
 
PageRank algorithm and its variations: A Survey report
PageRank algorithm and its variations: A Survey reportPageRank algorithm and its variations: A Survey report
PageRank algorithm and its variations: A Survey reportIOSR Journals
 
Effects of Different Home Storage Conditions and Preservation on Some Chemica...
Effects of Different Home Storage Conditions and Preservation on Some Chemica...Effects of Different Home Storage Conditions and Preservation on Some Chemica...
Effects of Different Home Storage Conditions and Preservation on Some Chemica...IOSR Journals
 
Wireless Sensor Network: an emerging entrant in Healthcare
Wireless Sensor Network: an emerging entrant in HealthcareWireless Sensor Network: an emerging entrant in Healthcare
Wireless Sensor Network: an emerging entrant in HealthcareIOSR Journals
 
Comparative Study on Selected Physical Fitness Components among the Physical ...
Comparative Study on Selected Physical Fitness Components among the Physical ...Comparative Study on Selected Physical Fitness Components among the Physical ...
Comparative Study on Selected Physical Fitness Components among the Physical ...IOSR Journals
 

Destacado (20)

A017250106
A017250106A017250106
A017250106
 
M010527678
M010527678M010527678
M010527678
 
B0961015
B0961015B0961015
B0961015
 
De-Noising Corrupted ECG Signals By Empirical Mode Decomposition (EMD) With A...
De-Noising Corrupted ECG Signals By Empirical Mode Decomposition (EMD) With A...De-Noising Corrupted ECG Signals By Empirical Mode Decomposition (EMD) With A...
De-Noising Corrupted ECG Signals By Empirical Mode Decomposition (EMD) With A...
 
Longitudinal Skeleton Dimensionality Characteristics of Nigerian Junior Male ...
Longitudinal Skeleton Dimensionality Characteristics of Nigerian Junior Male ...Longitudinal Skeleton Dimensionality Characteristics of Nigerian Junior Male ...
Longitudinal Skeleton Dimensionality Characteristics of Nigerian Junior Male ...
 
PageRank algorithm and its variations: A Survey report
PageRank algorithm and its variations: A Survey reportPageRank algorithm and its variations: A Survey report
PageRank algorithm and its variations: A Survey report
 
Effects of Different Home Storage Conditions and Preservation on Some Chemica...
Effects of Different Home Storage Conditions and Preservation on Some Chemica...Effects of Different Home Storage Conditions and Preservation on Some Chemica...
Effects of Different Home Storage Conditions and Preservation on Some Chemica...
 
Wireless Sensor Network: an emerging entrant in Healthcare
Wireless Sensor Network: an emerging entrant in HealthcareWireless Sensor Network: an emerging entrant in Healthcare
Wireless Sensor Network: an emerging entrant in Healthcare
 
J012226470
J012226470J012226470
J012226470
 
G1303034650
G1303034650G1303034650
G1303034650
 
F1303053542
F1303053542F1303053542
F1303053542
 
C1302031319
C1302031319C1302031319
C1302031319
 
L010218691
L010218691L010218691
L010218691
 
I012215259
I012215259I012215259
I012215259
 
I010315760
I010315760I010315760
I010315760
 
L010117279
L010117279L010117279
L010117279
 
I010336070
I010336070I010336070
I010336070
 
J1302024854
J1302024854J1302024854
J1302024854
 
H017255560
H017255560H017255560
H017255560
 
Comparative Study on Selected Physical Fitness Components among the Physical ...
Comparative Study on Selected Physical Fitness Components among the Physical ...Comparative Study on Selected Physical Fitness Components among the Physical ...
Comparative Study on Selected Physical Fitness Components among the Physical ...
 

Similar a F010243136

CRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfCRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfBhuvanaR13
 
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptxRivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptxwerip98386
 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys IJECEIAES
 
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...CSCJournals
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsaMohsin Ali
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilogijcncs
 
An implementation of RSA policy
An implementation of RSA policyAn implementation of RSA policy
An implementation of RSA policySM NAZMUS SALEHIN
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithmSiva Rushi
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGIJNSA Journal
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuIJNSA Journal
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptRizwanBasha12
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
 
Performance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithmPerformance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithmeSAT Journals
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.pptChandraB15
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...IJEACS
 

Similar a F010243136 (20)

CRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfCRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdf
 
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptxRivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
 
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsa
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 
An implementation of RSA policy
An implementation of RSA policyAn implementation of RSA policy
An implementation of RSA policy
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
Ijetcas14 336
Ijetcas14 336Ijetcas14 336
Ijetcas14 336
 
