32,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
16 °P sammeln
  • Broschiertes Buch

The RSA algorithm is one of the most widely used and strongest cryptographic algorithms for over 20 years. It has braved attacks of many sorts, and been updated with various modifications. This algorithm however is vulnerable, and its life-span indeed a matter of an un-predictable technological revolution. In this research, the RSA algorithm and key variants have been reviewed, and trends in attacks against it analysed. In the suggested modification, we use a transaction integer i and the public and private keys of the receiving entity in a given communication, to generate transaction public…mehr

Produktbeschreibung
The RSA algorithm is one of the most widely used and strongest cryptographic algorithms for over 20 years. It has braved attacks of many sorts, and been updated with various modifications. This algorithm however is vulnerable, and its life-span indeed a matter of an un-predictable technological revolution. In this research, the RSA algorithm and key variants have been reviewed, and trends in attacks against it analysed. In the suggested modification, we use a transaction integer i and the public and private keys of the receiving entity in a given communication, to generate transaction public and private sub-keys for the communication. To do a double encryption, the public sub-key is used, and then the public key applied to the pre-cipher. The decryption is the reverse. The impact of this modification on RSA security has been briefly analysed and recommendations given. The research concludes that such modification if further reasonably proved can considerably improve the RSA algorithm, extend its lifespan, and provide greater confidence for all its users. This research will be particularly useful to students, researchers and information security analysts.
Autorenporträt
Msc. Cs, PG Dip. Cs, Bsc.: Studied Computer Science and Mathematics at Makerere University, and holds various industrial certifications. He worked for AkiliAfricä, and later carried out research in RSA. He co-founded RBM¿ Systems Consult Ltd where he works as the Executive Director. Robert taught Computing briefly in two Universities in Uganda.