Journal ArticleDOI
Dual RSA and Its Security Analysis
Reads0
Chats0
TLDR
New variants of an RSA whose key generation algorithms output two distinct RSA key pairs having the same public and private exponents, called dual RSA, can be used in scenarios that require two instances of RSA with the advantage of reducing the storage requirements for the keys.Abstract:
We present new variants of an RSA whose key generation algorithms output two distinct RSA key pairs having the same public and private exponents. This family of variants, called dual RSA, can be used in scenarios that require two instances of RSA with the advantage of reducing the storage requirements for the keys. Two applications for dual RSA, blind signatures and authentication/secrecy, are proposed. In addition, we also provide the security analysis of dual RSA. Compared to normal RSA, the security boundary should be raised when applying dual RSA to the types of small-d, small-e, and rebalanced-RSA.read more
Citations
More filters
Proceedings ArticleDOI
A Survey on current key issues and status in cryptography
TL;DR: In this research work various encryption (symmetric and asymmetric) algorithms have been studied and key papers related to data encryption based on performance metrics (Security and Time constraints) have been incorporated.
Journal ArticleDOI
Cryptanalysis of Dual RSA
TL;DR: An improved analysis on Dual RSA is given and it is obtained that when the private exponent is smaller than N0.368, the Dual RSA can be broken, where N is an integer with the same bitlength as the modulus of Dual RSA.
Proceedings ArticleDOI
Security for wireless sensor networks in military operations
TL;DR: This paper is proposing pre key distribution scheme for public key cryptography in military communication by establishing secure key arrangement between set of nodes in sensor network to improve performance in term of memory usage, resource consumption, resiliency against node capturing, scalability, resistant against node replication and security in information sharing.
A New Factorization Method to Factorize RSA Public Key Encryption
B R Ambedkar,S S Bedi +1 more
TL;DR: The proposed work focuses on factorization of all trivial and nontrivial integer numbers and requires fewer steps for factorization process of RSA modulus N, which is based on Pollard rho factorization method.
Journal ArticleDOI
A Novel Turbo-Based Encryption Scheme Using Dynamic Puncture Mechanism
TL;DR: A normal random sequence is generated that controls the puncturing mechanism by a secret key in the Turbo encoder, which ensures a high error correction capability for the Turbo code.
References
More filters
Journal ArticleDOI
A method for obtaining digital signatures and public-key cryptosystems
TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI
Untraceable electronic mail, return addresses, and digital pseudonyms
TL;DR: A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system.
Journal ArticleDOI
Factoring Polynomials with Rational Coefficients
TL;DR: This paper presents a polynomial-time algorithm to solve the following problem: given a non-zeroPolynomial fe Q(X) in one variable with rational coefficients, find the decomposition of f into irreducible factors in Q (X).