THRESHOLD Φ (n)2 – Φ(N)-RSA ALGORITHM
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 4, Issue 10
Abstract
Today Computers are used in various data processing applications ranging from ordinary to sensitive. These Applications should ensure security to customers who perform online payments through e-commerce and companies share confidential documents between them. The solution is by Cryptography which provides security to the data such as by Asymmetric key cryptography, also called as Public Key cryptography, uses two different keys (which forms a key pair), one key is used for encryption and only the other corresponding key must be used for decryption. No other key can decrypt the message – not even the original (i.e. the first) key used for encryption. Many cryptosystems has been proposed with modifications to original RSA by improving security, performance of various phases of algorithm. In this paper we propose Threshold| φ(n)2 – φ(N)-RSA Algorithm to provide hierarchy implementation of encryption and decryption phases which has better performance than RSA and its variants like Batch-RSA, Multi- Prime RSA, Rebalanced – RSA.
Authors and Affiliations
S. Venkateswarlu* ,
NONDESTRUCTIVE DIAGNOSIS OF A PARTICLE ACCELERATOR FOR MEDICAL USE
Our goal is to use thermal imaging to diagnose a particle accelerator used in medicine. This technic can track its operating status and detect breakdowns and failures. The accelerator is used in the Regional Cance...
Vigorous Source Provisioning With Virtualization through Skewness in Cloud
The recent emergence of public cloud offerings, surge computing -outsourcing tasks from an enclosed knowledge centre to a cloud supplier in times of serious load- has become a lot of accessible to a large vary of...
IMPLEMENTATION OF HEALTH MONITORING SYSTEM USING INTERNET OF THINGS
Health is one of the most important aspects of human life. Advancements in technology has paved ways for various techniques in health monitoring. Health Monitoring refers to continuous examination of the person’s...
DESIGN OF HIGH SPEED SUBTHRESHOLD INTERCONNECTS USING MCML TECHNIQUE
The recent trend in the VLSI industry toward miniature designs, low power consumption, and increased growth of portable applications compels researchers to design circuit having high speed. This is achieved by...
Eigen Decomposition based Blind Source Separation
Blind Source Separation (BSS) is termed as the extraction of source signals from mixed data without or with little knowledge about the source signals. This work discusses different flavors of covariance based algo...