To see the other types of publications on this topic, follow the link: Rsa decryption.

Journal articles on the topic 'Rsa decryption'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Rsa decryption.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Gao, Ming Hu, and Hong Yuan Huang. "A New Efficient Variant of the Batch RSA Cryptosystem." Advanced Materials Research 756-759 (September 2013): 2660–62. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.2660.

Full text
Abstract:
This paper aims at speeding up Batch RSA decryption. The performance of Batch RSA decryption has directs relationship with the efficiency of the full-sized modular exponentiation implementation in the Exponentiation Phase. This paper proposes a variant (BS1PRSA-Batch RSA-S1 Multi-Power RSA) to improve the Batch RSA decryption performance. The experimental results show that the speed of the decryption has been substantially improved.
APA, Harvard, Vancouver, ISO, and other styles
2

Encinas, L. Hernández, J. Muñoz Masqué, and A. Queiruga Dios. "Large decryption exponents in RSA." Applied Mathematics Letters 16, no. 3 (2003): 293–95. http://dx.doi.org/10.1016/s0893-9659(03)80046-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sann, Zarni, Thi Thi Soe, Kaythi Wyut Mhone Knin, and Zin May Win. "Performance comparison of asymmetric cryptography (case study-mail message)." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (2020): 105–11. http://dx.doi.org/10.34306/csit.v4i3.98.

Full text
Abstract:
Data encryption is well known as essential for today’s technology. ElGamal encryption and RSA algorithmis made before storing mails to mail server. ElGamal decryption and RSA decryption is made after retrieving mailsfrom mail server. This system is implemented to secure mail server system for local government’s important mailmessages. These algorithms consume a considerable amount of time and resources of memory, CPU time, andcomputation time to encrypt and decrypt data. This paper discuss the results comparison of these algorithms in termof encryption time, decryption time, and memory usage o
APA, Harvard, Vancouver, ISO, and other styles
4

J.L. Padmaja, Ch, V. S.Bhagavan, and B. Srinivas. "On using Aryabhatta Remainder Theorem to Decrypt a Message with RPrime and Rebalanced RSA." International Journal of Engineering & Technology 7, no. 2.7 (2018): 758. http://dx.doi.org/10.14419/ijet.v7i2.7.10940.

Full text
Abstract:
RSA is the most world widely used asymmetric cryptosystem for network transactions. Through this article, we propose a new implementation of Aryabhatta Remainder theorem (ART) in place of the existing Chinese Remainder Theorem (CRT) to solve congruencies in the decryption phase for the faster variants of RSA such as RPrime RSA and Rebalanced RSA. Through our observations, we prove that using ART for CRT has improved the overall decryption speed of RPrime and Rebalanced RSA.
APA, Harvard, Vancouver, ISO, and other styles
5

Sann, Zarni, Thi thi Soe, Kaythi Wyut Mhone Knin, and Zin May Win. "Performance Comparison of Asymmetric Cryptography (Case study- Mail message)." APTIKOM Journal on Computer Science and Information Technologies 4, no. 3 (2019): 105–11. http://dx.doi.org/10.11591/aptikom.j.csit.147.

Full text
Abstract:
Encryption is a well known technology for protecting sensitive data. ElGamal encryption and RSA algorithm is made before storing mails to mail server. ElGamal decryption and RSA decryption is made after retrieving mails from mail server. This system is implemented to secure mail server system for local government’s important mail messages. These algorithms consume a considerable amount of time and resources such as memory, CPU time, and computation time to encrypt and decrypt data. In this paper, the results are comparison of these algorithms in term of encryption time, decryption time, and me
APA, Harvard, Vancouver, ISO, and other styles
6

Hariyanto, Eko Hariyanto, Muhammad Zarlis, Darmeli Nasution Nasution, and Sri Wahyuni. "Analysis Aryabhata Remainder Theorem On Rivest Shamir Adleman (RSA) Cryptography." APTIKOM Journal on Computer Science and Information Technologies 5, no. 2 (2020): 88–93. http://dx.doi.org/10.34306/csit.v5i2.183.

