scispace - formally typeset
Proceedings ArticleDOI

A Public Key Cryptosystem based on number theory

Ashish Agarwala, +1 more
- pp 238-241
Reads0
Chats0
TLDR
This paper describes a public-key cryptosystem based on first version of Euler's Theorem, which exploits the features of computationally hard problems, namely integer factorization, discrete logarithmic problem to name a few.
Abstract
Public Key Cryptosystem came into existence after 1975. Since then a large number of research has been conducted in this area. It is based on number theory and exploits the features of computationally hard problems, namely integer factorization, discrete logarithmic problem to name a few. In this paper we describe a public-key cryptosystem. The basis of the design is derived from first version of Euler's Theorem. Apart from exponentiation and residue to a modulus, it is also based on some base and remainder. The remainder plays a crucial role on the selection of the exponents. The base is used to generate the residue to a modulus. Both the base and the remainder make cryptanalysis tough.

read more

Citations
More filters
Journal ArticleDOI

Enhanced DNA and ElGamal cryptosystem for secure data storage and retrieval in cloud

TL;DR: A novel variant of DNA cryptosystem is proposed to secure the original data within the DNA nucleotides providing greater storage space, reduced overhead and dynamic operations, and embarks upon a standardized algorithmic approach among the existing DNA cryptographic methodologies.
Proceedings ArticleDOI

Image encryption and decryption in public key cryptography based on MR

TL;DR: A new image encryption algorithm based on Magic Rectangle (MR) that can successfully encrypt/decrypt the images with separate secret keys, and the algorithm has good encryption effect.
Proceedings ArticleDOI

Enhancing Security Level for Public Key Cryptosystem Using MRGA

TL;DR: The proposed work introduces one more level of security in public key algorithms such as RSA, ElGAMAL etc. to enhance the security and overcome the weakness of public key cryptosystem.
Journal ArticleDOI

Add-on Security Level for Public Key Cryptosystem using Magic Rectangle with Column/Row Shifting

TL;DR: The proposed work introduces additional level of security in public key algorithms such as RSA, ECC and Rabin, Elgamal etc. to rectify the existing issues of public key cryptosystem.
Proceedings ArticleDOI

Mathematical Model of the Process of Tabular’s Implementation of the Operation Algebraic Multiplication in the Residues Class

TL;DR: A mathematical model of the process of tabular implementation of modular multiplication, for both positive and negative numerical ranges of means of processing integer information, is synthesized.
References
More filters
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Book

Elementary Number Theory with Applications

Thomas Koshy
TL;DR: Theoretical Divisibility theory of linear decompositions of Diophantine Equations and Congruences has been studied in the context of odd-numbered exercises.
Related Papers (5)