Research Article | OPEN ACCESS
A Survey and Analysis of Security Issues on RSA Algorithm
Kunal Gagneja and K. John Singh
School of Information Technology and Engineering, VIT University, Vellore, Tamil Nadu, India
Research Journal of Applied Sciences, Engineering and Technology 2015 8:847-853
Received: May 16, 2015 | Accepted: June 22, 2015 | Published: November 15, 2015
Abstract
RSA is used for remote login session, multimedia, credit card payment systems and email security. Key lengths are getting longer in RSA at an exponential phase without solving security issues. According to NIST key management guidelines, 15360 bit RSA is equivalent to 256-bit symmetric key in terms of strength. In case of small messages, even key would be longer than the message. Generally, security is calculated only on the basis of brute force attack and advancements in algorithms, hardware and software architectures are ignored. In this study, problems are identified based upon mathematical architecture of RSA and same observations are used in removal of defects.
Keywords:
Acoustic signals, boneh-durfee attack, Chinese remainder theorem, coppersmith attack, quantum computer, wiener attack,
Competing interests
The authors have no competing interests.
Open Access Policy
This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Copyright
The authors have no competing interests.
|
|
![](http://www.maxwellsci.com/images/RJASET-maxw.jpg) |
ISSN (Online): 2040-7467
ISSN (Print): 2040-7459 |
![Submit Manuscript](../images/sub.jpg) |
Information |
|
|
|
Sales & Services |
|
|
|