Ch09
Ch09Ch09
Ch09
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.ppt
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
Performance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithmPerformance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithm
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
D018141922
D018141922D018141922
D018141922
 

Más de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Último

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Último (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 

F010243136

  • 1. IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 2, Ver. IV (Mar - Apr.2015), PP 31-36 www.iosrjournals.org DOI: 10.9790/2834-10243136 www.iosrjournals.org 31 | Page Improvised Asymmetric Key Encryption Algorithm Using MATLAB K.Sony1 , Desowja Shaik1, B.Divya Sri2 , G.Anitha3 1 Assistant Professor, K L University, Vaddeswaram, Guntur District, AP 2,3, 4 ECE Department, K L University, Vaddeswaram, Guntur District, AP Abstract: In this paper, A new technique is deployed to improve Asymmetric Key Encryption Technique with multiple keys and Chinese remainder theorem(CRT) .The main aim of this Technique is to provide secure transmission of data between any networks through a channel. The Scope of this paper deals with Multiple Public and Private keys and its computation time. RSA algorithm is used to utilize asymmetric key encryption technique .In proposed model RSA will be implemented using MATLAB with original RSA Algorithm ,Proposed RSA Algorithm and RSA using Chinese Remainder Theorem(CRT). The Computational time and its mere effects are briefly dealt by varying the multiple number of keys . Keywords: RSA, Multiple key, Chinese Remainder Theorem (CRT), Secure, MATLAB. I. Introduction In Communications regardless of the platform such as email, Voice messages or direct messages the end users ultimate motive is to send or receive the information without any intervention from the intruder. So a mechanism is to be deployed such that only the users should understand the information and for others it should be in the unreadable format .The process of encoding the plain text messages into cipher text is referred as Encryption and the reverse transforming process is decryption. In a Computer to Computer communications, the sender usually does the encryption and at the receiving end the decryption is done[1] . Every encryption and decryption process has two primarily goals : Algorithm and the key generation . Algorithm is made public to all the users an it’s the key which makes the communication secure between the user domain. If the same key is used at both the ends then it is referred as Symmetric Key Cryptography and if different keys(Public and private key ) are used at both the ends its Asymmetric key Cryptography[16]. The above mentioned process is depicted in the figure. In this paper we deal about the Asymmetric key cryptography[3] since it overcomes the disadvantages of symmetric key cryptography such as key exchange and also digital signature can be deployed using this technique .It also deals about doing the encryption and decryption using two keys at both the ends so that the information can be sent more securely using the Modified RSA Algorithm and with Chinese Remainder Theorem . II. RSA Crypto System The RSA Algorithm was developed by Ron Rivest, Adi Shamir and Leonard in 1978[17]. The original RSA algorithm follows 4 phases: Key Generation, Encryption, Decryption and Digital signature [9].
  • 2. Improvised Asymmetric Key Encryption Algorithm Using MATLAB DOI: 10.9790/2834-10243136 www.iosrjournals.org 32 | Page Keygeneration In key generation we typically need keys that are public and private keys. We will generate public and private key using below steps [2]. Public key is visible to both sender and receiver, where as private key is kept secret and is generated and made invisible to the end user. Public key is used during encryption process where as private key is used during decryption process. The steps to find out public and private key in key generation is given below. 1). Select two random prime numbers: r, s and find n=r*s. 2). Compute the value of ϕ(n)=(r-1)*(s-1) 3). Select a random integer e[12], such that 1<e<n and gcd(e, ϕ(n))=1. 4). Compute value of d, such that d*e ≡1 mod(n). 5). Public Key {e, n}, Private key {d, n} Encryption We generated public and private keys using Key generation. Now, we have to encrypt the message using Public key. The process is dealt as given below 1). Take the message which represents Plain text. The Plain text should be encrypted using public key e. If a sender wants to transmit the information to receiver, the receiver should send the public key to the sender ,and then the sender will encrypt the message(M) with a Public key(e). 