℘1 | ℘2 | E | K.G. (sec) | E.(sec) | D.(sec) |
19 | 23 | 7 | 0.005716 | 0.376943 | 0.005716 |
17 | 29 | 3 | 0.004420 | 0.375985 | 0.007462 |
13 | 31 | 7 | 0.006389 | 0.379625 | 0.008168 |
31 | 11 | 3 | 0.007449 | 0.378423 | 0.007617 |
11 | 29 | 3 | 0.007284 | 0.376564 | 0.008133 |
This article introduced a new generalized RSA crypto-system based on 2n prime numbers called generalized RSA (GRSA). This is a modern technique to provide supreme security for the computer world by factoring the variableN, where its analysis process has become much easier nowadays with the development of tools and equipment. 2n primes (prime numbers) are used in the GRSA crypto-system to provide security over the network system. This includes encryption, key generation, and decryption. In this method we used 2n primes which are not easily broken, 2n primes are not comfortably demented. This method provides greater performance and fidelity over the network system.
Citation: Tariq Shah, Muhammad Zohaib, Qin Xin, Bander Almutairi, Muhammad Sajjad. Generalization of RSA cryptosystem based on 2n primes[J]. AIMS Mathematics, 2023, 8(8): 18833-18845. doi: 10.3934/math.2023958
[1] | Wan Nur Aqlili Ruzai, You Ying, Khairun Nisak Muhammad, Muhammad Asyraf Asbullah, Muhammad Rezal Kamel Ariffin . Concurrent factorization of RSA moduli via weak key equations. AIMS Mathematics, 2024, 9(10): 28211-28231. doi: 10.3934/math.20241368 |
[2] | Hafeez Ur Rehman, Mohammad Mazyad Hazzazi, Tariq Shah, Amer Aljaedi, Zaid Bassfar . Color image encryption by piecewise function and elliptic curve over the Galois field GF(2n). AIMS Mathematics, 2024, 9(3): 5722-5745. doi: 10.3934/math.2024278 |
[3] | Limin Zhou, Qiuyang Wang . Simple PKE schemes from the TSPEM problem. AIMS Mathematics, 2024, 9(8): 22197-22212. doi: 10.3934/math.20241079 |
[4] | Majid Khan, Hafiz Muhammad Waseem . An efficient confidentiality scheme based on quadratic chaotic map and Fibonacci sequence. AIMS Mathematics, 2024, 9(10): 27220-27246. doi: 10.3934/math.20241323 |
[5] | Elahe Mehraban, T. Aaron Gulliver, Salah Mahmoud Boulaaras, Kamyar Hosseini, Evren Hincal . New sequences from the generalized Pell p−numbers and mersenne numbers and their application in cryptography. AIMS Mathematics, 2024, 9(5): 13537-13552. doi: 10.3934/math.2024660 |
[6] | Erdal Bayram, Gülşah Çelik, Mustafa Gezek . An advanced encryption system based on soft sets. AIMS Mathematics, 2024, 9(11): 32232-32256. doi: 10.3934/math.20241547 |
[7] | Abdul Razaq, Muhammad Mahboob Ahsan, Hanan Alolaiyan, Musheer Ahmad, Qin Xin . Enhancing the robustness of block ciphers through a graphical S-box evolution scheme for secure multimedia applications. AIMS Mathematics, 2024, 9(12): 35377-35400. doi: 10.3934/math.20241681 |
[8] | Nawras H. Sabbry, Alla Levina . Nonce generation techniques in Schnorr multi-signatures: Exploring EdDSA-inspired approaches. AIMS Mathematics, 2024, 9(8): 20304-20325. doi: 10.3934/math.2024988 |
[9] | Mohammad Hamidi, Irina Cristea . Hyperideal-based zero-divisor graph of the general hyperring Zn. AIMS Mathematics, 2024, 9(6): 15891-15910. doi: 10.3934/math.2024768 |
[10] | Shatha Alghueiri, Khaldoun Al-Zoubi . On graded 2-absorbing Ie-prime submodules of graded modules over graded commutative rings. AIMS Mathematics, 2020, 5(6): 7624-7631. doi: 10.3934/math.2020487 |
This article introduced a new generalized RSA crypto-system based on 2n prime numbers called generalized RSA (GRSA). This is a modern technique to provide supreme security for the computer world by factoring the variableN, where its analysis process has become much easier nowadays with the development of tools and equipment. 2n primes (prime numbers) are used in the GRSA crypto-system to provide security over the network system. This includes encryption, key generation, and decryption. In this method we used 2n primes which are not easily broken, 2n primes are not comfortably demented. This method provides greater performance and fidelity over the network system.
