1 Affiliation : Information Technology Bharati Vidyapeeth's College of Engg, New Delhi, India
Email : kaur.surinder@bharatividyapeeth.edu
2 Affiliation : Information Technology Bharati Vidyapeeth's College of Engg, New Delhi, India
Email : mankotias@acm.org
3 Affiliation : Information Technology Bharati Vidyapeeth's College of Engg, New Delhi, India
Email : bharadwajp@acm.org
Abstract :
This paper studies and analyses the encryption and decryption times of a popular variant of the RSA algorithm, the multi-prime RSA. This algorithm uses more than two prime numbers for the encryption process. In this paper, 3, 4, and 5 prime RSA algorithms have been implemented and studied. The rate of increase of encryption and decryption times concerning the number of primes used is also illustrated and compared graphically.
Keywords :
RSA algorithm; encryption; decryption; n-prime RSA
References :
[1] Milanov, E. (2009). The RSA algorithm. RSA Laboratories, 1-11.
[2] Bahig, H. M., Bhery, A., & Nassr, D. I. (2012, October). Cryptanalysis of multi-prime RSA with small prime difference. In International Conference on Information and Communications Security (pp. 33-44). Springer, Berlin, Heidelberg.
[3] Zheng, M., & Hu, H. (2015). A New Factoring Attack on Multi-Prime RSA with Small Prime Difference. IACR Cryptology ePrint Archive, 2015, 1137
[4] Damgård, I., Mikkelsen, G. L., & Skeltved, T. (2014, December). On the security of distributed multiprime RSA. In International Conference on Information Security and Cryptology (pp. 18-33). Springer, Cham.
[5] Srivenkatesh, M., & Vanitha, K. Implementing Multiprime RSA Algorithm to Enhance the Data Security in Federated Cloud Computing. International Journal of Advanced Research in Computer and Communication EngineeringVol, 4.
[6] Collins, T., Hopkins, D., Langford, S., & Sabin, M. (1998). U.S. Patent No. 5,848,159. Washington, DC: U.S. Patent and Trademark Office.
[7] Takagi, T. (1998, August). Fast RSA-type cryptosystem modulo p k q. In Annual International Cryptology Conference (pp. 318-326). Springer, Berlin, Heidelberg.
[8] Takagi, T., & Naito, S. (2002). U.S. Patent No. 6,396,926. Washington, DC: U.S. Patent and Trademark Office.
[9] Prakash, G. L., Prateek, M., & Singh, I. (2014, July). Data encryption and decryption algorithms using key rotations for data security in cloud system. In 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014) (pp. 624-629). IEEE.
[10] Hinek, M. J., Low, M. K., & Teske, E. (2002, August). On some attacks on multi-prime RSA. In International Workshop on Selected Areas in Cryptography (pp. 385-404). Springer, Berlin, Heidelberg.
[11] Xia, Z. Z. Z. On the Variants and Speed Methods of RSA.
[12] Goshwe, N. Y. (2013). Data encryption and decryption using RSA algorithm in a network environment. International Journal of Computer Science and Network Security (IJCSNS), 13(7), 9.
[13] Shinde, G. N., & Fadewar, H. S. (2008, April). Faster RSA algorithm for decryption using Chinese remainder theorem. In International Conference on Computational and Experimental Engineering and Sciences (ICCES) (Vol. 5, No. 4, pp. 255-262).
[14] Boneh, D., & Shacham, H. (2002). Fast variants of RSA. CryptoBytes, 5(1), 1-9.