IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 6 - Issue 7, July 2017 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



RSA Public Key Cryptography Algorithm A Review

[Full Text]

 

AUTHOR(S)

Shireen Nisha, Mohammed Farik

 

KEYWORDS

Algorithm, Cryptography, Cypher text, Private Key, Public Key, RSA.

 

ABSTRACT

This paper aims to review RSA, examine its strengths and weaknesses, and propose novel solutions to overcome the weakness. RSA (Rivest, Shamir, and Adleman) is one of the best cryptographic algorithms in use today that ensures secure communication over networks.

 

REFERENCES

[1] Ponemon Institute, "2016 Cost of Data Breach Study: Global Analysis," Ponemon Institute, North Traverse, 2016.

[2] B. L. Jr., "Cybersecurity: CNBC.com," CNBC, 15 June 2016. [Online]. Available: http://www.cnbc.com/2016/06/14/cost-of-data-breaches-hits-4-million-on-average-ibm.html. [Accessed 22 March 2017].

[3] Ponemon Institute, "2013 Cost of Data Breach Study: Global Analysis," Ponemon Institute, North Traverse, 2013.

[4] Ponemon Institute, "2014 Cost of Data Breach Study: Global Analysis," Ponemon Institute, North Traverse, 2014.

[5] Ponemon Institute, "2015 Cost of Data Breach Study: Global Analysis," Ponemon Institute, North Traverse , 2015.

[6] G. C. Kessler, An Overview of Cryptography, Boca Raton: Auerbach Publications, 2017.

[7] N. Priya and M. Kannan, "Comparative Study of RSA and Probabilistic Encryption," International Journal Of Engineering And Computer Science, vol. 6, no. 1, pp. 19867 - 19871, January 2017.

[8] H. B. Pethe and S. R. Pande, "Comparative Study and Analysis of Cryptographic Algorithms," International Journal of Advance Research in Computer Science and Management Studies, vol. 5, no. 1, pp. 48-56, 1 January 2017.

[9] A. Nordrum, "Tech-Talk: IEEE Spectrum," IEEE Spectrum, 3 March 2016. [Online]. Available: http://spectrum.ieee.org/tech-talk/computing/hardware/encryptionbusting-quantum-computer-practices-factoring-in-scalable-fiveatom-experiment. [Accessed 19 March 2017].

[10] B. Steyn, "Essays: Doctrina.org," Doctrina.org, 26 May 2012. [Online]. Available: http://doctrina.org/How-RSA-Works-With-Examples.html. [Accessed 19 March 2017].

[11] A. Harrison, "Articles:Computerworld.com," Computerworld.com, 18 September 2000. [Online]. Available: http://www.computerworld.com/article/2588444/security0/rsa-encryption-patent-released.html. [Accessed 22 March 2017].

[12] E. Frenkel, "Articles: Slate.com," Slate.com, 3 June 2013. [Online]. Available: http://www.slate.com/articles/health_and_science/science/2013/06/online_credit_card_security_the_rsa_algorithm_prime_numbers_and_pierre_fermat.html. [Accessed 20 March 2017].

[13] S. Simpson, "www.laits.utexas.edu," University of Texas, 24 March 1997. [Online]. Available: http://www.laits.utexas.edu/~anorman/BUS.FOR/course.mat/SSim/algorithms.html. [Accessed 2017].

[14] S. Simpson, "www.laits.utexas.edu," The University of Texas, 1997. [Online]. Available: http://www.laits.utexas.edu/~anorman/BUS.FOR/course.mat/SSim/life.html. [Accessed 23 March 2017].

[15] C. Bradford, "Blog: StorageCraft.com," StorageCraft Technology Corporation, [Online]. Available: https://www.storagecraft.com/blog/5-common-encryption-algorithms/. [Accessed 23 March 2017].

[16] B. Darrow, "PointCloud: Fortune.com," 1 February 2017. [Online]. Available: http://fortune.com/2017/01/31/google-g-suite/. [Accessed 20 March 2017].

[17] E. Mendelson, "Review: PCMag.com," Ziff Davis, LLC. PCMag Digital Group, 28 February 2017. [Online]. Available: http://www.pcmag.com/review/352023/google-g-suite. [Accessed 20 March 2017].

[18] P. Higgins, "Deeplinks Blog: Electronic Frontier Foundation," Electronic Frontier Foundation, 28 August 2013. [Online]. Available: https://www.eff.org/deeplinks/2013/08/pushing-perfect-forward-secrecy-important-web-privacy-protection. [Accessed 23 March 2017].

[19] Google, "Help: Support.Google.com," Google, 2017. [Online]. Available: https://support.google.com/work/answer/6056693?hl=en&ref_topic=6055719. [Accessed 23 March 2017].

