Title :
Pell´s RSA key generation and its security analysis
Author :
Segar, T. Chandra ; Vijayaragavan, R.
Author_Institution :
Sch. of Inf. Technol. & Eng., VIT Univ., Vellore, India
Abstract :
In this paper, a new variant of RSA has been proposed whose key generation method is distinct with the standard RSA. Generally the RSA family of variants can be applied at the secured channel to enhance its data trust level on various applications such as E-commerce, Internet applications, etc., The boundary level of the private key has been recommended here, to raise over these variant to stay away from the possibility of getting the Small `d´ value either by continuous fraction method of Wiener´s attack, or by Coppersmith´s lattice based method of Boneh & Durfee attack, or by retrieving the Euler´s totient function value by Fermat factorization method. This paper discusses the proposal of Pell´s RSA key generation and its security analyses over the standard RSA, N Prime RSA, Dual RSA. Finally the application of Pell´s RSA, Blind signatures, are proposed.
Keywords :
digital signatures; private key cryptography; public key cryptography; trusted computing; Boneh & Durfee attack; Coppersmith´s lattice based method; Euler´s totient function value; Fermat factorization method; N prime RSA; Pell´s RSA key generation; Wiener´s attack; blind signatures; boundary level; continuous fraction method; data trust level; dual RSA; private key; security analysis; Algorithm design and analysis; Encryption; Public key cryptography; Standards; Cryptanalysis; Cryptography; Extended Euclids algorithm; Pollard & Rho factorization; Public Key Cryptosystem; RSA; Wiener´s Attack; mutiplicative inverse;
Conference_Titel :
Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
Conference_Location :
Tiruchengode
Print_ISBN :
978-1-4799-3925-1
DOI :
10.1109/ICCCNT.2013.6726659