Privacy preserving using extended euclidean – algorithm applied to RSA
DOI:
https://doi.org/10.56764/hpu2.jos.2023.1.2.53-63- Keywords:
- Cryptography
- Steganography
- Watermarking
- RSA
- private key
Abstract
RSA cryptography is a strong encryption method widely used in online transactions. Using the extended Euclidean algorithm is an important and efficient technique for finding the secret key in RSA cryptography. This study provides an implementation of the extended Euclidean algorithm to find secret keys based on RSA cryptography and hopes that it can be of help to experts in the field of information security.
References
. D. R. Stinson , Cryptography_ Theory and Practice, USA: CRC Press,1995.
. K. Singh, R. Verma, R. Chehal , Modified Prime Number Factorization Algorithm (MPFA) For RSA Public Key Encryption, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-4, (2012) pp 204-206.
. M. T. Rhee, Cryptography and Secure Communications, USA: McGraw - Hill Book Co,1994.
. Ph.D. W. Stallings , Network and Internetwork Security Principles and Practice, USA: Prentice Hall,1995.
. S. Sharma, J.- S. Yadav, P. Sharma, Modified RSA Public Key Cryptosystem Using Short Range Natural Number Algorithm, International Journal of Advanced Research in Computer Science and Software Engineering, (2012) Volume 2,Issue 8, pp 134-138.
J. Zhou, J. Hu, P. Chen The 2nd , Extended Euclid algorithm and its application in RSA, International Conference on Information Science and Engineering, IEEE, (2010) 10.1109/ICISE.2010.5691644, 4-6
R Gennaro, RSA-Based Undeniable Signatures, Journal of Cryptology, (2000), Vol 13, No. 4, pp 397-416.
. P.H. Đien, Information coding - Mathematical foundations and applications, Institute of Mathematics, VAST, Ha noi, 2004.
. P.H. Đien, H. H. Khoai, Algorithmic Arithmetic - Theoretical Foundations & Practical Calculations, Institute of Mathematics, VAST, Ha noi, 2002.
. Gennaro, Robust and Efficient Sharing of RSA Functions, Journal of Cryptology, (2008) Vol 13, No 2, pp 273-300.
. G. Shahi, C.Singh, Cryptography and its two Implementation Approaches, International Journal of Innovative Research in Computer and Communication Engineering ,Vol. 1, Issue 3, May 2013,PP 668-672.
. Buchmann, A. Johannes, Introduction to Cryptography (2nd ed.). Springer. ISBN 0-387-20756-2,13 July 2004.
. R. Rivest, A. Shamir, L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM 21 (2): 120–126, doi: 10.1145/359340.359342, 1977
Downloads
Published
How to Cite
Volume and Issue
Section
Copyright and License
Copyright (c) 2023 Journal of Science - HPU2
This work is licensed under a Creative Commons Attribution 4.0 International License.