Implementation of Triple RSA
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 5)Publication Date: 2014-05-30
Authors : Sapna Sejwani; Prema K.V; Sarvesh Tanwar;
Page : 682-688
Keywords : Authenticity; Confidentiality; Data integrity; Digital signature; Private key; Public key; Public key cryptography; Non Repudiation; Symmetric encryption;
Abstract
The Rivest Shamir Adleman (RSA) cryptosystem, named after its creators, is one of the most popular public key cryptosystems. It is most widely used for its strong security feature and easy implementation. The RSA cryptosystem has been utilized for many e-commerce applications, various forms of authentication, and virtual private networks in any organizations. The importance of high security and faster implementations paved the way for hardware implementations of the RSA algorithm. This work consists of describing a new approach to enhance RSA security. In this paper we will enhance the security feature by introducing an advance model called Triple RSA. Although RSA has not been attacked yet, it is still prone to attacks. So to enhance its security we have implemented triple RSA just like triple DES which is extremely secure. This model provides along with confidentiality, a strong authentication, data integrity, tamper detection and non repudiation.
Other Latest Articles
Last modified: 2014-06-09 21:10:04