Skip to main content

Comparative Study of RSA with Optimized RSA to Enhance Security

  • Conference paper
  • First Online:
ICCCE 2020

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 698))

  • 1555 Accesses

Abstract

Asymmetric crypto algorithms are a robust technology used in the communication of texts on the channel to reduce security risks. Mathematical approaches are one of the drawbacks and it’s because they involve a larger amount of calculation which contributes to the need for enhanced use of computing power. This paper aims to refine the algorithm for RSA encoding and therefore enhance information security, reliability and availability. The results show the information security efficiency and usability of the RSA algorithm. We can also see that when performing encoding and decoding, time, space, processor and network output are lower than other RSA solutions since computing is performed on the client and server.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Patidar R, Bhartiya R (2013) Modified RSA cryptosystem based on offline storage and prime number. In: IEEE international conference on computational intelligence and computing research (ICCIC), pp 1–6

    Google Scholar 

  2. ISCI (2012) Enhancing security features in RSA cryptosystem. In: 2012 IEEE Symposium on Computers Informatics (ISCI), pp 214–217

    Google Scholar 

  3. Wang HJ (2012) Key generation research of RSA public cryptosystem and matlab implement. In: IEEE international conference on sensor network security technology and privacy communication system (SNS & PCS), pp 639–642

    Google Scholar 

  4. Cohen AE, Parhi K (2012) Architecture optimizations for the RSA public key cryptosystem, a tutorial. IEEE Circuits Syst Mag 11(4):24–34

    Article  Google Scholar 

  5. Zhou X, Tang X (2011) Research and implementation of RSA algorithm for encryption and decryption. In: 6th international forum on strategic technology (IFOST), pp 1118–1121

    Google Scholar 

  6. Yadav PS, Sharma P, Yadav DK (2012) Implementation of RSA algorithm using elliptic curve algorithm for security and performance enhancement. Int J Sci Technol Res 1(4):102–105

    Google Scholar 

  7. Singh G, Supriya A (2013) A study of encryption algorithms (RSA, DES, 3DES and AES) for information security. Int J Comput Appl 67(19):33–38

    Google Scholar 

  8. Liu Q, Li Y, Li T, Hao L (2011) The research of the batch RSA decryption performance. J Comput Inform Syst 7(3):948–955

    Google Scholar 

  9. Dongjiang L, Yandan W (2012) An optimization algorithm of RSA key generation in embedded system. J Theor Appl Inform Technol 7(3):948–955

    Google Scholar 

  10. Mahajan S, Singh M (2014) Analysis of RSA algorithm using GPU programming. CoRR abs/1407.1465

    Google Scholar 

  11. Gadelha M, Costa Filho C, Costa M (2012) Proposal of a cryptography method using gray scale digital images. In: International conference for internet technology and secured transactions, pp 331–335

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit Taneja .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Taneja, A., Shukla, R.K. (2021). Comparative Study of RSA with Optimized RSA to Enhance Security. In: Kumar, A., Mozar, S. (eds) ICCCE 2020. Lecture Notes in Electrical Engineering, vol 698. Springer, Singapore. https://doi.org/10.1007/978-981-15-7961-5_91

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-7961-5_91

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-7960-8

  • Online ISBN: 978-981-15-7961-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics