Enhance key generation algorithm based user string identity as public key
This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. This algorithm uses a user’s identity to replace the numbers that are used as a publ...
Main Author: | |
---|---|
Format: | Thesis |
Language: | English English English |
Published: |
2015
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/13065/ http://umpir.ump.edu.my/id/eprint/13065/ http://umpir.ump.edu.my/id/eprint/13065/1/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623.pdf http://umpir.ump.edu.my/id/eprint/13065/2/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623%20-%20CHAP%201.pdf http://umpir.ump.edu.my/id/eprint/13065/3/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623%20-%20CHAP%203.pdf |
id |
ump-13065 |
---|---|
recordtype |
eprints |
spelling |
ump-130652016-05-17T00:50:00Z http://umpir.ump.edu.my/id/eprint/13065/ Enhance key generation algorithm based user string identity as public key Norhidayah, Muhammad Q Science (General) QA Mathematics QA76 Computer software This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. The main advantage of the Tripathi algorithm is that users can easily recall the public key, since it is their own identity. However, this algorithm is unable to use all of users’ E-mail addresses as public keys, only certain E-mails can be used as public keys. This is due to two main reasons: i) this algorithm uses the same modulo value for every E-mail. Consequently, if the E-mail is not relative prime to modulo value, the new E-mail should be entered, and ii) once the E-mail converted to decimal value, it is composed of odd and even numbers. If the decimal value is in even numbers, then it can’t be used as a public key. Only odd decimal values can be used in a public key using the Tripathi algorithm. Therefore, the Tripathi algorithm needs to be improved so that all E-mail addresses can be used as public keys. The proposed algorithm enables the algorithm to be applicable to all E-mail address domains, such as yahoo, gmail, edu, company, among others.In this study, two experiments were conducted. In the first experiment, an algorithm called the LB-RSA was developed. A looping process was added to this algorithm in order to produce a new modulo value to make the E-mail entered relative prime to the new modulo value, which helps to produce more E-mail addresses that can be used as public keys. This algorithm has shown promising results, and 50% of the total number of E-mails can be used as public keys. This number is greater than the amount generated by the Tripathi algorithm, which is only 10%. Since the result produced by this algorithm did not reach 100%, the second experiment was conducted to further enhance the LB-RSA algorithm. In this experiment, an algorithm called the CLB-RSA was developed. Classifications of decimal values to determine whether the E-mail entered contains odd or even numbers were added to this algorithm. This algorithm achieved 100%, hence, all E-mails considered can be used as public keys. 2015-06 Thesis NonPeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/13065/1/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623.pdf application/pdf en http://umpir.ump.edu.my/id/eprint/13065/2/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623%20-%20CHAP%201.pdf application/pdf en http://umpir.ump.edu.my/id/eprint/13065/3/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623%20-%20CHAP%203.pdf Norhidayah, Muhammad (2015) Enhance key generation algorithm based user string identity as public key. Masters thesis, Universiti Malaysia Pahang. http://iportal.ump.edu.my/lib/item?id=chamo:94206&theme=UMP2 |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
Universiti Malaysia Pahang |
building |
UMP Institutional Repository |
collection |
Online Access |
language |
English English English |
topic |
Q Science (General) QA Mathematics QA76 Computer software |
spellingShingle |
Q Science (General) QA Mathematics QA76 Computer software Norhidayah, Muhammad Enhance key generation algorithm based user string identity as public key |
description |
This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. The main advantage of the Tripathi algorithm is that users can easily recall the public key, since it is their own identity. However, this algorithm is unable to use all of users’ E-mail addresses as public keys, only certain E-mails can be used as public keys. This is due to two main reasons: i) this algorithm uses the same modulo value for every E-mail. Consequently, if the E-mail is not relative prime to modulo value, the new E-mail should be entered, and ii) once the E-mail converted to decimal value, it is composed of odd and even numbers. If the decimal value is in even numbers, then it can’t be used as a public key. Only odd decimal values can be used in a public key using the Tripathi algorithm. Therefore, the Tripathi algorithm needs to be improved so that all E-mail addresses can be used as public keys. The proposed algorithm enables the algorithm to be applicable to all E-mail address domains, such as yahoo, gmail, edu, company, among others.In this study, two experiments were conducted. In the first experiment, an algorithm called the LB-RSA was developed. A looping process was added to this algorithm in order to produce a new modulo value to make the E-mail entered relative prime to the new modulo value, which helps to produce more E-mail addresses that can be used as public keys. This algorithm has shown promising results, and 50% of the total number of E-mails can be used as public keys. This number is greater than the amount generated by the Tripathi algorithm, which is only 10%. Since the result produced by this algorithm did not reach 100%, the second experiment was conducted to further enhance the LB-RSA algorithm. In this experiment, an algorithm called the CLB-RSA was developed. Classifications of decimal values to determine whether the E-mail entered contains odd or even numbers were added to this algorithm. This
algorithm achieved 100%, hence, all E-mails considered can be used as public keys. |
format |
Thesis |
author |
Norhidayah, Muhammad |
author_facet |
Norhidayah, Muhammad |
author_sort |
Norhidayah, Muhammad |
title |
Enhance key generation algorithm based user string identity as public key |
title_short |
Enhance key generation algorithm based user string identity as public key |
title_full |
Enhance key generation algorithm based user string identity as public key |
title_fullStr |
Enhance key generation algorithm based user string identity as public key |
title_full_unstemmed |
Enhance key generation algorithm based user string identity as public key |
title_sort |
enhance key generation algorithm based user string identity as public key |
publishDate |
2015 |
url |
http://umpir.ump.edu.my/id/eprint/13065/ http://umpir.ump.edu.my/id/eprint/13065/ http://umpir.ump.edu.my/id/eprint/13065/1/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623.pdf http://umpir.ump.edu.my/id/eprint/13065/2/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623%20-%20CHAP%201.pdf http://umpir.ump.edu.my/id/eprint/13065/3/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623%20-%20CHAP%203.pdf |
first_indexed |
2023-09-18T22:15:15Z |
last_indexed |
2023-09-18T22:15:15Z |
_version_ |
1777415294120099840 |