Loop-based RSA Key Generation Algorithm using String Identity
This paper will propose i-RSA algorithm, this algorithm is focus on key generation algorithm. Enhancement of this algorithm is user identity can be used as a public key such as email address. Previous algorithm was successful used email identity as a public key, but not all type of email can used as...
à®®à¯à®´à¯ விளகà¯à®•à®®à¯
Saved in:
| தலைமை எழà¯à®¤à¯à®¤à®¾à®³à®°à¯à®•ளà¯: | , , |
|---|---|
| வடிவமà¯: | Conference or Workshop Item |
| வெளியீடபà¯à®ªà®Ÿà¯à®Ÿà®¤à¯: |
IEEE
2013
|
| பகà¯à®¤à®¿à®•ளà¯: | |
| நிகழà¯à®¨à®¿à®²à¯ˆ அணà¯à®•லà¯: | http://dx.doi.org/10.1109/ICCAS.2013.6703904 http://dx.doi.org/10.1109/ICCAS.2013.6703904 http://umpir.ump.edu.my/5794/1/06703904.pdf |
| கà¯à®±à®¿à®¯à¯€à®Ÿà¯à®•ளà¯: |
கà¯à®±à®¿à®šà¯à®šà¯Šà®²à¯ இணை
கà¯à®±à®¿à®¯à¯€à®Ÿà¯à®•ள௠இலà¯à®²à¯ˆ, இநà¯à®¤ கà¯à®±à®¿à®šà¯à®šà¯Šà®²à¯à®²à¯ˆ à®®à¯à®¤à®²à®¿à®²à¯ பதிவ௠செயà¯à®¯à¯à®™à¯à®•ளà¯!
|
| தொகà¯à®ªà¯à®ªà¯: | This paper will propose i-RSA algorithm, this algorithm is focus on key generation algorithm. Enhancement of this algorithm is user identity can be used as a public key such as email address. Previous algorithm was successful used email identity as a public key, but not all type of email can used as a public key. So we propose i-RSA algorithm
that can produces 66.6% compared to previous algorithm (46.67%) email can be a string public key. The differences
between i-RSA and previous algorithm are looping process in key generation, to get new value of p and q parameter, looping process will stop when value of k is equal to 1, and the email can be a public key. RSA algorithm and CRC 32
hash function will be explain in preliminaries section. Detail explanations of i-RSA algorithm in propose algorithm
section. In future, i-RSA algorithm can be improved, so that 100% of email can be a public key. |
|---|