scispace - formally typeset
Journal ArticleDOI

Survey and analysis of security issues on RSA algorithm for digital video data

Kunal Gagneja, +1 more
- 18 May 2016 - 
- Vol. 19, Iss: 1, pp 39-55
TLDR
RSA combined with new design of padding gets security advantages of both block and stream ciphers, thus it does not create overhead in performance and challenges in handling and distribution of integers.
Abstract
RSA is an encryption algorithm which is used for remote login session, credit card payment systems, transport layer security, secure socket layer, pretty good privacy and email security Optimal asymmetric encryption padding is used in RSA to avoid chosen-ciphertext attack, coppersmith attack and chosen-plaintext attack However, encryption in context of high definition video files shows repetitions of parts of ciphertext which can lead to frequency analysis attack Key length and padding which are used in attack are according to National Institute of Standards and Technology and public key cryptography standards respectively Security issues in RSA padding are analysed and experimental results are used in removal of defects New architecture also prevents adaptive-chosen ciphertext attack Integers which are generated by protocol in PKCS padding are used in new design, thus it does not create overhead in performance and challenges in handling and distribution of integers Two XOR operations are r

read more

Citations
More filters
Journal ArticleDOI

Book review: Applied cryptography: Protocols, algorithms, and source code in C

TL;DR: This is Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptographic Protocols algorithms and Source Code in C By Schneier Bruce Author Nov 01 1995 the best ebook that you can get right now online.
Journal ArticleDOI

Forty years of attacks on the RSA cryptosystem: A brief survey

TL;DR: A comprehensive survey of known attacks on RSA cryptosystem shows that a well implemented algorithm is unbreakable and it survived against a number of cryptanalytic attacks since last forty years.
Journal ArticleDOI

DAD-match; Security technique to prevent denial of service attack on duplicate address detection process in IPv6 link-local network.

TL;DR: The obtained experimental results demonstrated that the DAD-match security technique achieved less processing time compared with the existing mechanisms as it can resist a range of different threats like collision and brute-force attacks.
Journal ArticleDOI

A novel accelerated implementation of RSA using parallel processing

TL;DR: A parallel scheme for RSA is proposed using a new parallel data structure known as Concurrent Indexed List of character blocks that got easily integrated with any external library and thus can be adopted by any other algorithmic scheme.
Journal ArticleDOI

Detection and Defense Mechanisms on Duplicate Address Detection Process in IPv6 Link-Local Network: A Survey on Limitations and Requirements

TL;DR: The strengths and weaknesses of each mechanism to Secure-DAD process are discussed from the perspective of implementation and processing time and challenges and future directions are presented along with feature requirements for the new security mechanism to secure DAD procedure in an IPv6 link-local network.
References
More filters
Book ChapterDOI

Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1

TL;DR: A new adaptive chosen ciphertext attack against certain protocols based on RSA is introduced if the attacker has access to an oracle that returns only one bit telling whether the ciphertext corresponds to some unknown block of data encrypted using PKCS #1.0.
Journal Article

Twenty years of attacks on the rsa cryptosystem

TL;DR: A simplified version of RSA encryption is described and a malicious attacker wishing to eavesdrop or tamper with the communication between Alice and Bob is used, to illustrate the dangers of improper use of RSA.
Journal ArticleDOI

Fast decipherment algorithm for RSA public-key cryptosystem

TL;DR: A fast algorithm is presented for deciphering cryptograms involved in the public-key cryptosystem proposed by Rivest, Shamir and Adleman, based on the Chinese remainder theorem and on improved modular multiplication algorithms.
Journal ArticleDOI

A new substitution–diffusion based image cipher using chaotic standard and logistic maps

TL;DR: Results of the various types of analysis suggest that the proposed image encryption technique is able to manage the trade offs between the security and speed and hence suitable for the real-time secure image and video communication applications.
Book ChapterDOI

RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis

TL;DR: A new acoustic cryptanalysis attack is described which can extract full 4096-bit RSA keys from the popular GnuPG software, within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts.
Related Papers (5)