2). Now calculate the cipher text (C) by using given formula. C=M ^ e mod(n) Decryption In decryption we will find out decrypted message(M) by using cipher text(C) and Private key(d).Then Compare if the original message is equal to decrypted message[5]. If it is equal then algorithm is proven . M=C ^ d mod(n) Digital Signature In order to find whether the process we followed in designing the algorithm is accurate or not we use the concept of digital signature[6]. Here we will find signature(s) using private key(d) and H(m). And we will find verification m‟ using signature(s) and public key(e) where H is the hash function. If m‟=H(m) then our signature is correct[7]. The following formula are given below: s = (H(m)^d)mod n m‟=(s^ e) mod n. . 2.1 Modified RSA Algorithm Using Multiple Keys Here in Modified RSA algorithm we will generate multiple public and private keys. In modified RSA algorithm the computational time is more due to multiple keys but security is more compared to original RSA algorithm[10]. In modified RSA algorithm we are using two public and private keys it is less subjected to brute force attack. Here in this we are having 3 phases are: key generation, encryption, decryption[14]. Key Generation In Modified RSA Algorithm In key generation process we will generate multiple public and private keys using below steps. Here in order to increase security we are generating multiple keys. Here public keys are visible to both sender and receiver. And private keys are kept secret and. The following steps for key generation process in given below: 1). Select two set random numbers say p, q and r, s. 2). Find the value of n, z i.e., n=p*q, z=r*s 3). Compute the value of ϕ(n)=(p-1)*(q-1), k(z)=(p-1)*(q-1). 4). Select a random integer e, g such that 1<e<n, 1<g<z and gcd(e, ϕ (n))=1gcd(e, k(z))=1 5). Compute value of d, T such that d*e ≡1 mod(n) and t*g ≡1 mod(z) 6). Public Key {e, g, n, z}, Private key {d, t, n, z} Encryption We have generated multiple public and private key in above key generation. Now we will encrypt using public keys. Since we will do two times encryption such a way reliability will be more compared to that
  • 3. Improvised Asymmetric Key Encryption Algorithm Using MATLAB DOI: 10.9790/2834-10243136 www.iosrjournals.org 33 | Page of original RSA algorithm. We take message(M) and first public key(e) during encryption and find out C1=M^ e mod(n). By using c1 and second public key(g) we will find cipher text in encryption process. C=C1^ g mod(z) Decryption In decryption we decrypt original message using private keys d, g. Here first we will decrypt using first private key (d) which is m1=C ^ d mod(n). And we will find out decrypted message using second private key (t). M=m1 ^ t mod(z) 2.3 RSA Algorithm Using Chinese Remainder Theorem By using Chinese remainder theorem(CRT)[4] we will increase processing time and security of algorithm. By using CRT an efficient implementation of RSA algorithm can be implemented. Chinese remainder theorem(CRT) states that, if input M, raise it to the eth (or dth ) power modulo P and modulo Q the intermediate results are then combined through multiplication and addition with some pre defined constant to compute final result. By using CRT in RSA algorithm it requires four times less processing time compared and smaller amount of memory for final decoded result. By Using Multi Prime Concept[19] we implement RSA using CRT. They are 3 operations present in RSA using CRT are: Key Generation Operation The steps included in the key generation operation of multi-prime RSA-CRT are illustrated as: i. Select three large prime r, s and w at random, each of which is n/3-bit in length. ii. Set N = r x s x w and φ (N) = (r−1) x (s−1) x (w−1). iii. Randomly pick an odd integer e such that gcd (e, φ (N)) = 1. iv. After that compute d = e−1 mod (N). v. Finally, calculate dr = d mod (r − 1), ds = d mod (s − 1) and dw = d mod (w − 1). vi. The public key would be (e, N) and the private key would be (dr, ds, dw, r, s, w)[20]. Encryption Operation For a given plain text m which belongs to Zn the encryption algorithm is the same as that of the original RSA: c = m^ e mod N Decryption Operation In order to decrypt a cipher-text c: i. The decipher first computes m1 =cr^ dr mod r, m2 = cs^ dq mod s, and m3 = cw^ dw mod w where cr = c mod r, cs = c mod s and cw = c mod w ii. Next, using CRT m can be obtained as m = c^ d mod N, in order to increase its efficiency. III. Implementation And Results 3.1Original RSA Algorithm Implemented Using Alphabetic Message and Numerical Message
  • 4. Improvised Asymmetric Key Encryption Algorithm Using MATLAB DOI: 10.9790/2834-10243136 www.iosrjournals.org 34 | Page 3.2Modified RSA Algorithm Using Multiple Public and Private Keys