Full text
Abstract:
Security of RSA cryptography lied in the difficulty of factoring the number p and q bacame the prime factor. The greater the value of p and q used, the better the security level was. However, this could result in a very slow decryption process. The most commonly used and discussed method of speeding up the encryption and decryption process in RSA was the Chinese Remainder Theorem (CRT). Beside that method, there was another method with the same concept with CRT namely Aryabhata Remainder Theorem which was also relevant used in public key cryptography such as RSA. The purpose of this study was
APA, Harvard, Vancouver, ISO, and other styles
7

Aryanti, Aryanti, and Ikhthison Mekongga. "Implementation of Rivest Shamir Adleman Algorithm (RSA) and Vigenere Cipher In Web Based Information System." E3S Web of Conferences 31 (2018): 10007. http://dx.doi.org/10.1051/e3sconf/20183110007.

Full text
Abstract:
Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography. In this study developed a data security system by implementing the cryptography algorithm Rivest, Shamir Adleman (RSA) and Vigenere Cipher. The research was done by combining Rivest, Shamir Adleman (RSA) and Vigenere Cipher cryptographic algorithms to document file either word, excel, and pdf. This application includes the process of encryption and decryption of data, which is created by using PHP software and my SQL. Data encryp
APA, Harvard, Vancouver, ISO, and other styles
8

ABDULHAMID, Mohanad, and Nyagathu GICHUKI. "Comparative Study of Cryptographic Algorithms." International Journal of Information Security and Cybercrime 8, no. 1 (2019): 13–22. http://dx.doi.org/10.19107/ijisc.2019.01.01.

Full text
Abstract:
This paper presents a comparative study of two cryptosystems, Data Encryption Standard (DES) and the Rivest-Shamir-Adleman (RSA) schemes. DES is a symmetric (or private) key cipher. This means that the same key is used for encryption and decryption. RSA, on the other hand, is an asymmetric (or public) key cipher, meaning that two keys are used, one for encryption and the other for decryption. The objective of this paper is to implement these two schemes in software. The program is written in the Java™ language. It generates a key from a passphrase given by the user, encrypts and decrypts a mes
APA, Harvard, Vancouver, ISO, and other styles
9

Flynn, Sofia. "An Investigation Into the Mathematics of Decryption Techniques in RSA Encryption, With an Implementation in Python." Spring 2021, no. 2 (July 31, 2021): 6–18. http://dx.doi.org/10.48091/gsr.v1i2.18.

Full text
Abstract:
This study explores the mathematics of two different techniques that can be used to access the decryption key in RSA encryption including semi-prime factorization and a logarithmic method. The study then presents a Python program, written by the author, that automates the calculations for either of the decryption techniques and also calculates the number of iterations required to determine the decryption key in either circumstance. Most importantly, the program utilizes only values of the RSA encryption algorithm that would be made publicly available in actual circumstances to calculate the de
APA, Harvard, Vancouver, ISO, and other styles
10

Christina C, Merlyne Sandra, Karthika M, Vasanthi M, and Vinotha B. "Video Encryption and Decryption using RSA Algorithm." International Journal of Engineering Trends and Technology 33, no. 7 (2016): 328–32. http://dx.doi.org/10.14445/22315381/ijett-v33p263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

R, Rasu, Manoshrudhy ., and P. Shanmugasundaram. "VLSI Implementation of RSA Encryption/Decryption Algorithm." i-manager's Journal on Computer Science 2, no. 1 (2014): 26–31. http://dx.doi.org/10.26634/jcom.2.1.2848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Sarkar, Santanu, and Subhamoy Maitra. "Cryptanalysis of RSA with two decryption exponents." Information Processing Letters 110, no. 5 (2010): 178–81. http://dx.doi.org/10.1016/j.ipl.2009.11.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Li, You Guo. "Improved RSA Algorithm in Hardware Encryption." Applied Mechanics and Materials 543-547 (March 2014): 3610–13. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3610.

