Privacy preserving using extended euclidean – algorithm applied to RSA

Authors

  • Thi-Nhung Nguyen University of Information and Communication Technology, Thai Nguyen University, Thai Nguyen, Vietnam

DOI:

https://doi.org/10.56764/hpu2.jos.2023.1.2.53-63

Abstract

           

RSA cryptography is a strong encryption method widely used in online transactions. Using the extended Euclidean algorithm is an important and efficient technique for finding the secret key in RSA cryptography. This study provides an implementation of the extended Euclidean algorithm to find secret keys based on RSA cryptography and hopes that it can be of help to experts in the field of information security.

References

. D. R. Stinson , Cryptography_ Theory and Practice, USA: CRC Press,1995.

. K. Singh, R. Verma, R. Chehal , Modified Prime Number Factorization Algorithm (MPFA) For RSA Public Key Encryption, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-4, (2012) pp 204-206.

. M. T. Rhee, Cryptography and Secure Communications, USA: McGraw - Hill Book Co,1994.

. Ph.D. W. Stallings , Network and Internetwork Security Principles and Practice, USA: Prentice Hall,1995.

. S. Sharma, J.- S. Yadav, P. Sharma, Modified RSA Public Key Cryptosystem Using Short Range Natural Number Algorithm, International Journal of Advanced Research in Computer Science and Software Engineering, (2012) Volume 2,Issue 8, pp 134-138.

J. Zhou, J. Hu, P. Chen The 2nd , Extended Euclid algorithm and its application in RSA, International Conference on Information Science and Engineering, IEEE, (2010) 10.1109/ICISE.2010.5691644, 4-6

R Gennaro, RSA-Based Undeniable Signatures, Journal of Cryptology, (2000), Vol 13, No. 4, pp 397-416.

. P.H. Đien, Information coding - Mathematical foundations and applications, Institute of Mathematics, VAST, Ha noi, 2004.

. P.H. Đien, H. H. Khoai, Algorithmic Arithmetic - Theoretical Foundations & Practical Calculations, Institute of Mathematics, VAST, Ha noi, 2002.

. Gennaro, Robust and Efficient Sharing of RSA Functions, Journal of Cryptology, (2008) Vol 13, No 2, pp 273-300.

. G. Shahi, C.Singh, Cryptography and its two Implementation Approaches, International Journal of Innovative Research in Computer and Communication Engineering ,Vol. 1, Issue 3, May 2013,PP 668-672.

. Buchmann, A. Johannes, Introduction to Cryptography (2nd ed.). Springer. ISBN 0-387-20756-2,13 July 2004.

. R. Rivest, A. Shamir, L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM 21 (2): 120–126, doi: 10.1145/359340.359342, 1977

Published

28-04-2023

How to Cite

Nguyen, T.-N. (2023). Privacy preserving using extended euclidean – algorithm applied to RSA. HPU2 Journal of Science: Natural Sciences and Technology, 2(1), 53–63. https://doi.org/10.56764/hpu2.jos.2023.1.2.53-63

Volume and Issue

Section

Natural Sciences and Technology