IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
Scopus/Elsevier
(Re-evaluation in-progress)
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 1 - Issue 4, May 2012 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



IMPLEMENTATION OF RSA ALGORITHM USING ELLIPTIC CURVE ALGORITHM FOR SECURITY AND PERFORMANCE ENHANCEMENT

[Full Text]

 

AUTHOR(S)

Prasant Singh Yadav, Pankaj Sharma, Dr K. P Yadav

 

KEYWORDS

 

ABSTRACT

This paper introduces the concept and implementation of RSA algorithm for security purpose and to enhance the performance of software system using this algorithm. In this article we have done study about RSA algorithm. This study includes what is RSA algorithm and why they are used in the field of Cryptography & Network Security. After doing several works on this topic we came to conclude that RSA algorithm is important to Network Security because they are the components (i.e. Encryption & Decryption key) which interact with the Security system. Without them the system will be useless as RSA are used to fire a particular Encryption & Decryption keys process because of which Security system is build. Here we are dealing with general problem in which we have a particular Security system event of a software system and our objective is to secure that system into a software security because without software security system cannot be secure any things in this world. Here we are discuss with attacks made against the underlying structure of the RSA algorithm, which exploit weaknesses in the choice of values for the encryption and decryption keys, and their relation to the RSA modulus N.

 

REFERENCES

[1]. Chong Fu, Zhi-liang Zhu, Sch. of Inf. Sci. & Eng., Northeastern Univ., Shenyang 110004,P.R.China.
[2]. William Stallings, “Cryptography and Network Security: Principles and practices, Dorling Kindersley (india) pvt ltd., 4th edition(2009).
[3]. Atul Kahate “Cryptography and Network Security” 3rd edition.
[4]. Behrouz A Forouzan ,”Data Communications and Networking” “4th edition”.
[5]. Xianhong Zhang. Theory and techniques og digital signature. Beijing: Mechanic Industries press, 2003.
[6]. JavaResearch org. Advanced J2SE. Beijing: Mechanic Industry Press. 2004.
[7]. Jiezhao peng, Qi Wu, Jiangxi University of finance & Economics, Nanchang 330013,Jiangxi province,China “Research and implementation of RSA Algorithm in Java”.
[8]. Hongwei Si,Youlin Cai, Zhimei Cheng, “An improved RSA algorithm based on Complex numeric operation function”.
[9]. http://www.rsa.com/rsalabs/node.asp?id=2167
[10].http://www.scribd.com/doc/55154238/31/DISADVANTAGES-OF-RSA