Full text
Abstract:
Montgomery algorithm will die N operation into shift operation, optimized Systolic array with fewer resources to achieve efficient Montgomery algorithm, and the application of power conversion technology to further improve the RSA encryption,decryption speed. In order to make full use of FPGA resources, this paper analyzes the impact of the Systolic array at different levels of granularity on the performance of the system, and gives the realization and S = key and encryption,decryption information are RSA encryption system of s hardware 1024 time results.
APA, Harvard, Vancouver, ISO, and other styles
14

Suhandinata, Sebastian, Reyhan Achmad Rizal, Dedy Ongky Wijaya, Prabhu Warren, and Srinjiwi Srinjiwi. "ANALISIS PERFORMA KRIPTOGRAFI HYBRID ALGORITMA BLOWFISH DAN ALGORITMA RSA." JURTEKSI (Jurnal Teknologi dan Sistem Informasi) 6, no. 1 (2019): 1–10. http://dx.doi.org/10.33330/jurteksi.v6i1.395.

Full text
Abstract:
Abstract:Computer data security relies on preventing data theft from irresponsible parties by using cryptography method. Some cryptography algorithms have good and poor performance in encrypting and decrypting data depending on the key types. Therefore the purpose of this research is to measure the performance of the hybrid algorithm, consisting a symmetric keyBlowfish algorithm and an asymmetric key RSA algorithm, in encrypting and decrypting multiple types of data such as documents, photos, audios, and videos. The result is the performance of the hybrid algorithm is almost on par with Blowfi
APA, Harvard, Vancouver, ISO, and other styles
15

Darari, Radifan, Edi Winarko, and Auli Damayanti. "Encryption and Decryption Application on Images with Hybrid Algorithm Vigenere and RSA." Contemporary Mathematics and Applications (ConMathA) 2, no. 2 (2020): 109. http://dx.doi.org/10.20473/conmatha.v2i2.23855.

Full text
Abstract:
Digital image is digital pictures on a two-dimensional plane which consists of pixels, where every pixels has Red, Green, Blue (RGB) with varying intensity depending on the image. In this thesis digital image is encrypted using hybrid algorithm Vigenere and RSA. Vigenere algorithm is a symmetric key algorithm which is a variety from Caesar algorithm where the similarity is in both of them are based on shifting the index of alphabet letters. RSA algorithm are based on the difficulty of factorizing large numbers that have 2 and only 2 factors (Prime numbers). The encryption process starts with g
APA, Harvard, Vancouver, ISO, and other styles
16

Sun, Hung-Min, Mu-En Wu, M. Jason Hinek, Cheng-Ta Yang, and Vincent S. Tseng. "Trading decryption for speeding encryption in Rebalanced-RSA." Journal of Systems and Software 82, no. 9 (2009): 1503–12. http://dx.doi.org/10.1016/j.jss.2009.04.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Kbarn, Ghassan, and Wathiq Mansoor. "Modified RSA Using Triple Keys Based Encryption/Decryption." Jordan Journal of Electrical Engineering 7, no. 1 (2021): 1. http://dx.doi.org/10.5455/jjee.204-1600376137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Faiz, Darsanto, Rio Andriyat Krisdiawan, and Dias Eka Prayuda. "IMPLEMENTATION OF THE RSA CRYPTOGRAPHIC ALGORITHM IN THE QR-CODE ANDROID-BASED BUILDING PERMIT CHECKING APPLICATION." NUANSA INFORMATIKA 15, no. 1 (2021): 74. http://dx.doi.org/10.25134/nuansa.v15i1.3895.