[20] M. Rouse, "Network Security: Searchsecurity.techtarget.com," Searchsecurity.techtarget.com, November 2014. [Online]. Available: http://searchsecurity.techtarget.com/definition/RSA. [Accessed 19 March 2017].

[21] S. McHenry, " Blogs: Security.googleblog.com," Google, 23 May 2013. [Online]. Available: https://security.googleblog.com/2013/05/changes-to-our-ssl-certificates.html. [Accessed 23 March 2017].

[22] Maxim Integrated Products, "Tutorials: Maximintegrated.com," Maxim Integrated Products, 25 May 2012. [Online]. Available: https://www.maximintegrated.com/en/app-notes/index.mvp/id/5421. [Accessed 24 March 2017].

[23] Gemalto, "Updates: Gemalto.com," Gemalto, 2016. [Online]. Available: http://data-protection-updates.gemalto.com/files/2017/04/IDPrime3811_Plug_and_Play_Smart_Cards_PB_EN_v2_SEP082016_web.pdf. [Accessed 24 March 2017].

[24] Smartjac Industries, "Index: Smartjac.biz," Smartjac Industries, [Online]. Available: http://www.smartjac.biz/index.php/component/eshop/identity-access-products/smart-cards/gemalto-idprime/idprime-piv-card-v1-55-128k-v2,-tri-interface-legacy-name-protiva-piv-card-v1-55-on-top-wl?Itemid=0. [Accessed 24 March 2017].

[25] V. Beal, "Term: Webopedia.com," QuinStreet Enterprise, [Online]. Available: http://www.webopedia.com/TERM/R/rsa_secure_id.html. [Accessed 24 March 2017].

[26] M. Arora, "Design: Embedded.com," AspenCore, 9 November 2011. [Online]. Available:http://www.embedded.com/design/safety-and-security/4230483/Understanding-the-security-framework-behind-RSA-SecurID. [Accessed 24 March 2017].

[27] S. D. Schoen, "www.loyalty.org," Loyalty.org, [Online]. Available: http://www.loyalty.org/~schoen/rsa/. [Accessed 22 March 2017].

[28] Wikipedia, "Wikipedia," Wikipedia, 29 March 2017. [Online]. Available: https://en.wikipedia.org/wiki/RSA_numbers. [Accessed 1 April 2017].

[29] Information Technology Laboratory, "Digital Signature Standard (DSS)," National Institute of Standards and Technology, Gaithersburg, 2013.

[30] T. Leek, "Questions: Security Stack Exchange.com," Stack Exchange Inc, 24 January 2014. [Online]. Available: https://security.stackexchange.com/questions/49280/cryptography-behind-chip-based-credit-cards-smart-cards. [Accessed 24 March 2017].

[31] S. Jessel, "World: News.bbc.co.uk," BBC, 25 February 2000. [Online]. Available: http://news.bbc.co.uk/2/hi/europe/657135.stm. [Accessed 24 March 2017].

[32] D. Genkin, A. Shamir and E. Tromer, "RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis," in Advances in Cryptology CRYPTO 2014, Santa Barbara, 2014.

[33] J. V, "Blog: Jscape.com," JSCAPE LLC, 2 August 2014. [Online]. Available: http://www.jscape.com/blog/bid/82975/Which-Works-Best-for-Encrypted-File-Transfers-RSA-or-DSA. [Accessed 24 March 2017].

[34] S. Kemp, "Blog: We Are Social Ltd.," We Are Social Ltd, 24 January 2017. [Online]. Available: https://wearesocial.com/blog/2017/01/digital-in-2017-global-overview. [Accessed 25 March 2017].

[35] Phys.org, "News: Phys.org," Phys.org, 27 February 2017. [Online]. Available: https://phys.org/news/2017-02-bn-mobile-users.html. [Accessed 24 March 2017].

[36] J. Buntinx, "News: The Merkle," 16 Februray 2017. [Online]. Available: https://themerkle.com/ai-and-quantum-computing-pose-no-threat-to-cryptography-experts-say/. [Accessed 25 March 2017].

[37] J. Young, "News: Themerkle.com," The Merkle, 17 January 2017. [Online]. Available: https://themerkle.com/irish-teen-introduces-new-encryption-system-resistant-to-quantum-computers/. [Accessed 24 March 2917].

[38] D. Gilbert, "Technology: Iibtimes.co.uk," IBTimes Co., Ltd. , 25 January 2017. [Online]. Available: http://www.ibtimes.co.uk/unbreakable-encryption-technology-created-by-16-year-old-schoolboy-1603024. [Accessed 24 March 2017].