Skip to main content

Information Encryption and Decryption Analysis, Vulnerabilities and Reliability Implementing the RSA Algorithm in Python

  • Conference paper
  • First Online:
Applied Informatics (ICAI 2021)

Abstract

The processing and transmission of information has increased its effectiveness in recent decades. From mathematical models the security and integrity of the data are guaranteed. In spite of that, interceptions in the signal, attacks and information theft can happen in the transmission process. This paper presents a RSA algorithm analysis, using 4, 8 and 10 bits prime numbers with short messages. The encryption and decryption process implemented in python allowed the computational resources use. Processing time and data security are evaluated with a typical computational infrastructure required for its operation; in order to identify vulner-abilities and their reliability level when ideal conditions are available to perform a cryptanalysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379–423 (1948). https://doi.org/10.1002/j.1538-7305.1948.tb01338.x

    Article  MathSciNet  MATH  Google Scholar 

  2. Redes de Computadoras, Andrew S. Tanenbaum; cuarta edición, editorial: Pearson-Prentice Hall

    Google Scholar 

  3. Mateti, P.: Chapter 1 Security Issues in the TCP/IP Suite (2007). https://doi.org/10.1142/9789812770103_0001

  4. Satish, G., Raghavendran, dr. Ch., Varma, dr.: Secret key cryptographic algorithm. Researchgate.net (2012). https://www.researchgate.net/publication/266389826_secret_key_cryptographic_algorithm

  5. Awad Al-Hazaimeh, O.: A new approach for complex encrypting and decrypting data. Int. J. Comput. Networks Commun. 5(2), 95–103 (2013)

    Article  Google Scholar 

  6. Petitcolas, F.: Kerckhoffs Principle (2011). https://doi.org/10.1007/978-1-4419-5906-5

  7. Shamir, A., Rivest, R.L., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems Mag. Commun. ACM 21, 120–126 (1978). https://doi.org/10.1145/359340.359342

  8. Gabriel, E.M.: Clúster de alto rendimiento en un cloud: ejemplo de aplica-ción en criptoanálisis de funciones hash. Universidad de Almería, p. 60 (2011). http://repositorio.ual.es/bitstream/handle/10835/1202/PFC.pdf?sequence=1

  9. Asjad, S.: The RSA Algorithm. Researchgate.net, pp. 5–15 (2019). https://www.researchgate.net/publication/338623532_The_RSA_Algorithm

  10. Fonseca-Herrera, O.A., Rojas, A.E., Florez, H.: A model of an information security management system based on NTC-ISO/IEC 27001 standard. IAENG Int. J. Comput. Sci. 48(2) (2021)

    Google Scholar 

  11. Goldreich, O.: Modern Cryptography, Probabilistic Proofs and Pseudorandomness (Second Edition - author’s copy), pp. 1–2. Springer (2000). http://www.wisdom.weizmann.ac.il/~oded/PDF/mcppp-v2.pdf

  12. Castro Lechtaler, A., Cipriano, M., García, E., Liporace, J., Maiorano, A., Malvacio, E. and Tapia, N.: Estudio de técnicas de criptoanálisis.XXI Workshop de Investigadores en Ciencias de la Computación.Sedici.unlp.edu.ar (2021). http://sedici.unlp.edu.ar/handle/10915/77269

  13. Al-hazaimeh, O.: A new approach for complex encrypting and decrypting data. Int. J. Comput. Networks Commun. 5, 95–103 (2013). https://doi.org/10.5121/ijcnc.2013.5208

    Article  Google Scholar 

  14. Tiwari, G., Nandi, D., Mishra, M.: Cryptography and cryptanalysis: a review. Int. J. Eng. Res. Technol. 2, 1898–1902 (2013)

    Google Scholar 

  15. Bokhari, M., Alam, S., Masoodi, F.: Cryptanalysis tools and techniques (2014)

    Google Scholar 

  16. Rodríguez, G.R., Vanegas, C., Castang, G.: Python a su alcance. EditorialUD, 2020. Páginas, pp. 100–120 (2020). ISBN 978-958-787-181-4

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rocío Rodriguez G. .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rodriguez G., R., Castang M., G., Vanegas, C.A. (2021). Information Encryption and Decryption Analysis, Vulnerabilities and Reliability Implementing the RSA Algorithm in Python. In: Florez, H., Pollo-Cattaneo, M.F. (eds) Applied Informatics. ICAI 2021. Communications in Computer and Information Science, vol 1455. Springer, Cham. https://doi.org/10.1007/978-3-030-89654-6_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-89654-6_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-89653-9

  • Online ISBN: 978-3-030-89654-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics