Security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. RSA algorithm is extensively used in the popular implementations of Public Key Infrastructures. In asymmetric key cryptography, also called Public Key cryptography, two different keys (which form a key pair) are used. One key is used for encryption and only the other corresponding key must be used for decryption. No other key can decrypt the message - not even the original (i.e. the first) key used for encryption. In this paper, we have proposed an improved approach of RSA algorithm using two public key pairs and using some mathematical logic rather than sending one public key d irectly.Because if an attacker has an opportunity of getting the public key componet they can find private key value by brute force search. General Terms: Cryptography, network security
[1]
Giuseppe Di Battista,et al.
26 Computer Networks
,
2004
.
[2]
Sonal Sharma,et al.
Modified RSA Public Key Cryptosystem Using Short Range Natural Number Algorithm
,
2012
.
[3]
Prasant Singh Yadav,et al.
IMPLEMENTATION OF RSA ALGORITHM USING ELLIPTIC CURVE ALGORITHM FOR SECURITY AND PERFORMANCE ENHANCEMENT
,
2012
.
[4]
Behrouz A. Forouzan.
Cryptography & Network Security
,
2007
.
[5]
B. Ambedkar,et al.
A New Factorization Method to Factorize RSA Public Key Encryption
,
2011
.
[6]
Xin-She Yang,et al.
Introduction to Algorithms
,
2021,
Nature-Inspired Optimization Algorithms.
[7]
S. Arumugam,et al.
STUDY ON IMPROVEMENT IN RSA ALGORITHM AND ITS IMPLEMENTATION
,
2012
.