Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
RSA cryptosystem is an information security algorithm used for encrypting and decrypting of digital data in order to protect the content of the data and to ensure its privacy. Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and sy...
Main Authors: | , , , , , , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
Little Lion Scientific Islamabad Pakistan
2014
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/36589/ http://irep.iium.edu.my/36589/ http://irep.iium.edu.my/36589/1/5Vol61No1.pdf http://irep.iium.edu.my/36589/4/36589_Cryptanalytic%20attacks%20on%20Rivest_SCOPUS.pdf |
id |
iium-36589 |
---|---|
recordtype |
eprints |
spelling |
iium-365892017-09-19T07:25:53Z http://irep.iium.edu.my/36589/ Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges Abubakar, Adamu Jabaka, Shehu Tijani, Bello Idrith Zeki, Akram M. Chiroma, Haruna Usman, Mohammed Joda Raji, Shakirat Mahmud, Murni T Technology (General) RSA cryptosystem is an information security algorithm used for encrypting and decrypting of digital data in order to protect the content of the data and to ensure its privacy. Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. In an email application, it's utilized to ensure the privacy and authenticity of email message. Some studies have also shown the efficiency of RSA algorithm in securing remote login sessions, and electronic credit-card payment systems. Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. Its strength lies with its ability of withstanding many forms of attacks. While many studies focus on proving that RSA algorithm is breakable under certain cryptanalytic attacks, yet there are some confrontations on the circumstances of applying those attacks. This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. The paper also explores the perceived vulnerabilities of implementing RSA algorithm which can render a cryptanalyst easier means of attack. Little Lion Scientific Islamabad Pakistan 2014-03-10 Article PeerReviewed application/pdf en http://irep.iium.edu.my/36589/1/5Vol61No1.pdf application/pdf en http://irep.iium.edu.my/36589/4/36589_Cryptanalytic%20attacks%20on%20Rivest_SCOPUS.pdf Abubakar, Adamu and Jabaka, Shehu and Tijani, Bello Idrith and Zeki, Akram M. and Chiroma, Haruna and Usman, Mohammed Joda and Raji, Shakirat and Mahmud, Murni (2014) Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges. Journal of Theoretical and Applied Information Technology, 61 (1). pp. 37-43. ISSN 1817-3195 (O), 1992-8645 (P) http://www.jatit.org/volumes/Vol61No1/5Vol61No1.pdf |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English English |
topic |
T Technology (General) |
spellingShingle |
T Technology (General) Abubakar, Adamu Jabaka, Shehu Tijani, Bello Idrith Zeki, Akram M. Chiroma, Haruna Usman, Mohammed Joda Raji, Shakirat Mahmud, Murni Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges |
description |
RSA cryptosystem is an information security algorithm used for encrypting and decrypting of digital data in order to protect the content of the data and to ensure its privacy. Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. In an email application, it's utilized to ensure the privacy and authenticity of email message. Some studies have also shown the efficiency of RSA algorithm in securing remote login sessions, and electronic credit-card payment systems. Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. Its strength lies with its ability of withstanding many forms of attacks. While many studies focus on proving that RSA algorithm is breakable under certain cryptanalytic attacks, yet there are some confrontations on the circumstances of applying those attacks. This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. The paper also explores the perceived vulnerabilities of implementing RSA algorithm which can render a cryptanalyst easier means of attack. |
format |
Article |
author |
Abubakar, Adamu Jabaka, Shehu Tijani, Bello Idrith Zeki, Akram M. Chiroma, Haruna Usman, Mohammed Joda Raji, Shakirat Mahmud, Murni |
author_facet |
Abubakar, Adamu Jabaka, Shehu Tijani, Bello Idrith Zeki, Akram M. Chiroma, Haruna Usman, Mohammed Joda Raji, Shakirat Mahmud, Murni |
author_sort |
Abubakar, Adamu |
title |
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges |
title_short |
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges |
title_full |
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges |
title_fullStr |
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges |
title_full_unstemmed |
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges |
title_sort |
cryptanalytic attacks on rivest, shamir, and adleman (rsa) cryptosystem: issues and challenges |
publisher |
Little Lion Scientific Islamabad Pakistan |
publishDate |
2014 |
url |
http://irep.iium.edu.my/36589/ http://irep.iium.edu.my/36589/ http://irep.iium.edu.my/36589/1/5Vol61No1.pdf http://irep.iium.edu.my/36589/4/36589_Cryptanalytic%20attacks%20on%20Rivest_SCOPUS.pdf |
first_indexed |
2023-09-18T20:52:24Z |
last_indexed |
2023-09-18T20:52:24Z |
_version_ |
1777410081793507328 |