Academic Journals Database
Disseminating quality controlled scientific knowledge

An analysis of the attacks on public key RSA cryptosystem with the proposed algorithm.

Author(s): Varun Shukla | Abhishek Choubey

Journal: International Journal of Innovative Technology and Creative Engineering
ISSN 2045-869X

Volume: 2;
Issue: 2;
Start page: 6;
Date: 2012;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Plaintext | RSA | Secure Sockets Layer (SSL) | Chinese remainder theorem (CRT) | Elliptic Curve

The RSA is widely used public-key cryptosystem. RSA is intensively used for encryption methods and digital signature. It is purposely used in securing e-commerce and e-mail, providing authenticity of e- documents. It can be said that Internet security depends prominently on the security of the RSA cryptosystem. Since its discovery, the RSA cryptosystem has been extensively analysed for vulnerabilities. Years of cryptanalysis of RSA have given us a broad insight into its properties and provided valuable guidelines to us for proper use and implementation in different aspects. In this paper we propose an analysis of the main methods used in attacks on the RSA cryptosystem together with the new possible attack. Our focus is based on the underlying mathematical function.
Why do you need a reservation system?      Affiliate Program