2012 IEEE International Conference on Computational Intelligence and Computing Research 2012
DOI: 10.1109/iccic.2012.6510190
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid encryption algorithm based on RSA and Diffie-Hellman

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(15 citation statements)
references
References 3 publications
0
15
0
Order By: Relevance
“…According to Gupta and Sharma, some of the limitations associated with RSA include the fact that if any of p, q, e, and d is known, then the other values can be calculated, and therefore, eliminating the secrecy [1]. Also, RSA requires that the length of the message be less than bit length, otherwise the algorithm is likely to fail.…”
Section: Rsa Algorithm Limitationsmentioning
confidence: 99%
See 3 more Smart Citations
“…According to Gupta and Sharma, some of the limitations associated with RSA include the fact that if any of p, q, e, and d is known, then the other values can be calculated, and therefore, eliminating the secrecy [1]. Also, RSA requires that the length of the message be less than bit length, otherwise the algorithm is likely to fail.…”
Section: Rsa Algorithm Limitationsmentioning
confidence: 99%
“…Compared to other symmetric cryptographic systems, RSA is relatively slow, owing to the fact that it uses public key. Also, the size of the product of the two prime numbers selected (N=P X Q) limits the length of the plain text that can be encrypted, as well as the fact that initialization of each of the RSA process required random selection of two large prime number (P and Q) [1].…”
Section: Rsa Algorithm Limitationsmentioning
confidence: 99%
See 2 more Smart Citations
“…Some researchers rely on algorithms combination to provide more efficient encryption algorithms by making use of the strong points and avoiding the weaknesses of these algorithms. In [16] a novel method had been proposed, it combines the most popular algorithms; RSA and Diffie-Hellman to provide more security against cryptanalysts. The two prime numbers that are generated by RSA, e and d, are used as inputs to Diffie-Hellman in order to generate the session key K which will be used for encryption and decryption.…”
Section: Related Workmentioning
confidence: 99%