Full text
Abstract:
The investment office and one-stop integrated service (DPMPTSP) of Kuningan regency issues various kinds of permits, one of which is a building permit (IMB) issued by the investment office and one-stop integrated service on the applicant's side. Research is motivated by the vulnerability of counterfeiting permits that have been granted by the investment service and one-stop integrated services. The purpose of this research is to create a system or information technology that can help to make it easier to check building permits, one of which is by using QR-Code technology. This system can scan
APA, Harvard, Vancouver, ISO, and other styles
19

Pradhan, Sushma, and Birendra Kumar Sharma. "Improved Semantically Secured Variant of RSA Public Key Cryptosystem." International Journal of Informatics and Communication Technology (IJ-ICT) 4, no. 3 (2015): 91. http://dx.doi.org/10.11591/ijict.v4i3.pp91-97.

Full text
Abstract:
<p>Boneh and Shacham gave a nice survey on four variants (Batch RSA, Multi-Prime RSA, Multi-Power RSA, and Rebalanced RSA). Batch RSA and Multi-Prime RSA were then combined to increase the decryption/signature generation performance. Here in this paper we further tried to increase the encryption/ signature verification performance. The proposed scheme is semantically secure also.</p>
APA, Harvard, Vancouver, ISO, and other styles
20

Obaid, Taleb Samad. "Study A Public Key in RSA Algorithm." European Journal of Engineering Research and Science 5, no. 4 (2020): 395–98. http://dx.doi.org/10.24018/ejers.2020.5.4.1843.

Full text
Abstract:
To transmit sensitive information over the unsafe communication network like the internet network, the security is precarious tasks to protect this information. Always, we have much doubt that there are more chances to uncover the information that is being sent through network terminals or the internet by professional/amateur parasitical persons. To protect our information we may need a secure way to safeguard our transferred information. So, encryption/decryption, stenographic and vital cryptography may be adapted to care for the required important information. In system cryptography, the inf
APA, Harvard, Vancouver, ISO, and other styles
21

Fagin, Barry. "Composite Numbers That Give Valid RSA Key Pairs for Any Coprime p." Information 9, no. 9 (2018): 216. http://dx.doi.org/10.3390/info9090216.

Full text
Abstract:
RSA key pairs are normally generated from two large primes p and q. We consider what happens if they are generated from two integers s and r, where r is prime, but unbeknownst to the user, s is not. Under most circumstances, the correctness of encryption and decryption depends on the choice of the public and private exponents e and d. In some cases, specific ( s , r ) pairs can be found for which encryption and decryption will be correct for any ( e , d ) exponent pair. Certain s exist, however, for which encryption and decryption are correct for any odd prime r ∤ s . We give necessary and suf
APA, Harvard, Vancouver, ISO, and other styles
22

Dr Asha Ambhaikar, Mr Abhishek Guru,. "AES AND RSA-BASED HYBRID ALGORITHMS FOR MESSAGE ENCRYPTION & DECRYPTION." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (2021): 273–79. http://dx.doi.org/10.17762/itii.v9i1.129.

Full text
Abstract:
File encryption is an easy means of securing personal or business data protection. The RSA and AES representative encryption algorithms are not capable of satisfying the criteria of file encryption reliability and security when used separately. A hybrid encryption algorithm mixing AES and RSA algorithms is suggested in this paper to overcome the above issues in order to solve file encryption performance and security problems. The experimental results suggest that the RSA and AES hybrid encryption algorithm can not only encrypt files, but also provide the benefits of efficiency and protection o
APA, Harvard, Vancouver, ISO, and other styles
23

Sarkar, Santanu, and Subhamoy Maitra. "Cryptanalysis of RSA with more than one decryption exponent." Information Processing Letters 110, no. 8-9 (2010): 336–40. http://dx.doi.org/10.1016/j.ipl.2010.02.016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Yousif, Sura F. "ENCRYPTION AND DECRYPTION OF AUDIO SIGNAL BASED ON RSA ALGORITHN." International Journal of Engineering Technologies and Management Research 5, no. 7 (2020): 57–64. http://dx.doi.org/10.29121/ijetmr.v5.i7.2018.259.

