Enhanced, Modified and Secured RSA Cryptosystem based on n Prime Numbers and Offline Storage for Medical Data Transmission via Mobile Phone
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 10
Abstract
The transmission of medical data by mobile telephony is an innovation that constitutes the m-health or more generally e-health. This telemedicine handles personal data of patients who deserve to be protected when they are transmitted via the operator or private network, so that malicious people do not have access to them. This is where cryptography comes in to secure the medical data transmitted, while preserving their confidentiality, integrity and authenticity. In this field of personal data security, public key cryptography or asymmetric cryptography is becoming increasingly prevalent, as it provides a public key to encrypt the transmitted message and a second private key, linked to the first by formal mathematics, that only the final recipient has to decrypt the message. The RSA algorithm of River and Shamir provides this asymmetric cryptography based on a public key and a private key, on two prime numbers. However, the factorization of these two prime numbers to give the variable N of RSA can be discovered by a hacker and thus make the security of medical data vulnerable. In this article, we propose a more secured RSA algorithm with n primes and offline storage of the essential parameters of the RSA algorithm. We performed a triple encryption-decryption with these n prime numbers, which made it more difficult to break the factorization of the variable N. Thus, the key generation time is longer than that of traditional RSA.
Authors and Affiliations
Achi Harrisson Thiziers, Haba Cisse Théodore, Jérémie T. Zoueu, Babri Michel
Model Driven Development Transformations using Inductive Logic Programming
Model transformation by example is a novel approach in model-driven software engineering. The rationale behind the approach is to derive transformation rules from an initial set of interrelated source and target models;...
On the Dynamic Maintenance of Data Replicas based on Access Patterns in A Multi-Cloud Environment
Cloud computing provides services and infrastructures to enable end-users to access, modify and share massive geographically distributed data. There are increasing interests in developing data-intensive (big data) applic...
An Assessment of Open Data Sets Completeness
The rapid growth of open data sources is driven by free-of-charge contents and ease of accessibility. While it is convenient for public data consumers to use data sets extracted from open data sources, the decision to us...
A Study on Ranking Key Factors of Virtual Teams Effectiveness in Saudi Arabian Petrochemical Companies
This research ranks effectiveness-related factors of virtual teams. The literature suggests various factors which could motivate or discourage management in using virtual teams versus co-located teams. Forty-eight interv...
The ECG Signal Compression Using an Efficient Algorithm Based on the DWT
The storage capacity of the ECG records presents an important issue in the medical practices. These data could contain hours of recording, which needs a large space for storage to save these records. The compression of t...