Modern computers and the transmission of high technology are an important part of the powerful economy, so it is important to have appropriate security systems and technologies to meet these security demands. Modern security systems and conventions have been evolved that are established on standards, predominantly from well-known establishments such as the Internet Architecture Board (IAB) and Internet Engineering Task Force (IETF). These establishments offer a wide range of security settlement, algorithms, and implementations that give security services and converge the requirements of data privacy, uprightness, and secure transmissions. A significant mechanism for data conservation is utilized cryptography, which overrides many security tools and evolves the science of material encryption and decryption [1]. Cryptography delegates us to securely save secret data or communicate it to insecure networks that no one but the intended recipient can read (Kahn, 1967) [2,3]. Using an important mechanism such as encryption we have limited access to privacy, legitimacy, rectitude, and data. Cryptography distinguishes between private (also known as traditional intelligence) systems and public key cryptographic systems. The private key also called the non-public key or secret key, it has classical history, and is based on the use of a common non-public key encryption and decryption [4,5]. Nonlinear components of a block cipher over vector algebra for symmetric key cryptography are explained by Sajjad and Shah in [6,7,8].
Many algorithms have been proposed for public key cryptography, the most developed in 1978 by Rivest, Shamir, and Adelman [9,10]. In RSA, security relies on the supposition that it is hard to find the factorization of big numbers and obtain the private key used for decryption. But there are some flaws in the RSA algorithm, decryption is established on ℵ, and d the private key is uncomplicated to factor in [11,12,13,14]. Public key Cryptography represents a massive change in the field of cryptosystems. It uses two separate keys that are linked together such that the private key may be used to decrypt the message and the public key is used to encrypt the message. Improve security by modifying the RSA algorithm [15], the schema is based on four prime numbers rather than two, with a double encryption and decryption process. Multiple prime numbers increase the factoring time required to obtain the private key.
This research article introduced a new modification of the RSA cryptosystem, which is generalized RSA (GRSA) based on 2n different primes. The e1, e2, e3, …en are public keys used for encryption, and d1, d2, d3, …dn are non-public keys used for decryption. This conception is based on 2n different primes instead of two primes, which allows a larger encryption exponent from the huge product ℵ to intensify security. Several prime numbers and large encryption exponents increase the factoring time compared to the RSA algorithm.
In [11], the implementation of RSA focused on three areas: key generation, decryption, and encryption procedure.
The private key and the public key are the two distinct varieties of RSA keys. The major steps in a key generation are shown below;
• Pick two primes ℘1, and ℘2. Let ℵ be the product of ℘1 and ℘2 as ℵ=℘1·℘2
• Find Euler Phi Function of ℵ as φ(ℵ)=φ(℘1)·φ(℘2).
• Choose a number e coprime to φ(ℵ).
• Find d is the inverse of e as d.e≡1(modφ(ℵ)).
• Public key =(ℵ,e).
• Private key =(ℵ,d).
Encryption is performed in RSA using a public key to create cipher text. The steps necessary to decrypt are described as
• The recipient's public key is received (ℵ,e).
• Displays text as a number.
• Determine the Cipher message C=(T)e(modℵ).
• Send encoded data.
In RSA, the private key is used for decryption in order to obtain plain text. These are the decryption steps:
• Calculate T=(C)d(modℵ) using a non-public key.
• Eliminates plain text from a number T.
Key Generation
Let ℘1=89, and ℘2=101 be the two primes ℵ=℘1·℘2=89.101=8989,
φ(ℵ)=(℘1−1).(℘2−1)=8800 |
We choose e=3 less than and co-prime to φ(ℵ).
The inverse of 3 is 3−1mod(8800)=5867. Hence the secret key is d=5867.
Public key =(8989,3).
Private key =(8989,5867).
Encryption
Alice sends a message T=8765.
The cipher text calculated by Alice is C=Te(modℵ).
C=(8765)3(mod8989)=5815 |
Decryption
Bob can retrieve the plain text from cipher text using T=Cd(modℵ).
T=(5815)5867(mod8989) |
Hence, T=8765 is a recovered plain text.
In this article, we will discuss the RSA algorithm for four primes. The private and public key consists of three components [13]. Let ℵ be the product of primes ℘1, ℘2, ℘3, and ℘4. (ℵ,e1,e2) be the components of the public key, where e1 and e2 are chosen randomly. Since ℵ is kept as private and public components, given with the information of ℵ, is unable to ascertain the value of the four basic prime numbers, which form the basis for calculating the value of ℵ, and later e1 and e2. (ℵ,d1,d2) be the components of the private key, where d1 is the inverse of e1 and d2 is the inverse of e2. For security purposes, all four selected prime bits are the same length.
