2017 3rd International Conference on Computational Intelligence &Amp; Communication Technology (CICT) 2017
DOI: 10.1109/ciact.2017.7977330
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and design of enhanced RSA algorithm to improve the security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 4 publications
0
13
0
Order By: Relevance
“…Panda and Chattopadhyay found out that RSA algorithm was easy to factorize since modulo n used is the product of two prime numbers only and therefore making it easy to obtain the decrypted original message [5]. Other researchers who pinpointed several limitations in regard to RSA algorithm included Mathur et al [6] who delved in to improving the model by enhancing security and elimination of redundant messages using K-nearest neighbor algorithm.…”
Section: Rsa Algorithm Limitationsmentioning
confidence: 99%
See 2 more Smart Citations
“…Panda and Chattopadhyay found out that RSA algorithm was easy to factorize since modulo n used is the product of two prime numbers only and therefore making it easy to obtain the decrypted original message [5]. Other researchers who pinpointed several limitations in regard to RSA algorithm included Mathur et al [6] who delved in to improving the model by enhancing security and elimination of redundant messages using K-nearest neighbor algorithm.…”
Section: Rsa Algorithm Limitationsmentioning
confidence: 99%
“…The following figure shows the mechanism of fetching the values from/to the data base. Although this proposal increases the speed of encryption and decryption of the message, the concept of using a database for storing keys is still critical, since keys can be retrieved easily if the system is hacked [6].…”
Section: Modified Rsa Cryptosystem Based On Offline Storage and Primementioning
confidence: 99%
See 1 more Smart Citation
“…In the same year [22] broke down that Cryptographic natives were vital building hinders for outlining security conventions to obtain classification, verification, uprightness and non-denial. In 2017 [23] recommended that Cryptography was a way to deal with secure data from gatecrashers. It gave guarantee, as well as gave credibility.…”
Section: Related Workmentioning
confidence: 99%
“…And even with advancements in hardware technology, data security has remained to be a challenge [3] such that new and innovative security systems continue to be a priority [4].…”
Section: Introductionmentioning
confidence: 99%