Public Key Cryptosystem based on Pell’s Equation Using The Gnu Mp Library

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 2

Abstract

Protection of data is the utmost thing for any company related to digital information. There are several malicious methods adapted, based on the priority of demand of that piece of information. There are several cryptosystems implementing various algorithms. We are developing a cryptosystem based on Pell’s Equation. RSA algorithm is extensively used in the popular implementations of Public Key Infrastructures. In this paper, we have done an efficient implementation of RSA algorithm and Pell’s Equation using GMP library from GNU. We have also analyzed the changes in the performance of the algorithm by changing the number of bits of message and keys.

Authors and Affiliations

K V S S R S S Sarma , P S Avadhani

Keywords

Related Articles

A NEW PRUNING APPROACH FOR BETTER AND COMPACT DECISION TREES

The development of computer technology has enhanced the people’s ability to produce and collect data. Data mining techniques can be effectively utilized for analyzing the data to discover hidden knowledge. One of the wel...

TRACING REAL TIME LOCATION OF A FRIEND IN MOBILE SYSTEM

The application of this project is to track a number of people even in crowded natural environments. A system of this sort would be useful in a number of applications, such as human-computer interaction, surveillance, an...

“Economic Load Dispatch by Generating Units under Varying Load Demands Using Artificial Neural Network”

The problem of economic load dispatch has been tested on a generating plant having Ten units of generators operating in parallel. What shall be the load allocations to individual units for given load demand on the plant?...

Two Factor Biometric Key for Secure Wireless Networks

The applications of wireless networks is steadily increasing through out the world. Wireless transactions are now appening in highly secure banking networks. To have more reliable networks, security of wireless networks...

Efficient Forward Node List Algorithm for Broadcasting in symmetric Mobile Ad hoc networks

A mobile ad hoc network enables wireless communications between participating mobile nodes without the assistance of any base station. Two nodes that are out of one another’s ransmission range need the support of interm...

Download PDF file
  • EP ID EP129469
  • DOI -
  • Views 123
  • Downloads 0

How To Cite

K V S S R S S Sarma, P S Avadhani (2011). Public Key Cryptosystem based on Pell’s Equation Using The Gnu Mp Library. International Journal on Computer Science and Engineering, 3(2), 739-743. https://europub.co.uk/articles/-A-129469