The steps for generating the key are given below
• Choose four primes ℘1,℘2,℘3,℘4. And ℵ is the product of ℘1, ℘2,℘3,℘4 as ℵ=℘1·℘2·℘3·℘4.
• Euler phi function of ℵ is φ(ℵ)=φ(℘1)·φ(℘2)·φ(℘3)·φ(℘4).
• Choose e1, e2 two coprime to φ(ℵ).
• Find d1 and d2 which is inverses of e1 and e2 respectively e1d1≡1(modφ(ℵ)) and e2d2≡1(modφ(ℵ)).
• Public key =(ℵ,e1,e2).
• Private key =(ℵ,d1,d2).
With the use of public key (ℵ,e1,e2) encryption is broken. The encryption steps are given below:
• Receives the public key (ℵ,e1,e2).
• Displays the plain message as a positive number.
• Determine cipher text C=(Te1modℵ)e2modℵ.
• Send cipher message.
Decrypt the cipher text into plain text with the support of a non-secret key in RSA. The decryption steps are given below:
• Compute C=(Td1modℵ)d2(modℵ).
• Extracts a plain text from a number representing T.
Choose four distinct primes ℘1=2, ℘2=11, ℘3 =5, ℘4=17.
ℵ=℘1·℘2·℘3·℘4=2·11·5·17=1870 |
Euler phi value of ℵ is φ(ℵ)=640. Choose e1=17 satisfying 1<e1<φ(ℵ) and (e1,φ(ℵ))=1. Compute d1=113, such that d1e1≡1(modφ(ℵ)). Choose e2=21 satisfying 1<e2<φ(ℵ) and gcd(e2,φ(ℵ))=1.Calculate d2=61 such that d2e2≡1(modφ(ℵ)). The public key is (1870,17,21), and plain text =T=1399.
C=[Te1(mod1870)]e2mod1870 |
C=[1569]e2mod1870=1459 |
The private key is (1870,113,61).
T=[Cd1mod1870]d2mod1870 |
T=[1289]61mod1870=1399. |
Now we discuss the RSA algorithm consists of six primes. The private and public key consists four of components. ℵ is a product of prime numbers ℘1, ℘2, ℘3, ℘4, ℘5, ℘6. (ℵ,e1,e2,e3) be the components of the public key, where e1, e2 and e3 are chosen randomly which are coprime to φ(ℵ). Since ℵ is kept as private and public components, with the wisdom of ℵ, the attacker cannot obtain the value of the six primes used to determine the value of ℵ and later e1, e2, and e3. (ℵ,d1,d2,d3) be the components of the private key, where d1 is the inverse of e1 and d2 is the inverse of e2, and d3 is the inverse of e3. For security purposes, all six selected prime bits are the same length.
The steps for generating the key are given below as;
• Let six primes ℘1, ℘2, ℘3, ℘4, ℘5, ℘6, and ℵ be the product of ℘1, ℘2, ℘3, ℘4, ℘5, ℘6 as ℵ=℘1.℘2.℘3.℘4.℘5.℘6
• Euler phi function of ℵ is φ(ℵ)=φ(℘1)·φ(℘2)·φ(℘3)·φ(℘4)·φ(℘5).φ(℘6).
• Choose e1, e2, and e3 three numbers coprime to φ(ℵ).
• Find d1, d2 and d3 which is inverses of e1, e2 and e3 respectively e1d1≡1(modφ(ℵ)),
e2d2≡1(modφ(ℵ)), and e3d3≡1(modφ(ℵ))
• Public key = (ℵ,e1,e2,e3).
• Private key = (ℵ,d1,d2,d3).
The decryption process is finished with the use of the public key (ℵ,e1,e2,e3). The encryption steps are given below:
• Receives the public key (ℵ,e1,e2,e3).
• Displays the text T as a positive number.
• Calculate text ciphering C=[(Te1modℵ)e2modℵ]e3modℵ.
• Send Cipher message
The decryption of the cipher text into plain text with the help of a non-public key in RSA. The Decryption steps are given below:
• Compute T=[(Cd1modℵ)d2modℵ]d3modℵ.
• Extracts plain text from a number representing T.
Choose six distinct primes ℘1=7,℘2=13, ℘3=11,℘4=2,℘5=3,℘6=5.
ℵ=℘1·℘2·℘3·℘4·℘5·℘6=7·13·11·2·3·5=30030. |
Euler's phi function of ℵ is
φ(ℵ)=φ(℘1)·φ(℘2)·φ(℘3)·φ(℘4)·φ(℘5)·φ(℘6)=6·12·10·1·2·4=5760 |
Choose e1=59 satisfying 1<e1<φ(ℵ) and gcd(e1,φ(ℵ))=1. Let d1=4979 as d1e1≡1(modφ(ℵ)).
