Skip to main content

An EHSA for RSA Cryptosystem

  • Conference paper
  • First Online:
Book cover Advances in Data and Information Sciences

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 39))

Abstract

This paper presents a new Enhanced Hybrid Security Algorithm (EHSA) for RSA cryptosystem, which is compared with an encryption algorithm using dual modulus in various aspects such as key generation time, encryption time, decryption time, and data security. The proposed scheme uses eight different prime integers for the computation of two modulus values, which generate the two different public keys and private keys. Thus the complexity involved in factorizing the modulus value increases. Also, the proposed algorithm uses double encryption and decryption using double private and public keys to provide security against Brute-force attack. Therefore, if an intruder detects a single key of cryptosystem even then it is not possible to decrypt the message. Also, it is difficult to factorize the modulus value into its four prime factors. Thus, it enhances the security of encrypted data two times.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Suja GJ (2016) New approach for highly secured I/O transfer with data on timer streaming. IEEE

    Google Scholar 

  2. Aboud SJ, AL-Fayoumi MA, Al-Fayoumi M, Jabbar HS An efficient RSA public key encryption scheme. In: Fifth international conference on information technology: new generations

    Google Scholar 

  3. Ramaporkalai T (2017) Security algorithm in cloud computing. Int J Comput Sci Trends Technol (IJCST-2017)

    Google Scholar 

  4. Goel A, Manu (2017) Encryption algorithm using dual modulus. In: 3rd IEEE international conference on computational intelligence and communication technology. IEEE—CICT

    Google Scholar 

  5. Jeeva AL, Dr Palanisamy V, Kanagaram K (2012) Comparative analysis of performance efficiency and security measures of some encryption. Int J Eng Res Appl (IJERA)

    Google Scholar 

  6. Pancholi VR, Dr Patel BP (2013) Enhancement of cloud computing security with secure data storage using AES. Int J Innov Res Sci Technol (IJIRST-2016)

    Google Scholar 

  7. Madaan S, Agarwal RK Implementation of identity based distributed cloud storage encryption scheme using PHP and C for Hadoop file system

    Google Scholar 

  8. Prabu Kanna G, Vasudevan V (2016) Enhancing the security of user data using the keyword encryption and hybrid cryptographic algorithm in cloud. In: International conference on electrical, electronics and optimization techniques (ICEEOT)

    Google Scholar 

  9. Osseily HA, Haidar AM, Kassem A Implementation of RSA encryption using identical modulus algorithm

    Google Scholar 

  10. Verma S, Garg D (2014) An improved RSA variant. Int J Adv Technol

    Google Scholar 

  11. Bhandari A, Gupta A, Das D (2016) Secure algorithm for cloud computing and its applications. IEEE

    Google Scholar 

  12. Dongjiang L, Yandan W, Hong C The research on key generation in RSA public-key cryptosystem. In: 2012 Fourth international conference on computational and information sciences

    Google Scholar 

  13. Ambedkar BR, Gupta S, Goutam P, Bedi SS (2011) An efficient to factorize the RSA public key encryption. In: 2011 international conference on communication system and network technologies

    Google Scholar 

  14. Panda PK, Chhattopadhyay S (2017) A hybrid security algorithm for RSA cryptosystem. In: International conference on advanced computing and communication system (ICACCS)

    Google Scholar 

  15. Prof Dr Al-Hamami AH, Aldariseh IA (2012) Enhanced method for RSA cryptosystem algorithm. In: International conference on advance computer science applications and technologies

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nishi Yadav .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kumari, M., Ekka, D., Yadav, N. (2019). An EHSA for RSA Cryptosystem. In: Kolhe, M., Trivedi, M., Tiwari, S., Singh, V. (eds) Advances in Data and Information Sciences . Lecture Notes in Networks and Systems, vol 39. Springer, Singapore. https://doi.org/10.1007/978-981-13-0277-0_31

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-0277-0_31

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-0276-3

  • Online ISBN: 978-981-13-0277-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics