Puneeth B R, R. K. R., B. K., Surendra Shetty, K. N. S., Radhakrishna Dodmane, Ramya, Sarda M N Islam
{"title":"RSA中假模($\\zeta$)方法的保密性及其安全性分析","authors":"Puneeth B R, R. K. R., B. K., Surendra Shetty, K. N. S., Radhakrishna Dodmane, Ramya, Sarda M N Islam","doi":"10.1109/UPCON56432.2022.9986419","DOIUrl":null,"url":null,"abstract":"In today's world, the most vital feature is the security of shared information. To achieve this, various algorithms are offered in cryptosystems, with RSA being one among them. RSA is a robust encryption method, however it can be cracked using a factorization attack. As a result, this work presents an improved RSA algorithm that emphasises RSA's security feature of giving immunity to factorization attacks. The algorithm provides a third variable, which is used as the public key in the network, replacing the common modulus n. The experimental end results, such as differential analysis, performance analysis, and statistical analysis, clearly demonstrated the efficacy of the proposed methodology for secure communication. In addition, the article examines various assaults that could be made against the proposed system and reflects on its effectiveness.","PeriodicalId":185782,"journal":{"name":"2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Preserving Confidentiality against Factorization Attacks using Fake Modulus ($\\\\zeta$) Approach in RSA and its Security Analysis\",\"authors\":\"Puneeth B R, R. K. R., B. K., Surendra Shetty, K. N. S., Radhakrishna Dodmane, Ramya, Sarda M N Islam\",\"doi\":\"10.1109/UPCON56432.2022.9986419\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today's world, the most vital feature is the security of shared information. To achieve this, various algorithms are offered in cryptosystems, with RSA being one among them. RSA is a robust encryption method, however it can be cracked using a factorization attack. As a result, this work presents an improved RSA algorithm that emphasises RSA's security feature of giving immunity to factorization attacks. The algorithm provides a third variable, which is used as the public key in the network, replacing the common modulus n. The experimental end results, such as differential analysis, performance analysis, and statistical analysis, clearly demonstrated the efficacy of the proposed methodology for secure communication. In addition, the article examines various assaults that could be made against the proposed system and reflects on its effectiveness.\",\"PeriodicalId\":185782,\"journal\":{\"name\":\"2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/UPCON56432.2022.9986419\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 9th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UPCON56432.2022.9986419","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Preserving Confidentiality against Factorization Attacks using Fake Modulus ($\zeta$) Approach in RSA and its Security Analysis
In today's world, the most vital feature is the security of shared information. To achieve this, various algorithms are offered in cryptosystems, with RSA being one among them. RSA is a robust encryption method, however it can be cracked using a factorization attack. As a result, this work presents an improved RSA algorithm that emphasises RSA's security feature of giving immunity to factorization attacks. The algorithm provides a third variable, which is used as the public key in the network, replacing the common modulus n. The experimental end results, such as differential analysis, performance analysis, and statistical analysis, clearly demonstrated the efficacy of the proposed methodology for secure communication. In addition, the article examines various assaults that could be made against the proposed system and reflects on its effectiveness.