Choose e2=13 satisfying 1<e2<φ(ℵ) and gcd(e2,φ(ℵ))=1. Let d2=5317 as d2e2≡1(modφ(ℵ)).
Choose e3=7 satisfying 1<e3<φ(ℵ), and gcd(e3,φ(ℵ))=1. Let d3=823 as d3e3≡1(modφ(ℵ)).
Public key is (30030,59,13,7). Plain text = T=1321.
C=[((Te1modℵ)e2modℵ)]e3modℵ |
C=[((132159mod30030)13mod30030)]7mod30030 |
C=[(1941)13mod30030)]7mod30030 |
C=[19141]7(mod30030)=9901 |
The private key is (30030,4979,5317,823).
T=[((Cd1modℵ)d2modℵ)]d3modℵ |
T=[(99014979mod30030)5317mod30030]823(mod30030) |
T=[105615317mod30030]823(mod30030) |
T=10561823(mod30030)=1321. |
We talk about the RSA algorithm, which uses eight big prime numbers. The private and public key contains five components. ℵ is the product of primes ℘1,℘2,℘3,℘4,℘5, ℘6,℘7,℘8. (ℵ,e1,e2,e3,e4) be the components of the public key, where e1, e2, e3, and arechosen randomly which are coprime to φ(ℵ). Since ℵ is kept as private and public components, the attacker is unable to evaluate the value of the eight basic primes that are used to obtain the value of ℵ without knowing the value of ℵ, and later e1, e2, e3, and e4. (ℵ,d1,d2,d3,d4) be the components of private key, where d1 is the inverse of e1 and d2 is the inverse of e2 and d3 is the inverse of e3 and d4 is the inverse of e4. For security purposes, all eight selected prime bits are the same length.
The steps for generating the key are given below:
• Choose eight primes ℘1,℘2,℘3,℘4,℘5,℘6,℘7,℘8and
ℵ=℘1·℘2·℘3·℘4·℘5·℘6·℘7·℘8. |
• Euler phi function of ℵ is φ(ℵ)=φ(℘1)·φ(℘2)·φ(℘3)·φ(℘4)·φ(℘5)·φ(℘6)·φ(℘7)·φ(℘8)
• Choose e1,e2, e3 and e4 four numbers coprime to φ(ℵ).
• Find d1, d2, d3 and d4 which are the inverses of e1, e2, e3 and e4 respectively e1d1≡1(modφ(ℵ)),e2d2≡1(modφ(ℵ)),,e3d3≡1(modφ(ℵ)), e4d4≡1(modφ(ℵ)).
• (ℵ,e1,e2,e3,e4) is the public key.
• (ℵ,d1,d2,d3,d4) is private key.
Decrypt the cipher text into plain text with the help of a non-public key in RSA. The decryption steps are given below:
• Receives the public key (ℵ,e1,e2,e3,e4).
• Displays the message T as a positive number.
• Compute cipher text C=[((Te1modℵ)e2modℵ)e3modℵ]e4modℵ.
• Send cipher message.
The decryption of the cipher text into plain text with the help of a non-public key in RSA. The Decryption steps are given below:
• Compute T=[((Cd1modℵ)d2modℵ)d3modℵ]d4modℵ
• Extracts plain text from a number representing T.
Let eight distinct primes ℘1=2,℘2=5,℘3=3,℘4=7,℘5=11,℘6=13,℘7=17,℘8=19 and ℵ=℘1·℘2·℘3·℘4·℘5·℘6·℘7·℘8=2·3·5·7·11·13·17·19=9699690. Compute the Euler phi value of ℵ.
φ(ℵ)=φ(℘1)·φ(℘2)·φ(℘3)·φ(℘4)·φ(℘5)·φ(℘6)·φ(℘7)·φ(℘8)=1·2·4·6·10·12·16·18=1658880. |
Choose e1=1001 satisfying 1<e1<φ(ℵ) and gcd(e1,φ(ℵ))=1. Find d1=1324221 such that d1e1≡1(modφ(ℵ)).
Choose e2=2003 satisfying 1<e2<φ(ℵ), and gcd(e2,φ(ℵ))=1. Find d2=649307 such that d2e2≡1(modφ(ℵ)).
Choose e3=50003 satisfying 1<e3<φ(ℵ) and gcd(e3,φ(ℵ))=1. Fin d3=555227 such that d3e3≡1(modφ(ℵ)).
Choose e4=500011 satisfying 1<e4<φ(ℵ) and gcd(e4,φ(ℵ))=1. Find d4=247171 such that d4e4≡1(modφ(ℵ)).
