Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges

RSA cryptosystem is an information security algorithm used for encrypting and decrypting of digital data in order to protect the content of the data and to ensure its privacy. Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and sy...

Full description

Bibliographic Details
Main Authors: Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni
Format: Article
Language:English
English
Published: Little Lion Scientific Islamabad Pakistan 2014
Subjects:
Online Access:http://irep.iium.edu.my/36589/
http://irep.iium.edu.my/36589/
http://irep.iium.edu.my/36589/1/5Vol61No1.pdf
http://irep.iium.edu.my/36589/4/36589_Cryptanalytic%20attacks%20on%20Rivest_SCOPUS.pdf
id iium-36589
recordtype eprints
spelling iium-365892017-09-19T07:25:53Z http://irep.iium.edu.my/36589/ Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges Abubakar, Adamu Jabaka, Shehu Tijani, Bello Idrith Zeki, Akram M. Chiroma, Haruna Usman, Mohammed Joda Raji, Shakirat Mahmud, Murni T Technology (General) RSA cryptosystem is an information security algorithm used for encrypting and decrypting of digital data in order to protect the content of the data and to ensure its privacy. Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. In an email application, it's utilized to ensure the privacy and authenticity of email message. Some studies have also shown the efficiency of RSA algorithm in securing remote login sessions, and electronic credit-card payment systems. Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. Its strength lies with its ability of withstanding many forms of attacks. While many studies focus on proving that RSA algorithm is breakable under certain cryptanalytic attacks, yet there are some confrontations on the circumstances of applying those attacks. This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. The paper also explores the perceived vulnerabilities of implementing RSA algorithm which can render a cryptanalyst easier means of attack. Little Lion Scientific Islamabad Pakistan 2014-03-10 Article PeerReviewed application/pdf en http://irep.iium.edu.my/36589/1/5Vol61No1.pdf application/pdf en http://irep.iium.edu.my/36589/4/36589_Cryptanalytic%20attacks%20on%20Rivest_SCOPUS.pdf Abubakar, Adamu and Jabaka, Shehu and Tijani, Bello Idrith and Zeki, Akram M. and Chiroma, Haruna and Usman, Mohammed Joda and Raji, Shakirat and Mahmud, Murni (2014) Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges. Journal of Theoretical and Applied Information Technology, 61 (1). pp. 37-43. ISSN 1817-3195 (O), 1992-8645 (P) http://www.jatit.org/volumes/Vol61No1/5Vol61No1.pdf
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
English
topic T Technology (General)
spellingShingle T Technology (General)
Abubakar, Adamu
Jabaka, Shehu
Tijani, Bello Idrith
Zeki, Akram M.
Chiroma, Haruna
Usman, Mohammed Joda
Raji, Shakirat
Mahmud, Murni
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
description RSA cryptosystem is an information security algorithm used for encrypting and decrypting of digital data in order to protect the content of the data and to ensure its privacy. Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. In an email application, it's utilized to ensure the privacy and authenticity of email message. Some studies have also shown the efficiency of RSA algorithm in securing remote login sessions, and electronic credit-card payment systems. Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. Its strength lies with its ability of withstanding many forms of attacks. While many studies focus on proving that RSA algorithm is breakable under certain cryptanalytic attacks, yet there are some confrontations on the circumstances of applying those attacks. This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. The paper also explores the perceived vulnerabilities of implementing RSA algorithm which can render a cryptanalyst easier means of attack.
format Article
author Abubakar, Adamu
Jabaka, Shehu
Tijani, Bello Idrith
Zeki, Akram M.
Chiroma, Haruna
Usman, Mohammed Joda
Raji, Shakirat
Mahmud, Murni
author_facet Abubakar, Adamu
Jabaka, Shehu
Tijani, Bello Idrith
Zeki, Akram M.
Chiroma, Haruna
Usman, Mohammed Joda
Raji, Shakirat
Mahmud, Murni
author_sort Abubakar, Adamu
title Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
title_short Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
title_full Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
title_fullStr Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
title_full_unstemmed Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
title_sort cryptanalytic attacks on rivest, shamir, and adleman (rsa) cryptosystem: issues and challenges
publisher Little Lion Scientific Islamabad Pakistan
publishDate 2014
url http://irep.iium.edu.my/36589/
http://irep.iium.edu.my/36589/
http://irep.iium.edu.my/36589/1/5Vol61No1.pdf
http://irep.iium.edu.my/36589/4/36589_Cryptanalytic%20attacks%20on%20Rivest_SCOPUS.pdf
first_indexed 2023-09-18T20:52:24Z
last_indexed 2023-09-18T20:52:24Z
_version_ 1777410081793507328