2019
DOI: 10.35940/ijrte.b1012.078219
|View full text |Cite
|
Sign up to set email alerts
|

Modified Key Generation in RSA Algorithm

Abstract: Abstract: RSA Algorithm is one of the widely used asymmetric cryptography. But with several conducts of the different studies, factorization attack based on the value of modulo 'n' and based on the public key, the value of the private key is vulnerable. With this, the study modified the RSA Algorithm based on modulo and the public key. The modulo transformed into a new value that produced a compound result in the factorization process. At the same time, the public key has been modified by choosing randomly fr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 12 publications
(12 reference statements)
0
2
0
Order By: Relevance
“…The asymmetric cryptographic system based on number theory was proposed by Rivest, Shamir and Adleman of the Massachusetts Institute of Technology [21]. The core of the system is the RSA algorithm.…”
Section: Rsa Encryption Algorithmmentioning
confidence: 99%
“…The asymmetric cryptographic system based on number theory was proposed by Rivest, Shamir and Adleman of the Massachusetts Institute of Technology [21]. The core of the system is the RSA algorithm.…”
Section: Rsa Encryption Algorithmmentioning
confidence: 99%
“…Finally, [32] investigated the modification of the RSA method from creating a different value of public key 'e'. When comparing the output value and execution speed, a novel technique in the encryption and decryption process was discovered.…”
Section: ) Local Studiesmentioning
confidence: 99%