The public key is (9699690,1001,2003,50003,500011). Plain text =T=1321.
C=[((Te1modℵ)e2modℵ)e3modℵ]e4(modℵ). |
=[((13211001(mod9699690))2003(mod9699690))50003(mod9699690)]500011(mod9699690). |
=[(47246112003(mod9699690))50003(mod9699690)]500011(mod9699690). |
=[193228150003(mod9699690)]500011(mod9699690). |
=6856741500011(mod9699690)=2661781 |
The private key is (9699690,1324121,649307,555227,247171)
T=[((Cd1modℵ)d2modℵ)d3modℵ]d4modℵ |
=[((26617811324121mod9699690)649307mod9699690))555227mod9699690]247171mod9699690. |
T=[(8779321649307mod9699690)555227mod9699690]247171(mod9699690) |
T=[730621555227(mod9699690)]247171(mod9699690). |
T=9079621247171(mod9699690)=1321. |
Continuously this process for up to 2n primes in the following section.
Now we'll look at the RSA Algorithm, which is made up of 2n large primes. The private and public keys are made up of n+1 components. ℵ is a product of primes ℘1,℘2,℘3,℘4,℘5,℘6,···,℘2n−1,℘2n. (ℵ,e1,e2,e3,···,en) are the components of public key, where e1,e2,e3,…en are choose randomly which are coprime to φ(ℵ). If an attacker has access to the ℵ key, he or she will be unable to deduce the value of the 2n fundamental primes, which serve as the foundation for calculating ℵ, and later e1,e2,e3,···,en. (ℵ,d1,d2,d3,···,dn) be the components of private key, where d1 is the inverse of e1 and d2 is the inverse of e2 and d3 is the inverse of d3 similarly dn is the inverse of en. For security purposes, all 2n selected prime bits are of the same length.
There are the following steps for generating the key;
• Let ℘1,℘2,℘3,℘4,℘5,℘6,···,℘2n−1,℘2n be the 2n distinct primes and ℵ is a product of ℘1,℘2,℘3,℘4,℘5,℘6,···,℘2n−1,℘2n as ℵ=℘1.℘2.℘3.℘4.℘5.℘6…℘2n−1.℘2n.
• Find the Euler phi function of ℵ as
φ(ℵ)=φ(℘1).φ(℘2).φ(℘3).φ(℘4)·φ(℘5).φ(℘6)…,φ(℘2n−1)·φ(℘2n). |
• Let e1,e2,e3,…,en be the n non-negative numbers co-prime to φ(ℵ).
• Let d1,d2,d3,…,dn be the inverses of e1,e2,e3,…,en such that e1d1≡1modφ(ℵ), e2d2≡1modφ(ℵ), e3d3≡1modφ(ℵ), · · ·, endn≡1modφ(ℵ).
• Public key =(ℵ,e1,e2,e3,…,en).
• Private key =(ℵ,d1,d2,d3,…,dn).
Its use of public keys (ℵ,e1,e2,e3,…,en) puts an end to the encryption process. The encryption steps are given below;
• Receives the public key (ℵ,e1,e2,e3,…,en).
• Displays text T as a positive number.
• Find Cipher text C=[((Te1(modℵ))e2(modℵ))e3(modℵ)···]en(modℵ).
• Send a Cipher message.
The decryption of the cipher text into plain text with the private key in GRSA. The decryption steps are given below;
• Compute T=[((Cd1(modℵ))d2(modℵ))d3(modℵ)···]dn(modℵ).
Extracts plain text from a number representing T.
The proposed GRSA algorithm is executed using MATLAB manifesto using Laptop (Del, Core i7, 7th generation). Comparison of the key generation time, encryption time, and decryption time for two primes, four primes, six primes, and eight primes. During the counterfeit, 5 different combinations of arbitrary primes are chosen. There are the following results. The key generation (K.G), encryption (E), and decryption (D) time for producing public and private keys by two primes, four primes', six primes, and eight primes with magnitudes are given in Tables 1–4.
