Loop-based RSA Key Generation Algorithm using String Identity
This paper will propose i-RSA algorithm, this algorithm is focus on key generation algorithm. Enhancement of this algorithm is user identity can be used as a public key such as email address. Previous algorithm was successful used email identity as a public key, but not all type of email can used as...
| Main Authors: | , , |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2013
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/5794/ http://umpir.ump.edu.my/id/eprint/5794/ http://umpir.ump.edu.my/id/eprint/5794/ http://umpir.ump.edu.my/id/eprint/5794/1/06703904.pdf |
| id |
ump-5794 |
|---|---|
| recordtype |
eprints |
| spelling |
ump-57942018-05-21T06:47:22Z http://umpir.ump.edu.my/id/eprint/5794/ Loop-based RSA Key Generation Algorithm using String Identity Norhidayah, Muhammad Jasni, Mohamad Zain Md Yazid, Mohd Saman QA75 Electronic computers. Computer science This paper will propose i-RSA algorithm, this algorithm is focus on key generation algorithm. Enhancement of this algorithm is user identity can be used as a public key such as email address. Previous algorithm was successful used email identity as a public key, but not all type of email can used as a public key. So we propose i-RSA algorithm that can produces 66.6% compared to previous algorithm (46.67%) email can be a string public key. The differences between i-RSA and previous algorithm are looping process in key generation, to get new value of p and q parameter, looping process will stop when value of k is equal to 1, and the email can be a public key. RSA algorithm and CRC 32 hash function will be explain in preliminaries section. Detail explanations of i-RSA algorithm in propose algorithm section. In future, i-RSA algorithm can be improved, so that 100% of email can be a public key. IEEE 2013 Conference or Workshop Item PeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/5794/1/06703904.pdf Norhidayah, Muhammad and Jasni, Mohamad Zain and Md Yazid, Mohd Saman (2013) Loop-based RSA Key Generation Algorithm using String Identity. In: 13th International Conference on Control, Automation and Systems (ICCAS 2013), 20-23 October 2013 , Kimdaejung Convention Center, Gwangju, Korea. pp. 255-258.. ISSN 2093-7121 http://dx.doi.org/10.1109/ICCAS.2013.6703904 10.1109/ICCAS.2013.6703904 |
| repository_type |
Digital Repository |
| institution_category |
Local University |
| institution |
Universiti Malaysia Pahang |
| building |
UMP Institutional Repository |
| collection |
Online Access |
| language |
English |
| topic |
QA75 Electronic computers. Computer science |
| spellingShingle |
QA75 Electronic computers. Computer science Norhidayah, Muhammad Jasni, Mohamad Zain Md Yazid, Mohd Saman Loop-based RSA Key Generation Algorithm using String Identity |
| description |
This paper will propose i-RSA algorithm, this algorithm is focus on key generation algorithm. Enhancement of this algorithm is user identity can be used as a public key such as email address. Previous algorithm was successful used email identity as a public key, but not all type of email can used as a public key. So we propose i-RSA algorithm
that can produces 66.6% compared to previous algorithm (46.67%) email can be a string public key. The differences
between i-RSA and previous algorithm are looping process in key generation, to get new value of p and q parameter, looping process will stop when value of k is equal to 1, and the email can be a public key. RSA algorithm and CRC 32
hash function will be explain in preliminaries section. Detail explanations of i-RSA algorithm in propose algorithm
section. In future, i-RSA algorithm can be improved, so that 100% of email can be a public key. |
| format |
Conference or Workshop Item |
| author |
Norhidayah, Muhammad Jasni, Mohamad Zain Md Yazid, Mohd Saman |
| author_facet |
Norhidayah, Muhammad Jasni, Mohamad Zain Md Yazid, Mohd Saman |
| author_sort |
Norhidayah, Muhammad |
| title |
Loop-based RSA Key Generation Algorithm using String Identity |
| title_short |
Loop-based RSA Key Generation Algorithm using String Identity |
| title_full |
Loop-based RSA Key Generation Algorithm using String Identity |
| title_fullStr |
Loop-based RSA Key Generation Algorithm using String Identity |
| title_full_unstemmed |
Loop-based RSA Key Generation Algorithm using String Identity |
| title_sort |
loop-based rsa key generation algorithm using string identity |
| publisher |
IEEE |
| publishDate |
2013 |
| url |
http://umpir.ump.edu.my/id/eprint/5794/ http://umpir.ump.edu.my/id/eprint/5794/ http://umpir.ump.edu.my/id/eprint/5794/ http://umpir.ump.edu.my/id/eprint/5794/1/06703904.pdf |
| first_indexed |
2023-09-18T22:01:11Z |
| last_indexed |
2023-09-18T22:01:11Z |
| _version_ |
1777414408910143488 |