scispace - formally typeset
Proceedings ArticleDOI

Modified RSA Encryption Algorithm (MREA)

Reads0
Chats0
TLDR
This scheme presents a new cryptography algorithm based on additive homomorphic properties called Modified RSA Encryption Algorithm (MREA), which is secure as compared to RSA as it is based on the factoring problem as well as decisional composite residuosity assumptions which is the intractability hypothesis.
Abstract
In asymmetric key cryptography, also called Public Key cryptography, two different keys (which forms a key pair) are used. One key is used for encryption & only the other corresponding key must be used for decryption. No other key can decrypt the message, not even the original (i.e. the first) key used for encryption. The beauty of this scheme is that every communicating party needs just a key pair for communicating with any number of other communicating parties. Once some one obtains a key pair, he /she can communicate with any one else. RSA is a well known public-key cryptography algorithm. It is the first algorithm known to be suitable for signing as well as encryption, and was one of the first great advances in public key cryptography. The security of the RSA cryptosystem is based on two mathematical problems: the problem of factoring large numbers know mathematical attack and the problem of trying all possible private keys know brute force attack. So to improve the security, this scheme presents a new cryptography algorithm based on additive homomorphic properties called Modified RSA Encryption Algorithm (MREA). MREA is secure as compared to RSA as it is based on the factoring problem as well as decisional composite residuosity assumptions which is the intractability hypothesis. The scheme is an additive homomorphic cryptosystem, this means that, given only the public-key and the encryption of m1 and m2, one can compute the encryption of m1 + m2. This scheme also presents comparison between RSA and MREA cryptosystems in terms of security and performance.

read more

Citations
More filters
Proceedings ArticleDOI

Pell's RSA key generation and its security analysis

TL;DR: Pell's RSA key generation and its security analyses over the standard RSA, N Prime RSA, Dual RSA, and the application of Pell's RSA, Blind signatures, are proposed.
Proceedings ArticleDOI

Memory efficient multi key (MEMK) generation scheme for secure transportation of sensitive data over cloud and IoT devices

TL;DR: A new variant of RSA has been proposed called Memory Efficient Multi Key (MEMK) generation scheme, which reuses the RSA scheme with a Diophantine form of the nonlinear equation for memory efficiency and performs well.
Proceedings ArticleDOI

Modified RSA cryptosystem based on offline storage and prime number

TL;DR: A new algorithm concept is suggested to presents the modified form of RSA algorithm in order to speed up the implementation of RSAgorithm during data exchange across the network through the use of third prime number.
Proceedings ArticleDOI

An algorithm to enhance security in RSA

TL;DR: This paper proposes a secure algorithm that tries to eliminate the distribution of n which is the large number whose factors if found compromises the RSA algorithm.
Proceedings ArticleDOI

A comparative study of applying real-time encryption in cloud computing environments

TL;DR: E-RSA in the most appropriate algorithm for using in client-based data encryption service by achieving acceleration, accuracy, and security in this service based on compatibility issues in a client side service.
References
More filters
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Journal ArticleDOI

Hiding information and signatures in trapdoor knapsacks

TL;DR: Specific instances of the knapsack problem that appear very difficult to solve unless one possesses "trapdoor information" used in the design of the problem are demonstrated.
Journal ArticleDOI

A polynomial-time algorithm for breaking the basic Merkle - Hellman cryptosystem

TL;DR: This paper shows that the basic variant of the Merkle-Hellman cryptosystem, in which the elements of the public key are modular multiples of a superincreasing sequence, is breakable in polynomial time.
Proceedings Article

A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem.

TL;DR: The Merkle-Hellman cryptosystem was shown to be breakable in polynomial time in this paper, in which the elements of the public key are modular multiples of a superincreasing sequence.