  • 5. Improvised Asymmetric Key Encryption Algorithm Using MATLAB DOI: 10.9790/2834-10243136 www.iosrjournals.org 35 | Page 3.3 RSA Algorithm Using Chinese Remainder Theorem(CRT) IV. Graphs Computation Time V/s Prime numbers V. Conclusion The observed results from our work clearly mention that by using a single (public and private key)the computational time required is less but problem is less secure. To have more secured transmission of information we can use Chinese remainder theorem so that there will be reduction of time of evaluation. So to have both secure transmission and time bound application we can use two key methods. Acknowledgements Authors like to express their deep gratitude to K Sony, Assistant Professor Department of ECE K L University for her great support and encouragement during the implementation of this work and also we would also like to thank our communications research members and also our friends for their help in completion of this paper. References [1]. William Stallings, “Cryptography and Network Security”, ISBN 81-7758-011-6, Pearson Education, Third Edition [2]. R.L.Rivest,A. Shamir, and L.Adleman, ”A method for obtaining digital signature and public key cryptosystem”, [3]. comm..ACM feb1978, 21(2):120-126 [4]. W.Diffie and M.E.Hellman, ”New directions in cryptography”, IEEE Trans. Inform. Theory, Nov.1976,22: 644-654.
  • 6. Improvised Asymmetric Key Encryption Algorithm Using MATLAB DOI: 10.9790/2834-10243136 www.iosrjournals.org 36 | Page [5]. Chung-Hsien Wu; Jin-Hua Hong; Cheng-Wen Wu, "RSA cryptosystem design based on the Chinese remainder theorem," Design Automation Conference, 2001. Proceedings of the ASP-DAC 2001. Asia and South Pacific , vol., no., pp.391,395, 2001 [6]. H. Ren-Junn, S. Feng-Fu, Y. Yi-Shiung and C. Chia-Yao “An efficient decryption method for RSA cryptosystem” Advanced Information Networking and Applications, 2005 (AINA 2005). 19th International Conference on, 2005, pp. 585-590 vol.1. [7]. Z. Shao. Security of a new digital signature scheme based on factoring and discrete logarithms. International Journal of Computer Mathematics, 82(10):1215-1219,2005. [8]. D. Poulakis. A variant of Digital Signature Algorithm. Designs, Codes and Cryptography, 51(1):99-104, 2009 [9]. C. Kaufman, R. Perlman, M. Speciner, “Network security,” Prentice Hall 1995 [10]. Ronald L. Rivest, Adi Shamir, Len Adelman, "On Digital Signatures and Public Key Cryptosystems," MIT Laboratory for Computer Science Technical Memorandum82 (April 1977). [11]. Behrouz A. Forouzen, “Cryptography and Network Security”, Tata McGraw-Hill Publishing Company Ltd, New Delhi, ISBN-13: 987-0-07-066046-5, 2010. [12]. http://www.rsa.com/rsalabs/node.asp?id=2167 [13]. Niven, I., and Zuckerman, H.S. An Introduction to the Theory of Numbers. Wile , New York, 1972. [14]. http://www.scribd.com/doc/55154238/31/DISADVANTAGES-OF-RSA [15]. Atul Kahate ―Cryptography and Network Security‖ 3rd edition. [16]. Gagandeep shahi Charanjit Singh “Cryptography and its Implementation Approaches” International Journal of Innovative Research in Computer and communication Engineering, Vol.1,Issue 3,May 2013,PP 668-672 [17]. M. Bellare and P. Rogaway. “Optimal Asymmetric Encryption.” In A. De Santis, ed., Proceedings of Eurocrypt 1994, vol. 950 of LNCS, pp.92-111. Spinger-Verlag, May 1994 [18]. http://en.wikipedia.org/wiki/RSA [19]. M. Wiener. “Cryptanalysis of Short RSA Secret Exponents.” IEEE Transactions on Information Theory, Vol. 36, No. 3, pp,553- 558, 1990 [20]. M.J.Hinek, M.K.Low, and E.Teske. On some attacks on multi prime RSA. In K.Nyberg and H.M.Heys, editors, Selected areas in Cryptography, volume 2595 of Lecture Notes in Computer Science ,pages 385-404. Springer, 2002. [21]. N. Ojha and S. Padhye," Cryptanalysis of Multi Prime RSA with Secret Key Greater than Public Key", International Journal of Network Security, Vol.16, No.1, PP.53-57, Jan, 2014 Authors Profile K.SONY is Assistant Professor in KL University. She Completed M.Tech Electronics and Communication Engineering from ANNA University. He is getting his specialization in Signal processing applications.. He is member of IETE. Her interest in research areas includes Optical Communication and Image processing applications DESOWJA SHAIK was born in India, A.P, in 1994.He is pursuing her B.Tech in Electronics and Communication Engineering from K L University. He is getting his specialization in communication. He presented 3 papers in International technical fests at reputed engineering colleges. He is member of IETE. His interest in research areas includes Networking and Cryptography and Communication. B.DIVYA SRI was born in India, A.P, in 1994. She is pursuing her B.Tech in Electronics and Communication Engineering from K L University. She is getting her specialization in communication. She is member of IETE. Her interest in research includes VLSI and Image processing. G.ANITHA was born in India, A.P, in 1994. She is pursuing her B.Tech in Electronics and Communication Engineering from K L University. She is getting her specialization in communication. She is member of IETE. Her interest in research includes Antennas and Networking.