Utilizing the RSA Algorithm to Enhance the Security of Real-World Applications
Abstract
In the recent times, during COVID-19 statics tell, cyber-attacks have increased by up to 37%. While the lockdown all the companies are leveraging technologies accessible via internet to conduct their day to today work. The amount of transfer of data and information be it personal or otherwise has also escalated. Today, cyberattack is a major threat to every company. On the other hand, companies and hackers have been trying to take the advantage of it to attack people. Thus, security of data and keeping individuals or enterprises information safe has become a crucial area of research. Cryptography provides major breakthroughs by providing techniques to encrypt the data before sharing it over internet. But with increasing computational power of technology and AI; there’s a need to make advancements to these algorithms. This paper provides a novel approach to RSA algorithm to increase the security and performance. The proposed algorithm is compared with the standard RSA algorithm by varying the number of primes. An ML model is also proposed which suggests the number of primes required to encrypt the message to optimize the processing time based on the length of the message and the execution time.References
Phil Muncaster, Cyber-Attacks Up 37% Over Past Month as #COVID9 Bites, Info Security Magazine [Online] Available: https://www.infosecurity-magazine.com/news/cyberattacks-up-37-over-past-month/
Agnes Talalaev, Website Hacking Statistics in 2020, WebARX, Updated: April 7, 2020 [Online] Available: https://www.webarxsecurity.com/website-hacking-statistics-2018-february/
Susan Moore and Emma Keen, Gartner Forecasts Worldwide Information Security Spending to Exceed $124 Billion in 2019, Created: Auguest 15, 2018 [Online] Available: https://www.gartner.com/en/newsroom/press-releases/2018-08-15-gartner-forecasts-worldwide-information-security-spending-to-exceed-124-billion-in-2019
Himadri Shekhar Mondal, Md. Tariq Hasan, Md. Mahbub Hossain, Md. Mashrur Arifin and Rekha Saha, “A RSA-Based Efficient Dynamic Secure Algorithm for Ensuring Data Security”, Proceedings of International Joint Conference on Computational Intelligence, Algorithms for Intelligent Systems, Springer Nature Singapore Pte Ltd., Issued 2019
Sudhansu Bala Das, Sugyan Kumar Mishra and Anup Kumar Sahu, “A New Modified Version of Standard RSA Cryptography Algorithm”, Smart Computing Paradigms: New Progresses and Challenges, Springer Nature Singapore Pte Ltd., Issued 2019
DOI:
https://doi.org/10.31449/inf.v49i9.6929Downloads
Published
How to Cite
Issue
Section
License
I assign to Informatica, An International Journal of Computing and Informatics ("Journal") the copyright in the manuscript identified above and any additional material (figures, tables, illustrations, software or other information intended for publication) submitted as part of or as a supplement to the manuscript ("Paper") in all forms and media throughout the world, in all languages, for the full term of copyright, effective when and if the article is accepted for publication. This transfer includes the right to reproduce and/or to distribute the Paper to other journals or digital libraries in electronic and online forms and systems.
I understand that I retain the rights to use the pre-prints, off-prints, accepted manuscript and published journal Paper for personal use, scholarly purposes and internal institutional use.
In certain cases, I can ask for retaining the publishing rights of the Paper. The Journal can permit or deny the request for publishing rights, to which I fully agree.
I declare that the submitted Paper is original, has been written by the stated authors and has not been published elsewhere nor is currently being considered for publication by any other journal and will not be submitted for such review while under review by this Journal. The Paper contains no material that violates proprietary rights of any other person or entity. I have obtained written permission from copyright owners for any excerpts from copyrighted works that are included and have credited the sources in my article. I have informed the co-author(s) of the terms of this publishing agreement.
Copyright © Slovenian Society Informatika







