Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges

RSA cryptosystem is an information security algorithm used for encrypting and decrypting of digital data in order to protect the content of the data and to ensure its privacy. Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and sy...

Full description

Saved in:
Bibliographic Details
Main Authors: Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni
Format: Article
Language:English
English
Published: Little Lion Scientific Islamabad Pakistan 2014
Subjects:
Online Access:http://irep.iium.edu.my/36589/1/5Vol61No1.pdf
http://irep.iium.edu.my/36589/4/36589_Cryptanalytic%20attacks%20on%20Rivest_SCOPUS.pdf
http://irep.iium.edu.my/36589/
http://www.jatit.org/volumes/Vol61No1/5Vol61No1.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.iium.irep.36589
record_format dspace
spelling my.iium.irep.365892020-11-03T07:01:44Z http://irep.iium.edu.my/36589/ Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges Abubakar, Adamu Jabaka, Shehu Tijani, Bello Idrith Zeki, Akram M. Chiroma, Haruna Usman, Mohammed Joda Raji, Shakirat Mahmud, Murni T Technology (General) RSA cryptosystem is an information security algorithm used for encrypting and decrypting of digital data in order to protect the content of the data and to ensure its privacy. Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. In an email application, it's utilized to ensure the privacy and authenticity of email message. Some studies have also shown the efficiency of RSA algorithm in securing remote login sessions, and electronic credit-card payment systems. Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. Its strength lies with its ability of withstanding many forms of attacks. While many studies focus on proving that RSA algorithm is breakable under certain cryptanalytic attacks, yet there are some confrontations on the circumstances of applying those attacks. This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. The paper also explores the perceived vulnerabilities of implementing RSA algorithm which can render a cryptanalyst easier means of attack. Little Lion Scientific Islamabad Pakistan 2014-03-10 Article PeerReviewed application/pdf en http://irep.iium.edu.my/36589/1/5Vol61No1.pdf application/pdf en http://irep.iium.edu.my/36589/4/36589_Cryptanalytic%20attacks%20on%20Rivest_SCOPUS.pdf Abubakar, Adamu and Jabaka, Shehu and Tijani, Bello Idrith and Zeki, Akram M. and Chiroma, Haruna and Usman, Mohammed Joda and Raji, Shakirat and Mahmud, Murni (2014) Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges. Journal of Theoretical and Applied Information Technology, 61 (1). pp. 37-43. ISSN 1992-8645 E-ISSN 1817-3195 http://www.jatit.org/volumes/Vol61No1/5Vol61No1.pdf
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
English
topic T Technology (General)
spellingShingle T Technology (General)
Abubakar, Adamu
Jabaka, Shehu
Tijani, Bello Idrith
Zeki, Akram M.
Chiroma, Haruna
Usman, Mohammed Joda
Raji, Shakirat
Mahmud, Murni
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
description RSA cryptosystem is an information security algorithm used for encrypting and decrypting of digital data in order to protect the content of the data and to ensure its privacy. Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. In an email application, it's utilized to ensure the privacy and authenticity of email message. Some studies have also shown the efficiency of RSA algorithm in securing remote login sessions, and electronic credit-card payment systems. Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. Its strength lies with its ability of withstanding many forms of attacks. While many studies focus on proving that RSA algorithm is breakable under certain cryptanalytic attacks, yet there are some confrontations on the circumstances of applying those attacks. This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. The paper also explores the perceived vulnerabilities of implementing RSA algorithm which can render a cryptanalyst easier means of attack.
format Article
author Abubakar, Adamu
Jabaka, Shehu
Tijani, Bello Idrith
Zeki, Akram M.
Chiroma, Haruna
Usman, Mohammed Joda
Raji, Shakirat
Mahmud, Murni
author_facet Abubakar, Adamu
Jabaka, Shehu
Tijani, Bello Idrith
Zeki, Akram M.
Chiroma, Haruna
Usman, Mohammed Joda
Raji, Shakirat
Mahmud, Murni
author_sort Abubakar, Adamu
title Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
title_short Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
title_full Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
title_fullStr Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
title_full_unstemmed Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
title_sort cryptanalytic attacks on rivest, shamir, and adleman (rsa) cryptosystem: issues and challenges
publisher Little Lion Scientific Islamabad Pakistan
publishDate 2014
url http://irep.iium.edu.my/36589/1/5Vol61No1.pdf
http://irep.iium.edu.my/36589/4/36589_Cryptanalytic%20attacks%20on%20Rivest_SCOPUS.pdf
http://irep.iium.edu.my/36589/
http://www.jatit.org/volumes/Vol61No1/5Vol61No1.pdf
_version_ 1683230331198504960
score 13.159267