Optimised Key Generation for RSA Encryption

HENRY CHIMA UKWUOMA, M.B. HAMMAWA

Abstract


In today’s world, cryptography has become a necessity for all organizations. Data security is an essential component of an organization in order to keep the information safe from various competitors. It also aids to ensure data confidentiality, integrity and secure communication channel.   RSA being a cryptosystem is used to secure data both in organizations and in the cloud. Hence, the need for enhanced security of data stored or in transit.

Data that is stored in the cloud or in transit has frequently been attacked by hackers who use them for fraudulent purposes and as such most individuals or organizations become victims of these activities.  In this research, various encryption algorithms have been studied. Literature survey has been carried out by incorporating key papers related to data encryption. RSA is critically analysed and key generation has also been optimized. Simulation results have been accomplished using MATLAB r2014b; results prove that the proposed algorithm is optimized compared to RSA in terms of hacking although, RSA seems to have a better processing time than the proposed algorithm. Finally, summary, conclusion, recommendation and future work has also been stated at the end of this research.

Keywords: RSA cryptosystem, prime numbers, RSA Problem, Public Key Cryptosystems, Private Key Cryptography, Crypto Analysis, Finite Fields, Quantum Computers.


Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.

Paper submission email: ISDE@iiste.org

ISSN (Paper)2222-1727 ISSN (Online)2222-2871

1Please add our address "contact@iiste.org" into your email contact list.

This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.

Copyright © www.iiste.org