Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
ABSTRACT
This paper proposes an efficient method to implement RSA decryption algorithm. RSA cryptosystem is the most
attractive and popular security technique for many applications, such as electronic commerce and secure internet
access. There are few end-users today who make use of real security applications. These applications tend to be too
complicated, exposing too much detail of the cryptographic process. Users need simple inherent security that
doesn‘t require more of them simply clicking the secure checkbox. Cryptography is a first abstraction to separate
specific algorithms from generic cryptographic processes in order to eliminate compatibility and upgradeability
problems. The core idea is enhance the performance of RSA algorithm. In this paper public key algorithm RSA and
enhanced RSA are compared analysis is made on the three designing parameters i.e. time delay and power
consumption. In a word, the total data path time delay of our proposed method is almost times 15.35% less than the
already existing method [1]. The proposed method enhances the performance of the RSA operation.
Keywords: Cryptography, Data path time delay, RSA cryptosystem
IJSRSET151315 | Received : 01 May 2015 | Accepted: 05 May 2014 | May-June 2015 [(1)3: 78-82] 78
adversaries).More generally, it is about constructing and certified and not the private key. This may seem obvious,
analyzing protocols that overcome the influence of but it is not unknown for a user to insist on having his
adversaries and which are related to various aspects in private key certified!
information security such as data confidentiality, data
integrity, authentication, and non-repudiation. Modern 2.3 KEY COMPONENT
cryptography intersects the disciplines of mathematics,
computer science, and electrical engineering. Keys should whenever possible be distributed by
Applications of cryptography include ATM cards, electronic means, enciphered under previously
computer passwords, and electronic commerce. established higher-level keys. There comes a point, of
Cryptography prior to the modern age was effectively course when no higher-level key exists and it is
synonymous with encryption, the conversion of necessary to establish the key manually. A common way
information from a readable state to apparent nonsense. of doing this is to split the key into several parts
The originator of an encrypted message shared the (components) and entrust the parts to a number of key
decoding technique needed to recover the original management personnel. The idea is that none of the key
information only with intended recipients, thereby parts should contain enough information to reveal
precluding unwanted persons to do the same. Since anything about the key itself. Usually, the key is
World War I and the advent of the computer, the combined by means of the exclusive-OR operation
methods used to carry out cryptology have become within a secure environment. In the case of DES keys,
increasingly complex and its application more there should be an odd number of components, each
widespread. Modern cryptography is heavily based on component having odd parity. Odd parity is preserved
mathematical theory and computer science practice. when all the components are combined. Further, each
Cryptographic algorithms are designed around component should be accompanied by a key check value
computational hardness assumptions, making such to guard against keying errors when the component is
algorithms hard to break in practice by any adversary. It entered into the system. A key check value for the
is theoretically possible to break such a system but it is combined components should also be available as a final
infeasible to do so by any known practical means. These check when the last component is entered. A problem
schemes are therefore termed computationally secure; that occurs with depressing regularity in the real world is
theoretical advances and faster computing technology when it is necessary to re-enter a key from its
require these solutions to be continually adapted. There components. This is always an emergency situation, and
exist information theoretically secure schemes that it is usually found that one or more of the key
provably cannot be broken even with unlimited component holders cannot be found. For this reason it is
computing power—an example is the one-time pad—but prudent to arrange matters so that the components are
these schemes are more difficult to implement than the distributed among the key holders in such a way that not
best theoretically breakable but computationally secure all of them need to be present. For example, if there are
mechanisms. three components (C1, C2, C3) and three key holders
(H1, H2, H3) then H1 could have (C2, C3), H2 could
2.1 CRYPTOGRAPHY KEY BASICS have (C1, C3) and H3 could have (C1, C2). In this
arrangement any two out of the three key holders would
The two components required to encrypt data are an be sufficient.
algorithm and a key. The algorithm generally known and
the key is kept secret. The key is a very large number III. TYPES OF CRYPTOGRAPHY
that should be impossible to guess, and of a size that
makes exhaustive search impractical. In a symmetric 3.1 Symmetric-key cryptography
cryptosystem, the same key is used for encryption and
decryption. In an asymmetric cryptosystem, the key used Symmetric-key cryptography refers to encryption
for decryption is different from the key used for methods in which both the sender and receiver share the
encryption. same key. Symmetric key ciphers are implemented as
either block ciphers or stream ciphers. A block cipher
2.2 KEY PAIR enciphers input in blocks of plaintext as opposed to
individual characters, the input form used by a stream
In an asymmetric system the encryption and decryption cipher. The data Encryption Standard(DES) and the
keys are different but related. The encryption key is Advanced Encryption Standard(AES) are block cipher
known as the public key and the decryption key is designs which have been designated cryptography
known as the private key. The public and private keys standards by the US government Despite its deprecation
are known as a key pair. Where a certification authority as an official standard, DES remains quite popular, it is
is used, remember that it is the public key that is used across a wide range of applications, from ATM
VI. REFERENCES