Loading…

Design of Novel Key Generation Technique Based RSA Algorithm for Efficient Data Encryption and Decryption

The RSA cryptosystem is the most extensively used shared key cryptosystem. It is the first cryptosystem to employ the use of a public key. The more powerful this cryptosystem is, the larger the key. There are several RSA algorithms and variants. Nonetheless, it has snatched the hot topic of science....

Full description

Saved in:
Bibliographic Details
Published in:ECS transactions 2022-04, Vol.107 (1), p.2585-2592
Main Authors: Joshi, Anshu, Anand, Vijay
Format: Article
Language:English
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The RSA cryptosystem is the most extensively used shared key cryptosystem. It is the first cryptosystem to employ the use of a public key. The more powerful this cryptosystem is, the larger the key. There are several RSA algorithms and variants. Nonetheless, it has snatched the hot topic of science. The desire to keep sensitive data safe isn't going away. Data is continually moving over the network in today's environment. The scope of this network could be local or worldwide. It will be sent to you by email or another method. It's also critical to keep sensitive or private information out of the hands of prying eyes. There is also a requirement to develop a zero-tolerance security method. This study offered a time-saving method for generating encryption and decryption keys. This method of key generation may be beneficial to all RSA implementations.
ISSN:1938-5862
1938-6737
DOI:10.1149/10701.2585ecst