Loop-based RSA Key Generation Algorithm using String Identity

Norhidayah, Muhammad and Jasni, Mohamad Zain and Md Yazid, Mohd Saman (2013) Loop-based RSA Key Generation Algorithm using String Identity. In: 13th International Conference on Control, Automation and Systems (ICCAS 2013) , 20-23 October 2013 , Kimdaejung Convention Center, Gwangju, Korea. pp. 255-258.. ISSN 2093-7121

[img] PDF
06703904.pdf - Published Version

Download (782kB)

Abstract

This paper will propose i-RSA algorithm, this algorithm is focus on key generation algorithm. Enhancement of this algorithm is user identity can be used as a public key such as email address. Previous algorithm was successful used email identity as a public key, but not all type of email can used as a public key. So we propose i-RSA algorithm that can produces 66.6% compared to previous algorithm (46.67%) email can be a string public key. The differences between i-RSA and previous algorithm are looping process in key generation, to get new value of p and q parameter, looping process will stop when value of k is equal to 1, and the email can be a public key. RSA algorithm and CRC 32 hash function will be explain in preliminaries section. Detail explanations of i-RSA algorithm in propose algorithm section. In future, i-RSA algorithm can be improved, so that 100% of email can be a public key.

Item Type: Conference or Workshop Item (Speech)
Additional Information: published by IEEE. ISBN: 978-89-93215-05-2.ISSN: 2093-7121
Uncontrolled Keywords: RSA algorithm; i-RSA algorithm; CRC32 hash function
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Faculty/Division: Faculty of Computer System And Software Engineering
Depositing User: ina
Date Deposited: 21 May 2014 03:32
Last Modified: 21 May 2018 06:47
URI: http://umpir.ump.edu.my/id/eprint/5794
Download Statistic: View Download Statistics

Actions (login required)

View Item View Item