scispace - formally typeset
Journal ArticleDOI

Dual RSA and Its Security Analysis

Reads0
Chats0
TLDR
New variants of an RSA whose key generation algorithms output two distinct RSA key pairs having the same public and private exponents, called dual RSA, can be used in scenarios that require two instances of RSA with the advantage of reducing the storage requirements for the keys.
Abstract
We present new variants of an RSA whose key generation algorithms output two distinct RSA key pairs having the same public and private exponents. This family of variants, called dual RSA, can be used in scenarios that require two instances of RSA with the advantage of reducing the storage requirements for the keys. Two applications for dual RSA, blind signatures and authentication/secrecy, are proposed. In addition, we also provide the security analysis of dual RSA. Compared to normal RSA, the security boundary should be raised when applying dual RSA to the types of small-d, small-e, and rebalanced-RSA.

read more

Citations
More filters
Proceedings ArticleDOI

A Survey on current key issues and status in cryptography

TL;DR: In this research work various encryption (symmetric and asymmetric) algorithms have been studied and key papers related to data encryption based on performance metrics (Security and Time constraints) have been incorporated.
Journal ArticleDOI

Cryptanalysis of Dual RSA

TL;DR: An improved analysis on Dual RSA is given and it is obtained that when the private exponent is smaller than N0.368, the Dual RSA can be broken, where N is an integer with the same bitlength as the modulus of Dual RSA.
Proceedings ArticleDOI

Security for wireless sensor networks in military operations

TL;DR: This paper is proposing pre key distribution scheme for public key cryptography in military communication by establishing secure key arrangement between set of nodes in sensor network to improve performance in term of memory usage, resource consumption, resiliency against node capturing, scalability, resistant against node replication and security in information sharing.

A New Factorization Method to Factorize RSA Public Key Encryption

B R Ambedkar, +1 more
TL;DR: The proposed work focuses on factorization of all trivial and nontrivial integer numbers and requires fewer steps for factorization process of RSA modulus N, which is based on Pollard rho factorization method.
Journal ArticleDOI

A Novel Turbo-Based Encryption Scheme Using Dynamic Puncture Mechanism

TL;DR: A normal random sequence is generated that controls the puncturing mechanism by a secret key in the Turbo encoder, which ensures a high error correction capability for the Turbo code.
References
More filters
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI

Untraceable electronic mail, return addresses, and digital pseudonyms

TL;DR: A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system.
Journal ArticleDOI

Factoring Polynomials with Rational Coefficients

TL;DR: This paper presents a polynomial-time algorithm to solve the following problem: given a non-zeroPolynomial fe Q(X) in one variable with rational coefficients, find the decomposition of f into irreducible factors in Q (X).