℘1 | ℘2 | E | K.G. (sec) | E.(sec) | D.(sec) |
19 | 23 | 7 | 0.005716 | 0.376943 | 0.005716 |
17 | 29 | 3 | 0.004420 | 0.375985 | 0.007462 |
13 | 31 | 7 | 0.006389 | 0.379625 | 0.008168 |
31 | 11 | 3 | 0.007449 | 0.378423 | 0.007617 |
11 | 29 | 3 | 0.007284 | 0.376564 | 0.008133 |
℘1 | ℘2 | ℘3 | ℘4 | e1 | e2 | K.G.(sec) | E.(sec) | D.(sec) |
19 | 17 | 29 | 3 | 5 | 11 | 0.008708 | 0.386488 | 0.012452 |
13 | 29 | 23 | 5 | 5 | 13 | 0.008452 | 0.398772 | 0.012664 |
7 | 23 | 31 | 11 | 7 | 13 | 0.008019 | 0.382741 | 0.014080 |
11 | 29 | 23 | 7 | 13 | 17 | 0.008071 | 0.380112 | 0.013811 |
13 | 23 | 19 | 11 | 13 | 17 | 0.008975 | 0.379947 | 0.015377 |
℘1 | ℘2 | ℘3 | ℘4 | ℘5 | ℘6 | e1 | e2 | e3 | K.G.(sec) | E.(sec) | D.(sec) |
3 | 13 | 37 | 7 | 23 | 11 | 7 | 13 | 19 | 0.009489 | 0.393181 | 0.653823 |
37 | 13 | 3 | 5 | 29 | 7 | 5 | 11 | 13 | 0.012368 | 0.385374 | 0.347764 |
3 | 17 | 13 | 31 | 23 | 7 | 7 | 13 | 17 | 0.010318 | 0.384243 | 0.788194 |
5 | 31 | 19 | 13 | 2 | 7 | 7 | 11 | 13 | 0.013297 | 0.380655 | 0.93392 |
5 | 13 | 41 | 7 | 23 | 11 | 7 | 13 | 19 | 0.012737 | 0.383298 | 0.843879 |
℘1 | ℘2 | ℘3 | ℘4 | ℘5 | ℘6 | ℘7 | ℘8 | e1 | e2 | e3 | e4 | K.G.(sec) | E.(sec) | D.(sec) |
13 | 3 | 17 | 7 | 31 | 19 | 2 | 23 | 7 | 13 | 17 | 23 | 0.017519 | 0.392799 | 42.830815 |
31 | 2 | 7 | 17 | 23 | 29 | 3 | 11 | 13 | 17 | 19 | 23 | 0.012287 | 0.390375 | 37.090092 |
3 | 7 | 13 | 11 | 19 | 23 | 29 | 5 | 13 | 17 | 19 | 23 | 0.010551 | 0.390682 | 40.103547 |
37 | 2 | 13 | 7 | 3 | 29 | 23 | 11 | 13 | 17 | 19 | 23 | 0.013907 | 0.390470 | 32.524731 |
17 | 7 | 13 | 11 | 19 | 31 | 3 | 5 | 11 | 13 | 19 | 23 | 0.015120 | 0.392092 | 62.955846 |
Comparison of the key generation, encryption, and decryption time of two primes, four primes, six primes, and eight primes with magnitudes are given in Figures 1–6.
Comparison of the key generation, encryption and decryption time of two primes, four primes, six primes, and eight primes with the help of bar the given graphs.
RSA and GRSA have different important parameters that affect their level of security and speed. Increasing the length of the modulus gives rise to the complexity of decomposing it into factors. Thus, the length of the private key increased and the key is harder to trace. RSA and GRSA parameter changes are time-dependent and constant to study other relevant stresses. We concluded that the key generation time of GRSA is higher than that of RSA due to an increase in the number of primes. The higher key generation time of GRSA can be seen as an advantage of the fact that the time to crack the system is longer due to the added complexity. Encryption time shows the same amount of time used by RSA and GRSA for the lower bit lengths of primes (two and four primes). As the number of primes and magnitude of primes increase, then the time will be increased. Decryption time shows the same amount of time used by RSA and GRSA for the lower bit lengths of primes (two and four primes). As the number of primes increased, the difference between the curves becomes steeper. From the above discussion, we concluded that the encryption and decryption time of GRSA is higher than the RSA. The increase in time would be acceptable if it substantially would increase the security of the proposed GRSA method.
The authors present their appreciation to King Saud University for funding this research through Researchers Supporting Project number: RSPD2023R650, King Saud University, Riyadh, Saudi Arabia.
The authors declared that they had no conflict of interest.
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.
