THRESHOLD Φ (n) 2 ? Φ(N) - RSA ALGORITHM
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.4, No. 10)Publication Date: 2015-10-30
Authors : S.Venkateswarlu; Dr.R.Seshadri;
Page : 6-12
Keywords : Cryptography;
Abstract
Today Computers are used in various data processing applications ranging from ordinary to sensitive. These Applications should ensure security to customers who perform online payments throug h e - commerce and companies share confidential documents between them. The solution is by Cryptography which provides security to the data such as by Asymmetric key cryptography, also called as Public Key cryptography, uses two different keys (which forms a key pair), one key is used for encryption and only the other corresponding key must be used for decryption. No other key can decrypt the message ? not even the original (i.e. the first) key used for encryption. Many cryptosystems has been proposed with mo difications to original RSA by improving security, performance of various phases of algorithm. In this paper we propose Threshold | φ (n)2 ? φ(N) - RSA Algorithm to provide hierarchy implementation of encryption and decryption phases which has better performance than RSA and its variants like Batch - RSA, Multi - Prime RSA, Rebalanced ? RSA.
Other Latest Articles
- MODELING AND ANALYSIS OF A VECTOR-HOST EPIDEMIC MODEL WITH SATURATED INCIDENCE RATE UNDER TREATMENT
- A NEW IMPROVE METHOD FOR SOLVING TRANSPORTATION PROBLEM
- CONCEPTION OF COLLABORATIVE LEARNING IN SECONDARY SCHOOLS: RELATIONSHIPS WITH SELF-EFFICACY BELIEF AND ACADEMIC ACHIEVEMENT
- THE USE OF CORPORATE SOCIAL RESPONSIBILITY AS A TOOL OF DOING BUSINESS AMONGST KENYA’S CONSTRUCTION FIRMS
- PARENT-CHILD RELATIONSHIP MOTIVATION TO LEARN AND STUDENTS ACADEMIC ACHIEVEMENT IN MATHEMATICS
Last modified: 2015-10-08 20:59:29