Enhanced, Modified and Secured RSA Cryptosystem based on n Prime Numbers and Offline Storage for Medical Data Transmission via Mobile Phone
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 10
Abstract
The transmission of medical data by mobile telephony is an innovation that constitutes the m-health or more generally e-health. This telemedicine handles personal data of patients who deserve to be protected when they are transmitted via the operator or private network, so that malicious people do not have access to them. This is where cryptography comes in to secure the medical data transmitted, while preserving their confidentiality, integrity and authenticity. In this field of personal data security, public key cryptography or asymmetric cryptography is becoming increasingly prevalent, as it provides a public key to encrypt the transmitted message and a second private key, linked to the first by formal mathematics, that only the final recipient has to decrypt the message. The RSA algorithm of River and Shamir provides this asymmetric cryptography based on a public key and a private key, on two prime numbers. However, the factorization of these two prime numbers to give the variable N of RSA can be discovered by a hacker and thus make the security of medical data vulnerable. In this article, we propose a more secured RSA algorithm with n primes and offline storage of the essential parameters of the RSA algorithm. We performed a triple encryption-decryption with these n prime numbers, which made it more difficult to break the factorization of the variable N. Thus, the key generation time is longer than that of traditional RSA.
Authors and Affiliations
Achi Harrisson Thiziers, Haba Cisse Théodore, Jérémie T. Zoueu, Babri Michel
Multi-Attributes Web Objects Classification based on Class-Attribute Relation Patterns Learning Approach
The amount of Web data increases with the proliferation of a variety of Web objects, primarily in the form of text, images, video, and music data files. Each of these published objects has some properties that support de...
A Behavioral Study of Task Scheduling Algorithms in Cloud Computing
All the services offered by cloud computing are bundled into one service know as IT as a Service (ITaaS). The user’s processes are executed using these services. The scheduling techniques used in the cloud computing envi...
Predictive Performance Comparison Analysis of Relational & NoSQL Graph Databases
From last three decades, the relational databases are being used in many organizations of various natures such as Education, Health, Business and in many other applications. Traditional databases show tremendous performa...
Recognition and Classification of Power Quality Disturbances by DWT-MRA and SVM Classifier
Electrical power system is a large and complex network, where power quality disturbances (PQDs) must be monitored, analyzed and mitigated continuously in order to preserve and to re-establish the normal power supply with...
Feature Extraction and Classification Methods for a Motor Task Brain Computer Interface: A Comparative Evaluation for Two Databases
A comparative evaluation is performed on two databases using three feature extraction techniques and five classification methods for a motor imagery paradigm based on Mu rhythm. In order to extract the features from elec...