Full text
Abstract:
One of the most important methods to protect and verify information that are exchanged over public communication channels in the existence of third party called antagonists is encryption. The stored or transmitted message is transformed in the encryption process to unreadable or gibberish form. The reverse process in which the intendent recipient can reveal the encrypted message content is called decryption. The encryption and decryption processes are achieved using secret keys that are exclusively exchanged between the sender and recipient. This method can be applied to any form of message su
APA, Harvard, Vancouver, ISO, and other styles
25

Long, Trần Đình. "A VARIANT OF RSA CRYPTOSYSTEM ON THE ENDOMORPHISM RING End(Z_n×Z_(n^k ))." Hue University Journal of Science: Natural Science 127, no. 1A (2018): 101. http://dx.doi.org/10.26459/hueuni-jns.v127i1a.4746.

Full text
Abstract:
<p><em>Based on the arithmetic of the endomorphisms ring </em><em>End(</em> <em>, the paper constructs an exponent type encryption and decryption cryptosystem. Althought involving m</em><em>ore</em><em> operations in encryption and decryption p</em><em>hases </em><em> than that of original RSA one, the cryptosystem has some advantages in avoiding lattice and chosen plaintext attack</em><em>s</em><em> compared to original RSA cryptosystem.</em></p>
APA, Harvard, Vancouver, ISO, and other styles
26

M. Abd Zaid, Mustafa, and Dr Soukaena Hassan. "Lightweight Rsa Algorithm Using Three Prime Numbers." International Journal of Engineering & Technology 7, no. 4.36 (2018): 293. http://dx.doi.org/10.14419/ijet.v7i4.36.23790.

Full text
Abstract:
The computing devices utilized as a part of an extensive class of remote correspondence systems, for example, cell phones, remote sensor systems (WSNs), vehicular ad hoc networks (VANETs), mobile ad hoc networks (MANETs), Internet of Things (IoT), body area networks (BANs) and so on, are little and asset compelled. In the current developments of the resource constraint environments, the trend is shifted towards lightweight cryptographic algorithm. Many lightweight cryptographic algorithms have been developed and also existed algorithms are modified in terms of resource constraint environments.
APA, Harvard, Vancouver, ISO, and other styles
27

Kovalchuk, Anatoliy, Nataliia Lotoshynska, Mariia Podavalkina, and Khrystyna Pelekh. "RSA ALGORITHM ELEMENTS IN TERNARY AFFINE TRANSFORMATIONS IN ENCRYPTION-DECRYPTION OF IMAGES." Measuring Equipment and Metrology 81, no. 4 (2020): 25–29. http://dx.doi.org/10.23939/istcmtm2020.04.025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Nitaj, Abderrahmane, and Mohamed Ould Douh. "A New Attack on RSA With a Composed Decryption Exponent." International Journal on Cryptography and Information Security 3, no. 4 (2013): 11–21. http://dx.doi.org/10.5121/ijcis.2013.3402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Wu, Tao, ShuGuo Li, and LiTian Liu. "Fast RSA decryption through high-radix scalable Montgomery modular multipliers." Science China Information Sciences 58, no. 6 (2015): 1–16. http://dx.doi.org/10.1007/s11432-014-5215-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Ginting, Albert, R. Rizal Isnanto, and Ike Pertiwi Windasari. "Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email." Jurnal Teknologi dan Sistem Komputer 3, no. 2 (2015): 253. http://dx.doi.org/10.14710/jtsiskom.3.2.2015.253-258.

Full text
Abstract:
In the world of Internet nothing is really safe. There's always a gap in any application made. Likewise in email delivery. To minimize attacks on the data transmission is usually applied cryptography. One fairly popular cryptographic algorithms are RSA algorithm. In this study will discuss the implementation of a cryptographic algorithm RSA encryption and decryption process email. To test created a java-based email client program with message encryption and decryption features messages. This application uses the Java programming language and Netbeans 7.4 as editor. Mail servers used is Google
APA, Harvard, Vancouver, ISO, and other styles
31

Laurentinus, Laurentinus, Harrizki Arie Pradana, Dwi Yuny Sylfania, and Fransiskus Panca Juniawan. "Performance comparison of RSA and AES to SMS messages compression using Huffman algorithm." Jurnal Teknologi dan Sistem Komputer 8, no. 3 (2020): 171–77. http://dx.doi.org/10.14710/jtsiskom.2020.13468.

