Enhance key generation algorithm based user string identity as public key

This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. This algorithm uses a user’s identity to replace the numbers that are used as a publ...

Full description

Bibliographic Details
Main Author: Norhidayah, Muhammad
Format: Thesis
Language:English
English
English
Published: 2015
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/13065/
http://umpir.ump.edu.my/id/eprint/13065/
http://umpir.ump.edu.my/id/eprint/13065/1/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623.pdf
http://umpir.ump.edu.my/id/eprint/13065/2/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623%20-%20CHAP%201.pdf
http://umpir.ump.edu.my/id/eprint/13065/3/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623%20-%20CHAP%203.pdf
id ump-13065
recordtype eprints
spelling ump-130652016-05-17T00:50:00Z http://umpir.ump.edu.my/id/eprint/13065/ Enhance key generation algorithm based user string identity as public key Norhidayah, Muhammad Q Science (General) QA Mathematics QA76 Computer software This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. The main advantage of the Tripathi algorithm is that users can easily recall the public key, since it is their own identity. However, this algorithm is unable to use all of users’ E-mail addresses as public keys, only certain E-mails can be used as public keys. This is due to two main reasons: i) this algorithm uses the same modulo value for every E-mail. Consequently, if the E-mail is not relative prime to modulo value, the new E-mail should be entered, and ii) once the E-mail converted to decimal value, it is composed of odd and even numbers. If the decimal value is in even numbers, then it can’t be used as a public key. Only odd decimal values can be used in a public key using the Tripathi algorithm. Therefore, the Tripathi algorithm needs to be improved so that all E-mail addresses can be used as public keys. The proposed algorithm enables the algorithm to be applicable to all E-mail address domains, such as yahoo, gmail, edu, company, among others.In this study, two experiments were conducted. In the first experiment, an algorithm called the LB-RSA was developed. A looping process was added to this algorithm in order to produce a new modulo value to make the E-mail entered relative prime to the new modulo value, which helps to produce more E-mail addresses that can be used as public keys. This algorithm has shown promising results, and 50% of the total number of E-mails can be used as public keys. This number is greater than the amount generated by the Tripathi algorithm, which is only 10%. Since the result produced by this algorithm did not reach 100%, the second experiment was conducted to further enhance the LB-RSA algorithm. In this experiment, an algorithm called the CLB-RSA was developed. Classifications of decimal values to determine whether the E-mail entered contains odd or even numbers were added to this algorithm. This algorithm achieved 100%, hence, all E-mails considered can be used as public keys. 2015-06 Thesis NonPeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/13065/1/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623.pdf application/pdf en http://umpir.ump.edu.my/id/eprint/13065/2/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623%20-%20CHAP%201.pdf application/pdf en http://umpir.ump.edu.my/id/eprint/13065/3/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623%20-%20CHAP%203.pdf Norhidayah, Muhammad (2015) Enhance key generation algorithm based user string identity as public key. Masters thesis, Universiti Malaysia Pahang. http://iportal.ump.edu.my/lib/item?id=chamo:94206&theme=UMP2
repository_type Digital Repository
institution_category Local University
institution Universiti Malaysia Pahang
building UMP Institutional Repository
collection Online Access
language English
English
English
topic Q Science (General)
QA Mathematics
QA76 Computer software
spellingShingle Q Science (General)
QA Mathematics
QA76 Computer software
Norhidayah, Muhammad
Enhance key generation algorithm based user string identity as public key
description This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. The main advantage of the Tripathi algorithm is that users can easily recall the public key, since it is their own identity. However, this algorithm is unable to use all of users’ E-mail addresses as public keys, only certain E-mails can be used as public keys. This is due to two main reasons: i) this algorithm uses the same modulo value for every E-mail. Consequently, if the E-mail is not relative prime to modulo value, the new E-mail should be entered, and ii) once the E-mail converted to decimal value, it is composed of odd and even numbers. If the decimal value is in even numbers, then it can’t be used as a public key. Only odd decimal values can be used in a public key using the Tripathi algorithm. Therefore, the Tripathi algorithm needs to be improved so that all E-mail addresses can be used as public keys. The proposed algorithm enables the algorithm to be applicable to all E-mail address domains, such as yahoo, gmail, edu, company, among others.In this study, two experiments were conducted. In the first experiment, an algorithm called the LB-RSA was developed. A looping process was added to this algorithm in order to produce a new modulo value to make the E-mail entered relative prime to the new modulo value, which helps to produce more E-mail addresses that can be used as public keys. This algorithm has shown promising results, and 50% of the total number of E-mails can be used as public keys. This number is greater than the amount generated by the Tripathi algorithm, which is only 10%. Since the result produced by this algorithm did not reach 100%, the second experiment was conducted to further enhance the LB-RSA algorithm. In this experiment, an algorithm called the CLB-RSA was developed. Classifications of decimal values to determine whether the E-mail entered contains odd or even numbers were added to this algorithm. This algorithm achieved 100%, hence, all E-mails considered can be used as public keys.
format Thesis
author Norhidayah, Muhammad
author_facet Norhidayah, Muhammad
author_sort Norhidayah, Muhammad
title Enhance key generation algorithm based user string identity as public key
title_short Enhance key generation algorithm based user string identity as public key
title_full Enhance key generation algorithm based user string identity as public key
title_fullStr Enhance key generation algorithm based user string identity as public key
title_full_unstemmed Enhance key generation algorithm based user string identity as public key
title_sort enhance key generation algorithm based user string identity as public key
publishDate 2015
url http://umpir.ump.edu.my/id/eprint/13065/
http://umpir.ump.edu.my/id/eprint/13065/
http://umpir.ump.edu.my/id/eprint/13065/1/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623.pdf
http://umpir.ump.edu.my/id/eprint/13065/2/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623%20-%20CHAP%201.pdf
http://umpir.ump.edu.my/id/eprint/13065/3/FSKKP%20-%20NORHIDAYAH%20MUHAMMAD%20-%20CD%209623%20-%20CHAP%203.pdf
first_indexed 2023-09-18T22:15:15Z
last_indexed 2023-09-18T22:15:15Z
_version_ 1777415294120099840