Three Prime RSA Algorithm Using Randomly Generated Prime Sequence Cryptosystem

Authors(3) :-Pooja Devi, Naveen Tyagi, Parul Saharavat

Existing RSA cryptosystem is not in used due to the fact that it is very slow in process and also having the problem of Brute force and factorization attack. Hence these factors can degrade the performance of the RSA cryptosystem. Therefore a concept is needed which can overcome these entire factor. Hence we proposed algorithm we use the hybrid combination of the subset sum problem and modified RSA cryptosystem. In this work, we are going to enhance the security of the RSA algorithm. Here we are using three prime numbers in place of two and also adding super increasing sequence for the key generation process. If Attacker wants to break proposed systems then one has to factor the modulus into its primes as well as find the secret set A. If modified RSA, which is based on single module is broken in time x and subset sum algorithm is broken in time y then the time required to break this proposed algorithm is x*y. Therefore the security of our proposed system is increased as compared to RSA algorithm.

Authors and Affiliations

Pooja Devi
M.Tech Scholer J.P.I.E.T, Meerut, Uttar Pradesh, India
Naveen Tyagi
Department of computer science J.P.I.E.T, Meerut, Uttar Pradesh, India
Parul Saharavat
Department of computer science D.N. Polytechnique, Meerut, Uttar Pradesh, India

Asymmetric key Cryptography Sub-set Sum cryptography, RSA cryptosystem, Security.

  1. Digital signature scheme with message recovery using knapsack-based ECC International journal of network security, Vol.12, No.1, jan 2011. R. Rajaram Ramasamy and M. Amutha prabakar.
  2. Knapsack based ECC Encrytion and Decryption. International journal of network security, Vol.12, No.1, jan 2011.R.Rajaram Ramasamy and M. Amutha prabakar.
  3. An Efficient Signature System Using Optimized RSA Algorithm IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008 Prof. MOUSTAFA ABD EL-AZIEM, Dr. MOHAMMAD ALI GOMAA.
  4. IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.12, December 2008, "An Efficient Signature System Using Optimized RSA Algorithm ".
  5. T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory, July 1985.W.Diffie and M. Hellman. "New Directions in Cryptography ". IEEE transactions on Information Theory. IT-22(1978).472-492.
  6. R. C. Merkle and M. E. Hellman, "Hiding information and signatures in trapdoor knapsacks, "IEEE Trans. Inf. Theory, IT- 24(5), pp.525-530, 1978.
  7. Shamir, A. 1984. A polynomial-time algorithm for breaking the basic Merkle - Hellman cryptosystem; Information Theory, IEEE Transactions on , Volume: 30 Issue: 5 , Sep 1984 Page(s): 699 –704
  8. Diffie, W.; Hellman, M.1976. New directions in cryptography; Information Theory, IEEE Transactions on , Volume: 22 Issue: 6 , Nov 1976 Page(s): 644 –654
  9. M. E. Hellman and E.D. Karnin, 1983 "The Largest Super-Increasing Subset of a Random Set, "IEEE Trans. on Info. Theory, Vol. IT-29, January 1983, pp.
  10. R. Rajaram Ramasamy and M. Amutha Prabakar 2011. Digital Signature Scheme with Message Recovery Using Knapsack-based ECC, International Journal of Network Security, Vol.12, No.1, PP.7 - 12, Jan. 2011
  11. M. E. Hellman, "An Overview of Public Key Cryptography, "IEEE Communications Society Magazine, Vol. 16, Nov. 1978, pp.24-32 (Invited Paper).
  12. W. Diffie and M. E. Hellman, "Privacy and Authentication: An Introduction to Cryptography, "Proceedings of the IEEE, Vol. 67, March 1979.

Publication Details

Published in : Volume 3 | Issue 6 | July-August 2018
Date of Publication : 2018-07-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 48-52
Manuscript Number : CSEIT183613
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Pooja Devi, Naveen Tyagi, Parul Saharavat, "Three Prime RSA Algorithm Using Randomly Generated Prime Sequence Cryptosystem", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 6, pp.48-52, July-August-2018.
Journal URL : http://ijsrcseit.com/CSEIT183613

Follow Us

Contact Us