Full text
Abstract:
Improved security of short message services (SMS) can be obtained using cryptographic methods, both symmetric and asymmetric, but must remain efficient. This paper aims to study the performance and efficiency of the symmetric crypto of AES-128 and asymmetric crypto of RSA with message compression in securing SMS messages. The ciphertext of RSA and AES were compressed using the Huffman algorithm. The average AES encryption time for each character is faster than RSA, which is 5.8 and 24.7 ms/character for AES and AES+Huffman encryption and 8.7 and 45.8 ms/character for RSA and RSA+Huffman, from
APA, Harvard, Vancouver, ISO, and other styles
32

Safira, Maria Okta, and I. Komang Ari Mogi. "Design Of Hybrid Cryptography With Vigenere Cipher And RSA Algorithm On IOT Data Security." JELIKU (Jurnal Elektronik Ilmu Komputer Udayana) 8, no. 4 (2020): 475. http://dx.doi.org/10.24843/jlk.2020.v08.i04.p14.

Full text
Abstract:
In this paper two methods are used, namely the vigenere cipher method and the RSA method. The vigenere cipher method is an example of a symmetric algorithm, while RSA is an example of an asymmetric algorithm. The combination of these two methods is called hybrid cryptography which has the advantage in terms of speed during the encryption process. Each process, which is encryption and decryption, is carried out twice, so that security can be ensured. In the process of forming the key used the RSA method. In the encryption process using public keys that have been generated before when the key is
APA, Harvard, Vancouver, ISO, and other styles
33

Mochurad, Lesia, Yurii Kryvenchuk, and Svyatoslav Yatsyshyn. "PARALLELIZATION OF RSA CRYPTOGRAPHIC ALGORITHM BASED ON CUDA TECHNOLOGIES." Measuring Equipment and Metrology 82, no. 2 (2021): 5–9. http://dx.doi.org/10.23939/istcmtm2021.02.005.

Full text
Abstract:
The paper examines the efficiency of the application of CUDA technologies for the parallelization of the cryptographic algorithm with the public key. The speed of execution of several implementations of the algorithm is compared: sequential implementation on the CPU and two parallel implementations – on the CPU and GPU. A description of the public key algorithm is presented, as well as properties that allow it to be parallelized. The advantages and disadvantages of parallel implementations are analyzed. It is shown that each of them can be suitable for different scenarios. The software was dev
APA, Harvard, Vancouver, ISO, and other styles
34

Lee, Sang-Un. "A 2kβ Algorithm for Euler function 𝜙(n) Decryption of RSA". Journal of the Korea Society of Computer and Information 19, № 7 (2014): 71–76. http://dx.doi.org/10.9708/jksci.2014.19.7.071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Aminudin, Aminudin, Gadhing Putra Aditya, and Sofyan Arifianto. "RSA algorithm using key generator ESRKGS to encrypt chat messages with TCP/IP protocol." Jurnal Teknologi dan Sistem Komputer 8, no. 2 (2020): 113–20. http://dx.doi.org/10.14710/jtsiskom.8.2.2020.113-120.

