THRESHOLD Φ (n)2 – Φ(N)-RSA ALGORITHM

Abstract

 Today Computers are used in various data processing applications ranging from ordinary to sensitive. These Applications should ensure security to customers who perform online payments through e-commerce and companies share confidential documents between them. The solution is by Cryptography which provides security to the data such as by Asymmetric key cryptography, also called as Public Key cryptography, uses two different keys (which forms a key pair), one key is used for encryption and only the other corresponding key must be used for decryption. No other key can decrypt the message – not even the original (i.e. the first) key used for encryption. Many cryptosystems has been proposed with modifications to original RSA by improving security, performance of various phases of algorithm. In this paper we propose Threshold| φ(n)2 – φ(N)-RSA Algorithm to provide hierarchy implementation of encryption and decryption phases which has better performance than RSA and its variants like Batch-RSA, Multi- Prime RSA, Rebalanced – RSA.

Authors and Affiliations

S. Venkateswarlu* ,

Keywords

Related Articles

 CORRELATION OF COMPREHENSION SKILLS AND MATHEMATICAL ABILITY IN GEOMETRY OF THE STUDENTS OF NAVAL SCHOOL OF FISHERIES

 This study determined the correlation of Comprehension Skills and Mathematical Ability of High School Students in Geometry of Naval School of Fisheries. The study utilized the descriptive correlation design as...

  Treatment of Automotive Gas Oil (Ago) - Contaminated Water Using Activated Carbon from Indian Bamboo

 This study investigated the ability of activated carbon extracted from Nigerian-grown Indian bamboo, to absorb hydrocarbon from automotive gas oil -contaminated water. The water was polluted in the ratio of 3:1 (t...

 Real Time Embedded Implementation of Face Recognition Using Beagle Board

 This Paper presents a Standalone low cost face recognition system. When compared to other bio-metrics systems such as finger print, palm print and Iris, face recognition has distinct advantages because of its non...

 Accumulative distance based Optimization of Handover delay in LTE Femtocell Network

 LTE stands for Long Term Evolution. Mobility in LTE Femtocell network is an issue when the Mobile Station (MS) moves and has to handover to Femto Base Station (BS). This results in unnecessary Femto BS scanning a...

 IMPACT OF IMPLANT PITCH AND LENGTH VARIATION ON STRESS INTENSITY AROUND DENTAL IMPLANT-BONE INTERFACE-BY 3D FINITE ELEMENT ANALYSIS

 Purpose of the study is to determine the effect of pitch and length variation on stress intensity around dental-implant bone interface. Finite Elemental Analysis were conducted first for identification of stress i...

Download PDF file
  • EP ID EP106351
  • DOI -
  • Views 84
  • Downloads 0

How To Cite

S. Venkateswarlu*, (0).  THRESHOLD Φ (n)2 – Φ(N)-RSA ALGORITHM. International Journal of Engineering Sciences & Research Technology, 4(10), 6-12. https://europub.co.uk/articles/-A-106351