[1] | H. Ukwuoma, M. Hammawa, Optimised Key Generation for RSA Encryption, IISTE, 6 (2015), 2222–2871. |
[2] | M. Preetha, M. A. Nithya, Study and performance analysis of RSA algorithm, IJCSMC, 2 (2013), 126–139. |
[3] | C. Paar, J. Pelzl, Introduction to cryptography and data security, In: Understanding Cryptography Springer, 2010, 1–27. https://doi.org/10.1007/978-3-642-04101-3_1 |
[4] |
N. Koblitz, A. J. Menezes, Y. H. Wu, R. J. Zuccherato, Algebraic aspects of cryptography, Springer, 198 (1998), 1–17. https://doi.org/10.1007/978-3-662-03642-6_1 doi: 10.1007/978-3-662-03642-6_1
![]() |
[5] | Y. Li, Q. Liu, T. Li, Design and implementation of an improved RSA algorithm, In: 2010 International Conference on E-Health Networking Digital Ecosystems and Technologies (EDT), IEEE, 1 (2010), 390–393. |
[6] |
M. Sajjad, T. Shah, J. R. Serna, Nonlinear components of a block cipher over Gaussian integers, CMC-Comput. Mater. Con., 75 (2022), 5287–5305. https://doi.org/10.32604/cmc.2023.035347 doi: 10.32604/cmc.2023.035347
![]() |
[7] |
M. Sajjad, T. Shah, M. M. Hazzazi, A. R. Alharbi, I. Hussain, Quaternion integers based higher length cyclic codes and their decoding algorithm, CMC-Comput. Mater. Con., 73 (2022), 1177–1194. https://doi.org/10.32604/cmc.2022.025245 doi: 10.32604/cmc.2022.025245
![]() |
[8] |
M. Sajjad, T. Shah, J. R. Serna, A. Z. E. Suarez, O. S. Delgado, Fundamental results of cyclic codes over octonion integers and their decoding algorithm, Computation, 10 (2022), 1–12. https://doi.org/10.3390/computation10120219 doi: 10.3390/computation10010001
![]() |
[9] | T. Takagi, Fast RSA-type cryptosystem modulo p k q, In: Annual International Cryptology Conference, Springer, Berlin, Heidelberg, 1998,318–326. https://doi.org/10.1007/BFb0055738 |
[10] | D. Boneh, Twenty years of attacks on the RSA cryptosystem, Notices AMS, 46 (1999), 203–213. |
[11] | B. P. U. Ivy, P. Mandiwa, M. Kumar, A modified RSA cryptosystem based on 'n'prime numbers, Int. J. Eng. Compu. Sci., 1 (2012), 63–66. |
[12] | J. S. Yadav, A. S. Sheregar, V. M. Panjri, S. L. Gharat, Secure approach for encrypting data, In: 2018 International Conference on Smart City and Emerging Technology (ICSCET). IEEE, 2018; 1–3. https://doi.org/10.1109/ICSCET.2018.8537290 |
[13] | P. K. Panda, S. Chattopadhyay, A hybrid security algorithm for RSA cryptosystem, In: 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), IEEE, 2017, 1–6. https://doi.org/10.1109/ICACCS.2017.8014644 |
[14] | K. Bhatele, A. Sinhal, M. Pathak, A novel approach to the design of a new hybrid security protocol architecture, In: 2012 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), IEEE, 2012,429–433. https://doi.org/10.1109/ICACCCT.2012.6320816 |
[15] |
M. A. Islam, N. Islam, B. Shabnam, A modified and secured RSA public key cryptosystem based on "n" prime numbers, J. Comput. Comm., 6 (2018), 1–13. https://doi.org/10.4236/jcc.2018.63006 doi: 10.4236/jcc.2018.63006
![]() |
℘1 | ℘2 | E | K.G. (sec) | E.(sec) | D.(sec) |
19 | 23 | 7 | 0.005716 | 0.376943 | 0.005716 |
17 | 29 | 3 | 0.004420 | 0.375985 | 0.007462 |
13 | 31 | 7 | 0.006389 | 0.379625 | 0.008168 |
