Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

A Survey and Performance Analysis of Various RSA based Encryption Techniques

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 114 - Number 7
Year of Publication: 2015
Authors:
Sarika Khatarkar
Rachana Kamble
10.5120/19993-1736

Sarika Khatarkar and Rachana Kamble. Article: A Survey and Performance Analysis of Various RSA based Encryption Techniques. International Journal of Computer Applications 114(7):30-33, March 2015. Full text available. BibTeX

@article{key:article,
	author = {Sarika Khatarkar and Rachana Kamble},
	title = {Article: A Survey and Performance Analysis of Various RSA based Encryption Techniques},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {114},
	number = {7},
	pages = {30-33},
	month = {March},
	note = {Full text available}
}

Abstract

Network and Internet applications are growing very fast, since the need to secure these applications are very fast. So the importance and the value of the swapped data by the internet and other media types are increasing. The protection of multimedia data, sensitive information like credit cards, banking transactions and social security numbers is becoming very important. For secure transmission of data in open network, encryption is very important methodology. In recent years many encryption methods have been proposed and used to protect confidential information. In this survey paper many different asymmetric cryptography techniques, like RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm) are analyzed. Also discussed many other efficient algorithms.

References

  • Amare Anagaw Ayele, Dr. Vuda Sreenivasarao, June 2013, "A Modified RSA Encryption Technique Based on Multiple public keys", International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 4.
  • Liang Wang, Yonggui Zhang, 2011, "A New Personal Information Protection Approach Based on RSA Cryptography", IEEE.
  • Ammar Odeh, Khaled Elleithy, Muneer Alshowkan, Eman Abdelfattah, 2013, "Quantum Key Distribution by Using Public Key Algorithm(RSA)", IEEE.
  • Norhidayah Muhammadi, Jasni Mohamad Zaini, Md Yazid Mohd Saman, "Loop-based RSA Key Generation Algorithm using String Identity", 13th International Conference on Control, Automation and Systems (ICCAS 2013).
  • Ms. Ritu Patidar, Mrs. Rupali Bhartiya, 2013, "Modified RSA Cryptosystem Based on Offline Storage and Prime Number", IEEE.
  • Malek Jakob Kakish, "Enhancing The Security Of The Rsa Cryptosystem", Ijrras August 2011.
  • KetuFile White Papers "Symmetric vs. Asymmetric Encryption ", a division of Midwest research corporation.
  • RSA Laboratories : Technical Notes and Papers.
  • A fast implementation of the RSA algorithm using the GNU MP library. By Rajorshi Biswas,Shibdas Bandyopadhyay,Anirban Banerjee, IIIT – Calcutta.
  • Sensitivity of Changing the RSA Parameters on the Complexity and Performance of the Algorithm By Allam Mousa ;Journal of Applied Science 5 (1) :60-63,2005 ISSN 1607 – 8926. Asian Network for Scientific Information.

Keywords