THRESHOLD Φ (n)2 – Φ(N)-RSA ALGORITHM
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 4, Issue 10
Abstract
Today Computers are used in various data processing applications ranging from ordinary to sensitive. These Applications should ensure security to customers who perform online payments through e-commerce and companies share confidential documents between them. The solution is by Cryptography which provides security to the data such as by Asymmetric key cryptography, also called as Public Key cryptography, uses two different keys (which forms a key pair), one key is used for encryption and only the other corresponding key must be used for decryption. No other key can decrypt the message – not even the original (i.e. the first) key used for encryption. Many cryptosystems has been proposed with modifications to original RSA by improving security, performance of various phases of algorithm. In this paper we propose Threshold| φ(n)2 – φ(N)-RSA Algorithm to provide hierarchy implementation of encryption and decryption phases which has better performance than RSA and its variants like Batch-RSA, Multi- Prime RSA, Rebalanced – RSA.
Authors and Affiliations
S. Venkateswarlu* ,
Effect of Friction Stir Welding on Mechanical Properties of Dissimilar Aluminium Aa6061 and Aa2014 Alloy Joints
In present study, Dissimilar Friction Stir Butt Welds made of 2014 and 6061 Aluminium alloys were performed with various welding parameter. The present study deals with the influence of Square Profile Pin on Frict...
ONLINE TEACHING MODULE IN COMPUTER NETWORKING OF NAVAL STATE UNIVERSITY, NAVAL, BILIRAN PROVINCE, PHILIPPINES
Nowadays, technologies provide different ways to make easier and faster. There are different types of systems provided and created for establishments, industries, corporations, companies. Some of the technologies a...
Trajectory Anonymity for Privacy in Location
The rapid development of location based services i.e. Navigation has enabled tracking of user more ever before and the tracking has increased. These technologies provide the services based on the geographical loc...
Dynamic Traffic- Rule- Violation Monitoring and Detection System
In this paper, we present the construction of a system which detects violations at a street intersection such as lane violation during red light running and thereby we can trace each and every individual vehicle a...
A Review Paper on Metamaterial
In this paper a brief review about metamaterials is given. Here we discus different type of metamaterials composite structure used in antenna engineering. Compared with the conventional materials, metamaterials ex...