Loop-based RSA Key Generation Algorithm using String Identity

This paper will propose i-RSA algorithm, this algorithm is focus on key generation algorithm. Enhancement of this algorithm is user identity can be used as a public key such as email address. Previous algorithm was successful used email identity as a public key, but not all type of email can used as...

Full description

Saved in:
Bibliographic Details
Main Authors: Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman
Format: Conference or Workshop Item
Language:English
Published: IEEE 2013
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/5794/1/06703904.pdf
http://umpir.ump.edu.my/id/eprint/5794/
http://dx.doi.org/10.1109/ICCAS.2013.6703904
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.ump.umpir.5794
record_format eprints
spelling my.ump.umpir.57942018-05-21T06:47:22Z http://umpir.ump.edu.my/id/eprint/5794/ Loop-based RSA Key Generation Algorithm using String Identity Norhidayah, Muhammad Jasni, Mohamad Zain Md Yazid, Mohd Saman QA75 Electronic computers. Computer science This paper will propose i-RSA algorithm, this algorithm is focus on key generation algorithm. Enhancement of this algorithm is user identity can be used as a public key such as email address. Previous algorithm was successful used email identity as a public key, but not all type of email can used as a public key. So we propose i-RSA algorithm that can produces 66.6% compared to previous algorithm (46.67%) email can be a string public key. The differences between i-RSA and previous algorithm are looping process in key generation, to get new value of p and q parameter, looping process will stop when value of k is equal to 1, and the email can be a public key. RSA algorithm and CRC 32 hash function will be explain in preliminaries section. Detail explanations of i-RSA algorithm in propose algorithm section. In future, i-RSA algorithm can be improved, so that 100% of email can be a public key. IEEE 2013 Conference or Workshop Item PeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/5794/1/06703904.pdf Norhidayah, Muhammad and Jasni, Mohamad Zain and Md Yazid, Mohd Saman (2013) Loop-based RSA Key Generation Algorithm using String Identity. In: 13th International Conference on Control, Automation and Systems (ICCAS 2013), 20-23 October 2013 , Kimdaejung Convention Center, Gwangju, Korea. pp. 255-258.. ISSN 2093-7121 http://dx.doi.org/10.1109/ICCAS.2013.6703904 10.1109/ICCAS.2013.6703904
institution Universiti Malaysia Pahang
building UMP Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Pahang
content_source UMP Institutional Repository
url_provider http://umpir.ump.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Norhidayah, Muhammad
Jasni, Mohamad Zain
Md Yazid, Mohd Saman
Loop-based RSA Key Generation Algorithm using String Identity
description This paper will propose i-RSA algorithm, this algorithm is focus on key generation algorithm. Enhancement of this algorithm is user identity can be used as a public key such as email address. Previous algorithm was successful used email identity as a public key, but not all type of email can used as a public key. So we propose i-RSA algorithm that can produces 66.6% compared to previous algorithm (46.67%) email can be a string public key. The differences between i-RSA and previous algorithm are looping process in key generation, to get new value of p and q parameter, looping process will stop when value of k is equal to 1, and the email can be a public key. RSA algorithm and CRC 32 hash function will be explain in preliminaries section. Detail explanations of i-RSA algorithm in propose algorithm section. In future, i-RSA algorithm can be improved, so that 100% of email can be a public key.
format Conference or Workshop Item
author Norhidayah, Muhammad
Jasni, Mohamad Zain
Md Yazid, Mohd Saman
author_facet Norhidayah, Muhammad
Jasni, Mohamad Zain
Md Yazid, Mohd Saman
author_sort Norhidayah, Muhammad
title Loop-based RSA Key Generation Algorithm using String Identity
title_short Loop-based RSA Key Generation Algorithm using String Identity
title_full Loop-based RSA Key Generation Algorithm using String Identity
title_fullStr Loop-based RSA Key Generation Algorithm using String Identity
title_full_unstemmed Loop-based RSA Key Generation Algorithm using String Identity
title_sort loop-based rsa key generation algorithm using string identity
publisher IEEE
publishDate 2013
url http://umpir.ump.edu.my/id/eprint/5794/1/06703904.pdf
http://umpir.ump.edu.my/id/eprint/5794/
http://dx.doi.org/10.1109/ICCAS.2013.6703904
_version_ 1643665250007908352
score 13.19449