Abstract
The processing and transmission of information has increased its effectiveness in recent decades. From mathematical models the security and integrity of the data are guaranteed. In spite of that, interceptions in the signal, attacks and information theft can happen in the transmission process. This paper presents a RSA algorithm analysis, using 4, 8 and 10 bits prime numbers with short messages. The encryption and decryption process implemented in python allowed the computational resources use. Processing time and data security are evaluated with a typical computational infrastructure required for its operation; in order to identify vulner-abilities and their reliability level when ideal conditions are available to perform a cryptanalysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379–423 (1948). https://doi.org/10.1002/j.1538-7305.1948.tb01338.x
Redes de Computadoras, Andrew S. Tanenbaum; cuarta edición, editorial: Pearson-Prentice Hall
Mateti, P.: Chapter 1 Security Issues in the TCP/IP Suite (2007). https://doi.org/10.1142/9789812770103_0001
Satish, G., Raghavendran, dr. Ch., Varma, dr.: Secret key cryptographic algorithm. Researchgate.net (2012). https://www.researchgate.net/publication/266389826_secret_key_cryptographic_algorithm
Awad Al-Hazaimeh, O.: A new approach for complex encrypting and decrypting data. Int. J. Comput. Networks Commun. 5(2), 95–103 (2013)
Petitcolas, F.: Kerckhoffs Principle (2011). https://doi.org/10.1007/978-1-4419-5906-5
Shamir, A., Rivest, R.L., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems Mag. Commun. ACM 21, 120–126 (1978). https://doi.org/10.1145/359340.359342
Gabriel, E.M.: Clúster de alto rendimiento en un cloud: ejemplo de aplica-ción en criptoanálisis de funciones hash. Universidad de Almería, p. 60 (2011). http://repositorio.ual.es/bitstream/handle/10835/1202/PFC.pdf?sequence=1
Asjad, S.: The RSA Algorithm. Researchgate.net, pp. 5–15 (2019). https://www.researchgate.net/publication/338623532_The_RSA_Algorithm
Fonseca-Herrera, O.A., Rojas, A.E., Florez, H.: A model of an information security management system based on NTC-ISO/IEC 27001 standard. IAENG Int. J. Comput. Sci. 48(2) (2021)
Goldreich, O.: Modern Cryptography, Probabilistic Proofs and Pseudorandomness (Second Edition - author’s copy), pp. 1–2. Springer (2000). http://www.wisdom.weizmann.ac.il/~oded/PDF/mcppp-v2.pdf
Castro Lechtaler, A., Cipriano, M., García, E., Liporace, J., Maiorano, A., Malvacio, E. and Tapia, N.: Estudio de técnicas de criptoanálisis.XXI Workshop de Investigadores en Ciencias de la Computación.Sedici.unlp.edu.ar (2021). http://sedici.unlp.edu.ar/handle/10915/77269
Al-hazaimeh, O.: A new approach for complex encrypting and decrypting data. Int. J. Comput. Networks Commun. 5, 95–103 (2013). https://doi.org/10.5121/ijcnc.2013.5208
Tiwari, G., Nandi, D., Mishra, M.: Cryptography and cryptanalysis: a review. Int. J. Eng. Res. Technol. 2, 1898–1902 (2013)
Bokhari, M., Alam, S., Masoodi, F.: Cryptanalysis tools and techniques (2014)
Rodríguez, G.R., Vanegas, C., Castang, G.: Python a su alcance. EditorialUD, 2020. Páginas, pp. 100–120 (2020). ISBN 978-958-787-181-4
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Rodriguez G., R., Castang M., G., Vanegas, C.A. (2021). Information Encryption and Decryption Analysis, Vulnerabilities and Reliability Implementing the RSA Algorithm in Python. In: Florez, H., Pollo-Cattaneo, M.F. (eds) Applied Informatics. ICAI 2021. Communications in Computer and Information Science, vol 1455. Springer, Cham. https://doi.org/10.1007/978-3-030-89654-6_28
Download citation
DOI: https://doi.org/10.1007/978-3-030-89654-6_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-89653-9
Online ISBN: 978-3-030-89654-6
eBook Packages: Computer ScienceComputer Science (R0)