Loading…
Design of Novel Key Generation Technique Based RSA Algorithm for Efficient Data Encryption and Decryption
The RSA cryptosystem is the most extensively used shared key cryptosystem. It is the first cryptosystem to employ the use of a public key. The more powerful this cryptosystem is, the larger the key. There are several RSA algorithms and variants. Nonetheless, it has snatched the hot topic of science....
Saved in:
Published in: | ECS transactions 2022-04, Vol.107 (1), p.2585-2592 |
---|---|
Main Authors: | , |
Format: | Article |
Language: | English |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The RSA cryptosystem is the most extensively used shared key cryptosystem. It is the first cryptosystem to employ the use of a public key. The more powerful this cryptosystem is, the larger the key. There are several RSA algorithms and variants. Nonetheless, it has snatched the hot topic of science. The desire to keep sensitive data safe isn't going away. Data is continually moving over the network in today's environment. The scope of this network could be local or worldwide. It will be sent to you by email or another method. It's also critical to keep sensitive or private information out of the hands of prying eyes. There is also a requirement to develop a zero-tolerance security method. This study offered a time-saving method for generating encryption and decryption keys. This method of key generation may be beneficial to all RSA implementations. |
---|---|
ISSN: | 1938-5862 1938-6737 |
DOI: | 10.1149/10701.2585ecst |