ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Implementation of Triple RSA

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 5)

Publication Date:

Authors : ; ; ;

Page : 682-688

Keywords : Authenticity; Confidentiality; Data integrity; Digital signature; Private key; Public key; Public key cryptography; Non Repudiation; Symmetric encryption;

Source : Downloadexternal Find it from : Google Scholarexternal


The Rivest Shamir Adleman (RSA) cryptosystem, named after its creators, is one of the most popular public key cryptosystems. It is most widely used for its strong security feature and easy implementation. The RSA cryptosystem has been utilized for many e-commerce applications, various forms of authentication, and virtual private networks in any organizations. The importance of high security and faster implementations paved the way for hardware implementations of the RSA algorithm. This work consists of describing a new approach to enhance RSA security. In this paper we will enhance the security feature by introducing an advance model called Triple RSA. Although RSA has not been attacked yet, it is still prone to attacks. So to enhance its security we have implemented triple RSA just like triple DES which is extremely secure. This model provides along with confidentiality, a strong authentication, data integrity, tamper detection and non repudiation.

Last modified: 2014-06-09 21:10:04