An Enhanced and Secured RSA Public Key Cryptosystem Algorithm Using Chinese Remainder Theorem

The public key cryptosystems are mainly used to provide two cryptographic services called confidentiality and authentication. The RSA is one well known and widely used public key cryptosystem that uses two large and distinct integers to generate the keys. In this paper, we proposed an enhanced and secured RSA public key cryptosystem (ESRPKC) algorithm using Chinese remainder theorem. To increase the complexity of the system the proposed ESRPKC uses four prime numbers instead of two primes to generate the public/private key pairs. To generate the public/private key pairs, the proposed ESRPKC uses similar method as that of traditional RSA. In order to enhance the security level, the encryption and decryption functions are modified in proposed ESRPKC. The encryption function uses one extra key parameter called encryption key which is generated by using Chinese remainder theorem. The decryption function also uses one extra parameter to decrypt the message. The complexity of encryption and decryption functions is also acceptable. The proposed algorithm requires only one extra multiplication to perform encryption and decryption operations as compare to traditional RSA cryptosystem. The proposed scheme is highly secured because the encryption and decryption functions uses one extra key parameter and are not only dependent on the public and private key pairs respectively. The security and performance analysis ensures that the proposed ESRPKC algorithm is highly secure and efficient as compare to existing schemes.

[1]  Chung-Hsien Wu,et al.  RSA cryptosystem design based on the Chinese remainder theorem , 2001, Proceedings of the ASP-DAC 2001. Asia and South Pacific Design Automation Conference 2001 (Cat. No.01EX455).

[2]  Prashant Sharma,et al.  RSA algorithm using modified subset sum cryptosystem , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).

[3]  Alaa Hussein Al-Hamami,et al.  Enhanced Method for RSA Cryptosystem Algorithm , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).

[4]  Durai Raj Vincent,et al.  An algorithm to enhance security in RSA , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[5]  Srushti Mathur,et al.  Modified RSA Algorithm: A Secure Approach , 2011, 2011 International Conference on Computational Intelligence and Communication Networks.

[6]  Michael J. Wiener,et al.  Cryptanalysis of Short RSA Secret Exponents (Abstract) , 1990, EUROCRYPT.

[7]  William Stallings,et al.  Cryptography and network security , 1998 .

[8]  P. Varalakshmi,et al.  An Enhanced and Secured RSA Key Generation Scheme (ESRKGS) , 2015, J. Inf. Secur. Appl..

[9]  Hamza Ali,et al.  Timing Attack Prospect for RSA Cryptanalysts Using Genetic Algorithm Technique , 2004, Int. Arab J. Inf. Technol..

[10]  R. Vijayaragavan,et al.  Pell's RSA key generation and its security analysis , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[11]  Sachin Mahajan,et al.  Performance Evolution of RSA and New Cryptosystem , 2012 .

[12]  Johannes Blömer,et al.  A Generalized Wiener Attack on RSA , 2004, Public Key Cryptography.

[13]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.