Research trends review on RSA scheme of asymmetric cryptography techniques

One of the cryptography classifications is asymmetric cryptography, which uses two different keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of asymmetric cryptography techniques. It is trying to present the domains of RSA scheme used including in public network, wireless sensor network, image encryption, cloud computing, proxy signature, Internet of Things and embedded device, based on the perspective of researchers’ effort in the last decade. Other than that, this paper reviewed the trends and the performance metrics of RSA scheme such as security, speed, efficiency, computational complexity and space based on the number of researches done. Finally, the technique and strengths of the proposed scheme are also stated in this paper.

[1]  Gaurav Sharma,et al.  An Improved RSA-based Certificateless Signature Scheme for Wireless Sensor Networks , 2016, Int. J. Netw. Secur..

[2]  Iuon-Chang Lin,et al.  An RSA-Like Scheme for Multiuser Broadcast Authentication in Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.

[3]  Nedal Tahat,et al.  A new RSA public key encryption scheme with chaotic maps , 2020 .

[4]  Shahnawaz Hussain,et al.  Evaluation of DES, TDES, AES, Blowfish and Twofish Encryption Algorithm: Based on Space Complexity , 2014 .

[5]  Willy Susilo,et al.  A short identity-based proxy ring signature scheme from RSA , 2015, Comput. Stand. Interfaces.

[6]  Long Wang,et al.  A cost-Efficient Implementation of Public-key Cryptography on Embedded Systems , 2007, 2007 International Workshop on Electron Devices and Semiconductor Technology (EDST).

[7]  Edwin R. Arboleda,et al.  Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Scheduling , 2017 .

[8]  V. Vaidehi,et al.  Energy Analysis of RSA and ELGAMAL Algorithms for Wireless Sensor Networks , 2010, CNSA.

[9]  Lunzhi Deng,et al.  Identity Based Proxy Signature from RSA without Pairings , 2017, Int. J. Netw. Secur..

[10]  Abdulameer K. Hussain A Modified RSA Algorithm for Security Enhancement and Redundant Messages Elimination Using K-Nearest Neighbor Algorithm , 2015 .

[11]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[12]  Lirong Qiu,et al.  Implementing RSA for sensor nodes in smart cities , 2017, Personal and Ubiquitous Computing.

[13]  Raman Kumar,et al.  An advanced secure (t, n) threshold proxy signature scheme based on RSA cryptosystem for known signers , 2010, 2010 IEEE 2nd International Advance Computing Conference (IACC).

[14]  Wei Wei,et al.  RSA-based digital image encryption algorithm in wireless sensor networks , 2010, 2010 2nd International Conference on Signal Processing Systems.

[15]  P. Varalakshmi,et al.  An Enhanced and Secured RSA Key Generation Scheme (ESRKGS) , 2015, J. Inf. Secur. Appl..

[16]  Hayder Raheem Hashim A New Modification of RSA Cryptosystem Based on The Number of The Private Keys , 2016 .

[17]  Ali Saleh Al Najjar Implementation Color-Images Cryptography Using RSA Algorithm , 2017 .

[18]  H. Hashim,et al.  A New Approach for Image Encryption in the Modified RSA Cryptosystem Using MATLAB , 2016 .

[19]  Liang Wang,et al.  A new personal information protection approach based on RSA cryptography , 2011, 2011 IEEE International Symposium on IT in Medicine and Education.

[20]  Ueli Maurer,et al.  Breaking RSA Generically Is Equivalent to Factoring , 2009, IEEE Transactions on Information Theory.

[21]  Teddy Mantoro,et al.  Comparison between RSA hardware and software implementation for WSNs security schemes , 2010, Proceeding of the 3rd International Conference on Information and Communication Technology for the Moslem World (ICT4M) 2010.

[22]  Alaa Hussein Al-Hamami,et al.  Enhanced Method for RSA Cryptosystem Algorithm , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).

[23]  Sudipta Chattopadhyay,et al.  A hybrid security algorithm for RSA cryptosystem , 2017, 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS).

[24]  Justin Wyss-Gallifent The ElGamal Cryptosystem , 2012 .

[25]  Rakesh Kumar,et al.  An RSA based certificateless signature scheme for wireless sensor networks , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).

[26]  S. Anandakumar Image Cryptography Using RSA Algorithm in Network Security , 2015 .

[27]  Xin Zhou,et al.  Research and implementation of RSA algorithm for encryption and decryption , 2011, Proceedings of 2011 6th International Forum on Strategic Technology.

[28]  D. Saraswady,et al.  Estimation of Modified RSA Cryptosystem with Hyper Image Encryption Algorithm , 2017 .

[29]  Sunil Kumar Khatri,et al.  NFC Car Keys By Using RSA Cryptography In WSN Security , 2019, 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA).

[30]  Chandrashekhar Meshram,et al.  Discrete Logarithm and Integer Factorization using ID-based Encryption , 2015 .

[31]  Huirong Fu,et al.  Multi-asymmetric cryptographic RSA scheme , 2017, CISRC.

[32]  Ahmed Eskander Mezher Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys , 2018 .

[33]  Durai Raj Vincent,et al.  An algorithm to enhance security in RSA , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[34]  Alaa Kadhim Farhan,et al.  Security Improve in ZigBee Protocol Based on RSA Public Algorithm in WSN , 2019, Engineering and Technology Journal.

[35]  Selçuk Baktir,et al.  Implementing RSA for Wireless Sensor Nodes , 2019, Sensors.

[36]  Shihab A. Shawkat,et al.  Modified RSA-based algorithm: a double secure approach , 2019 .