In the today‟s world, security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks.RSA algorithm is extensively used in the popular implementations of Public Key Infrastructures. In asymmetric key cryptography, also called Public Key cryptography, two different keys (which form a key pair) are used. One key is used for encryption & only the other corresponding key must be used for decryption. No other key can decrypt the message – not even the original (i.e. the first) key used for encryption. The beauty of this scheme is that every communicating party needs just a key pair for communicating with any number of other communicating parties. Once someone obtains a key pair, he /she can communicate with anyone else. In this paper, we have done an efficient implementation of RSA algorithm using two public key pairs and using some mathematical logic rather than sending the e value directly as a public key.Because if an attacker has opportunity of getting the e value they can directly find d value and decrypt the message.
[1]
Hugo Krawczyk,et al.
RSA-Based Undeniable Signatures
,
1997,
Journal of Cryptology.
[2]
Matthew K. Franklin,et al.
Efficient generation of shared RSA keys
,
2001,
JACM.
[3]
염흥렬,et al.
[서평]「Applied Cryptography」
,
1997
.
[4]
Hugo Krawczyk,et al.
Robust and Efficient Sharing of RSA Functions
,
2000,
Journal of Cryptology.
[5]
Ronald Cramer,et al.
Signature schemes based on the strong RSA assumption
,
2000,
TSEC.
[6]
Adi Shamir,et al.
A method for obtaining digital signatures and public-key cryptosystems
,
1978,
CACM.
[7]
Sonal Sharma,et al.
Modified RSA Public Key Cryptosystem Using Short Range Natural Number Algorithm
,
2012
.
[8]
J. P. Raina,et al.
Comparative Analysis of AES and RC4 Algorithms for Better Utilization
,
2011
.
[9]
Gag,et al.
Cryptography and its two ImplementationApproaches
,
2013
.
[10]
Priti V. Bhagat,et al.
Reverse Encryption Algorithm: A Technique for Encryption & Decryption
,
2013
.
[11]
Michael J. Wiener,et al.
Cryptanalysis of Short RSA Secret Exponents (Abstract)
,
1990,
EUROCRYPT.