Full text
Abstract:
This study aims to analyze the performance and security of the RSA algorithm in combination with the key generation method of enhanced and secured RSA key generation scheme (ESRKGS). ESRKGS is an improvement of the RSA improvisation by adding four prime numbers in the property embedded in key generation. This method was applied to instant messaging using TCP sockets. The ESRKGS+RSA algorithm was designed using standard RSA development by modified the private and public key pairs. Thus, the modification was expected to make it more challenging to factorize a large number n into prime numbers. T
APA, Harvard, Vancouver, ISO, and other styles
36

Ito, Yasuaki, Koji Nakano, and Bo Song. "The Parallel FDFM Processor Core Approach for CRT-based RSA Decryption." International Journal of Networking and Computing 2, no. 1 (2012): 79–96. http://dx.doi.org/10.15803/ijnc.2.1_79.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Arief, S. N., V. A. H. Firdaus, and A. Prasetyo. "Optimization of RSA encryption and decryption process with distributed computing method." IOP Conference Series: Materials Science and Engineering 830 (May 19, 2020): 022090. http://dx.doi.org/10.1088/1757-899x/830/2/022090.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Nitaj, Abderrahmane. "A new attack on RSA with two or three decryption exponents." Journal of Applied Mathematics and Computing 42, no. 1-2 (2012): 309–19. http://dx.doi.org/10.1007/s12190-012-0618-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Dong, Jiankuo, Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, and Yuan Zhao. "Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/3508786.

Full text
Abstract:
Asymmetric cryptographic algorithm (e.g., RSA and Elliptic Curve Cryptography) implementations on Graphics Processing Units (GPUs) have been researched for over a decade. The basic idea of most previous contributions is exploiting the highly parallel GPU architecture and porting the integer-based algorithms from general-purpose CPUs to GPUs, to offer high performance. However, the great potential cryptographic computing power of GPUs, especially by the more powerful floating-point instructions, has not been comprehensively investigated in fact. In this paper, we fully exploit the floating-poin
APA, Harvard, Vancouver, ISO, and other styles
40

Sihombing, Grace Lamudur Arta. "HYBRID CHRIPTOGRAPHY STREAM CIPHER AND RSA ALGORITHM WITH DIGITAL SIGNATURE AS A KEY." InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan) 1, no. 2 (2017): 75–83. http://dx.doi.org/10.30743/infotekjar.v1i2.66.

Full text
Abstract:
Confidentiality of data is very important in communication. Many cyber crimes that exploit security holes for entry and manipulation. To ensure the security and confidentiality of the data, required a certain technique to encrypt data or information called cryptography. It is one of the components that can not be ignored in building security. And this research aimed to analyze the hybrid cryptography with symmetric key by using a stream cipher algorithm and asymmetric key by using RSA (Rivest Shamir Adleman) algorithm. The advantages of hybrid cryptography is the speed in processing data using
APA, Harvard, Vancouver, ISO, and other styles
41

Wibowo, Nur Cayo Hendro, Khotibul Umam, Albadru Muh Izul Khaq, and Favian Agung Rizki. "Komparasi Waktu Algoritma RSA dengan RSA-CRT Base On Computer." Walisongo Journal of Information Technology 2, no. 1 (2020): 13. http://dx.doi.org/10.21580/wjit.2020.2.1.5402.

Full text
Abstract:
<p align="center"><em>Cryptography is a branch of mathematics. Asymmetric algorithms such as RSA, including the type of cryptography that is more widely used to be implemented in everyday life because it has an algorithm that is not easy to be misused by others. However, the encryption and decryption process of RSA requires quite a long time. For this reason, RSA - CRT emerged. In this study a time comparison between the RSA algorithm and the RSA-CRT Base On Computer is done. The purpose of this study was to determine the execution time of the RSA-CRT algorithm using PHP.</em&gt
APA, Harvard, Vancouver, ISO, and other styles
42

Simargolang, Muhammad Yasin. "IMPLEMENTASI KRIPTOGRAFI RSA DENGAN PHP." JURNAL TEKNOLOGI INFORMASI 1, no. 1 (2017): 1. http://dx.doi.org/10.36294/jurti.v1i1.1.

