Abstract
Asymmetric crypto algorithms are a robust technology used in the communication of texts on the channel to reduce security risks. Mathematical approaches are one of the drawbacks and it’s because they involve a larger amount of calculation which contributes to the need for enhanced use of computing power. This paper aims to refine the algorithm for RSA encoding and therefore enhance information security, reliability and availability. The results show the information security efficiency and usability of the RSA algorithm. We can also see that when performing encoding and decoding, time, space, processor and network output are lower than other RSA solutions since computing is performed on the client and server.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Patidar R, Bhartiya R (2013) Modified RSA cryptosystem based on offline storage and prime number. In: IEEE international conference on computational intelligence and computing research (ICCIC), pp 1–6
ISCI (2012) Enhancing security features in RSA cryptosystem. In: 2012 IEEE Symposium on Computers Informatics (ISCI), pp 214–217
Wang HJ (2012) Key generation research of RSA public cryptosystem and matlab implement. In: IEEE international conference on sensor network security technology and privacy communication system (SNS & PCS), pp 639–642
Cohen AE, Parhi K (2012) Architecture optimizations for the RSA public key cryptosystem, a tutorial. IEEE Circuits Syst Mag 11(4):24–34
Zhou X, Tang X (2011) Research and implementation of RSA algorithm for encryption and decryption. In: 6th international forum on strategic technology (IFOST), pp 1118–1121
Yadav PS, Sharma P, Yadav DK (2012) Implementation of RSA algorithm using elliptic curve algorithm for security and performance enhancement. Int J Sci Technol Res 1(4):102–105
Singh G, Supriya A (2013) A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int J Comput Appl 67(19):33–38
Liu Q, Li Y, Li T, Hao L (2011) The research of the batch RSA decryption performance. J Comput Inform Syst 7(3):948–955
Dongjiang L, Yandan W (2012) An optimization algorithm of RSA key generation in embedded system. J Theor Appl Inform Technol 7(3):948–955
Mahajan S, Singh M (2014) Analysis of RSA algorithm using GPU programming. CoRR abs/1407.1465
Gadelha M, Costa Filho C, Costa M (2012) Proposal of a cryptography method using gray scale digital images. In: International conference for internet technology and secured transactions, pp 331–335
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Taneja, A., Shukla, R.K. (2021). Comparative Study of RSA with Optimized RSA to Enhance Security. In: Kumar, A., Mozar, S. (eds) ICCCE 2020. Lecture Notes in Electrical Engineering, vol 698. Springer, Singapore. https://doi.org/10.1007/978-981-15-7961-5_91
Download citation
DOI: https://doi.org/10.1007/978-981-15-7961-5_91
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7960-8
Online ISBN: 978-981-15-7961-5
eBook Packages: EngineeringEngineering (R0)