28-12-2012, 02:58 PM
IMPLEMENTATION OF RSA ALGORITHM USING ELLIPTIC CURVE ALGORITHM FOR SECURITY AND PERFORMANCE ENHANCEMENT
1IMPLEMENTATION OF RSA.pdf (Size: 137.1 KB / Downloads: 82)
ABSTRACT
This paper introduces the concept and implementation of RSA algorithm for security purpose and to enhance the performance of software system using this algorithm. In this article we have done study about RSA algorithm. This study includes what is RSA algorithm and why they are used in the field of Cryptography & Network Security. After doing several works on this topic we came to conclude that RSA algorithm is important to Network Security because they are the components (i.e. Encryption & Decryption key) which interact with the Security system. Without them the system will be useless as RSA are used to fire a particular Encryption & Decryption keys process because of which Security system is build. Here we are dealing with general problem in which we have a particular Security system event of a software system and our objective is to secure that system into a software security because without software security system cannot be secure any things in this world. Here we are discuss with attacks made against the underlying structure of the RSA algorithm, which exploit weaknesses in the choice of values for the encryption and decryption keys, and their relation to the RSA modulus N.
INTRODUCTION
The RSA cryptosystem was first published more than 25 years ago by Ronald Rivest, Adi Shamir and Leonard Adleman in 1977. It has been widely used for many years on the internet for security and authentication in many applications including credit card payments, email and remote login sessions [2]. A cryptosystem is simply an algorithm which converts the input data (known as plaintext) into something unrecognizable (known as cipher text) and converts the unrecognizable data back to its original form.
RELATED WORK
RSA key of length 1024 can be generated within two minutes on platform of a common PC [1]. On the other hand, encryption/decryption operation on data less than 1024 bits can be done within two seconds. So we can say that the actual efficiency of RSA based system is improved. It gives the guarantees for the point of implementation high security RSA algorithm using long key length on the platform of any PC not a particular PC [8]. There may be various known attacks to break the security of RSA algorithm, ―Brute force attack‖, which is a special kind of attack who does not care of any special parameters. However it is as also partitioned into two categories: Exhaustive attack & Factorization attack. Second type of attack is ―Subtle attack‖ who aims at the mathematic feature of some parameters [7]. We use RSA algorithm for digital signature point of view. A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. If any digital signature is valid then it gives a recipient reason to give trust that the message was created by a known sender and during transformation, it was not altered by third person. Now consider two employees A & B. A have some public data taken from its own cloud. Suppose there are two employees A & B of different enterprises.
Conclusion & Future Work
From the above study it is advent that RSA algorithm has the same importance as of the system in the Cryptography over network security. Since RSA are used to be provides the authentication & privacy to whole system. But it is fully depends upon the two large prime numbers, Encryption & Decryption key. Always keep you mind its mathematical calculation are very difficult and lengthy. Since its publication, a vast amount of research has been completed on inverting the RSA function, and many clever attacks have been found. Although the attacks detailed within this paper could be devastating in the appropriate conditions, the true benefit of this research should be to highlight the need for proper implementation of RSA.