Full text
Abstract:
Abstract - Cryptography is an art and science to maintain data security. In maintaining the security of cryptographic data transforming clear data (plaintext) into a password (ciphertext) that cannot be recognized. This ciphertext is then sent by the sender to the recipient. After arriving at the recipient, the ciphertext is transformed back into a plaintext form so that it can be recognized. The method used is the encryption method asymmetrical Rivest Shamir Adleman (RSA). The security of the RSA algorithm lies in the difficulty of factoring large numbers into prime factors. Factoring is done
APA, Harvard, Vancouver, ISO, and other styles
43

Gulen, Utku, Abdelrahman Alkhodary, and Selcuk Baktir. "Implementing RSA for Wireless Sensor Nodes." Sensors 19, no. 13 (2019): 2864. http://dx.doi.org/10.3390/s19132864.

Full text
Abstract:
As wireless sensor networks (WSNs) become more widespread, potential attacks against them also increase and applying cryptography becomes inevitable to make secure WSN nodes. WSN nodes typically contain only a constrained microcontroller, such as MSP430, Atmega, etc., and running public key cryptography on these constrained devices is considered a challenge. Since WSN nodes are spread around in the field, the distribution of the shared private key, which is used in a symmetric key cryptographic algorithm for securing communications, is a problem. Thus, it is necessary to use public key cryptog
APA, Harvard, Vancouver, ISO, and other styles
44

Tahir, Ari Shawkat. "Design and Implementation of RSA Algorithm using FPGA." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 12 (2015): 6361–67. http://dx.doi.org/10.24297/ijct.v14i12.1737.

Full text
Abstract:
RSA cryptographic algorithm used to encrypt and decrypt the messages to send it over the secure transmission channel like internet. The RSA algorithm is a secure, high quality, public key algorithm. In this paper, a new architecture and modeling has been proposed for RSA public key algorithm, the suggested system uses 1024-bit RSA encryption/decryption for restricted system. The system uses the multiply and square algorithm to perform modular operation. The design has been described by VHDL and simulated by using Xilinx ISE 12.2 tool. The architectures have been implemented on reconfigurable
APA, Harvard, Vancouver, ISO, and other styles
45

Parihar, Aashish, and Sangeeta Nakhate. "Fast and High-throughput Montgomery Modular Multiplier for RSA Encryption and Decryption." IEIE Transactions on Smart Processing & Computing 7, no. 2 (2018): 148–58. http://dx.doi.org/10.5573/ieiespc.2018.7.2.148.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Ping, Luo, and Majid Mumtaz. "An Improved Cryptanalysis of Large RSA Decryption Exponent with constrained Secret key." International Journal of Information and Computer Security 14, no. 1 (2021): 1. http://dx.doi.org/10.1504/ijics.2021.10026019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Zhang, Hanlin, Jia Yu, Chengliang Tian, et al. "Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things." IEEE Internet of Things Journal 7, no. 8 (2020): 6868–81. http://dx.doi.org/10.1109/jiot.2020.2970499.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Li, Shi-qun, Yong-dong Wu, Jian-ying Zhou, and Ke-fei Chen. "A practical SSL server performance improvement algorithm based on batch RSA decryption." Journal of Shanghai Jiaotong University (Science) 13, no. 1 (2008): 67–70. http://dx.doi.org/10.1007/s12204-008-0067-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Mumtaz, Majid, and Luo Ping. "An improved cryptanalysis of large RSA decryption exponent with constrained secret key." International Journal of Information and Computer Security 14, no. 2 (2021): 102. http://dx.doi.org/10.1504/ijics.2021.113168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Mezher, Ahmed Eskander. "Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 5 (2018): 3949. http://dx.doi.org/10.11591/ijece.v8i5.pp3949-3953.

Full text
Abstract:
Security is one of the most important concern to the information and data sharing for companies, banks, organizations and government facilities. RSA is a public cryptographic algorithm that is designed specifically for authentication and data encryption. One of the most powerful reasons makes RSA more secure is that the avoidance of key exchange in the encryption and decryption processes. Standard RSA algorithm depends on the key length only to protect systems. However, RSA key is broken from time to another due to the development of computers hardware such as high speed processors and advance
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!