31 | 11 | 3 | 0.007449 | 0.378423 | 0.007617 |
11 | 29 | 3 | 0.007284 | 0.376564 | 0.008133 |
℘1 | ℘2 | ℘3 | ℘4 | e1 | e2 | K.G.(sec) | E.(sec) | D.(sec) |
19 | 17 | 29 | 3 | 5 | 11 | 0.008708 | 0.386488 | 0.012452 |
13 | 29 | 23 | 5 | 5 | 13 | 0.008452 | 0.398772 | 0.012664 |
7 | 23 | 31 | 11 | 7 | 13 | 0.008019 | 0.382741 | 0.014080 |
11 | 29 | 23 | 7 | 13 | 17 | 0.008071 | 0.380112 | 0.013811 |
13 | 23 | 19 | 11 | 13 | 17 | 0.008975 | 0.379947 | 0.015377 |
℘1 | ℘2 | ℘3 | ℘4 | ℘5 | ℘6 | e1 | e2 | e3 | K.G.(sec) | E.(sec) | D.(sec) |
3 | 13 | 37 | 7 | 23 | 11 | 7 | 13 | 19 | 0.009489 | 0.393181 | 0.653823 |
37 | 13 | 3 | 5 | 29 | 7 | 5 | 11 | 13 | 0.012368 | 0.385374 | 0.347764 |
3 | 17 | 13 | 31 | 23 | 7 | 7 | 13 | 17 | 0.010318 | 0.384243 | 0.788194 |
5 | 31 | 19 | 13 | 2 | 7 | 7 | 11 | 13 | 0.013297 | 0.380655 | 0.93392 |
5 | 13 | 41 | 7 | 23 | 11 | 7 | 13 | 19 | 0.012737 | 0.383298 | 0.843879 |
℘1 | ℘2 | ℘3 | ℘4 | ℘5 | ℘6 | ℘7 | ℘8 | e1 | e2 | e3 | e4 | K.G.(sec) | E.(sec) | D.(sec) |
13 | 3 | 17 | 7 | 31 | 19 | 2 | 23 | 7 | 13 | 17 | 23 | 0.017519 | 0.392799 | 42.830815 |
31 | 2 | 7 | 17 | 23 | 29 | 3 | 11 | 13 | 17 | 19 | 23 | 0.012287 | 0.390375 | 37.090092 |
3 | 7 | 13 | 11 | 19 | 23 | 29 | 5 | 13 | 17 | 19 | 23 | 0.010551 | 0.390682 | 40.103547 |
37 | 2 | 13 | 7 | 3 | 29 | 23 | 11 | 13 | 17 | 19 | 23 | 0.013907 | 0.390470 | 32.524731 |
17 | 7 | 13 | 11 | 19 | 31 | 3 | 5 | 11 | 13 | 19 | 23 | 0.015120 | 0.392092 | 62.955846 |
℘1 | ℘2 | E | K.G. (sec) | E.(sec) | D.(sec) |
19 | 23 | 7 | 0.005716 | 0.376943 | 0.005716 |
17 | 29 | 3 | 0.004420 | 0.375985 | 0.007462 |
13 | 31 | 7 | 0.006389 | 0.379625 | 0.008168 |
31 | 11 | 3 | 0.007449 | 0.378423 | 0.007617 |
11 | 29 | 3 | 0.007284 | 0.376564 | 0.008133 |
℘1 | ℘2 | ℘3 | ℘4 | e1 | e2 | K.G.(sec) | E.(sec) | D.(sec) |
19 | 17 | 29 | 3 | 5 | 11 | 0.008708 | 0.386488 | 0.012452 |
13 | 29 | 23 | 5 | 5 | 13 | 0.008452 | 0.398772 | 0.012664 |
7 | 23 | 31 | 11 | 7 | 13 | 0.008019 | 0.382741 | 0.014080 |
11 | 29 | 23 | 7 | 13 | 17 | 0.008071 | 0.380112 | 0.013811 |
13 | 23 | 19 | 11 | 13 | 17 | 0.008975 | 0.379947 | 0.015377 |
℘1 | ℘2 | ℘3 | ℘4 | ℘5 | ℘6 | e1 | e2 | e3 | K.G.(sec) | E.(sec) | D.(sec) |
3 | 13 | 37 | 7 | 23 | 11 | 7 | 13 | 19 | 0.009489 | 0.393181 | 0.653823 |
37 | 13 | 3 | 5 | 29 | 7 | 5 | 11 | 13 | 0.012368 | 0.385374 | 0.347764 |
3 | 17 | 13 | 31 | 23 | 7 | 7 | 13 | 17 | 0.010318 | 0.384243 | 0.788194 |
5 | 31 | 19 | 13 | 2 | 7 | 7 | 11 | 13 | 0.013297 | 0.380655 | 0.93392 |
5 | 13 | 41 | 7 | 23 | 11 | 7 | 13 | 19 | 0.012737 | 0.383298 | 0.843879 |
℘1 | ℘2 | ℘3 | ℘4 | ℘5 | ℘6 | ℘7 | ℘8 | e1 | e2 | e3 | e4 | K.G.(sec) | E.(sec) | D.(sec) |
13 | 3 | 17 | 7 | 31 | 19 | 2 | 23 | 7 | 13 | 17 | 23 | 0.017519 | 0.392799 | 42.830815 |
31 | 2 | 7 | 17 | 23 | 29 | 3 | 11 | 13 | 17 | 19 | 23 | 0.012287 | 0.390375 | 37.090092 |
3 | 7 | 13 | 11 | 19 | 23 | 29 | 5 | 13 | 17 | 19 | 23 | 0.010551 | 0.390682 | 40.103547 |
37 | 2 | 13 | 7 | 3 | 29 | 23 | 11 | 13 | 17 | 19 | 23 | 0.013907 | 0.390470 | 32.524731 |
17 | 7 | 13 | 11 | 19 | 31 | 3 | 5 | 11 | 13 | 19 | 23 | 0.015120 | 0.392092 | 62.955846 |