A Novel Approach for Security Using RSA Parallelization Process

Key exchange for cryptographic system is always a challenge. A private key algorithm is used to encipher and decipher the message, but after the symmetric key encrypts the message the digital envelope concept is used where the public key method or symmetric key algorithms are used to send the privat...

Full description

Saved in:
Bibliographic Details
Published in2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) pp. 1433 - 1437
Main Authors Kalburgi, Ayisha M, Jalapur, Shruti
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.05.2018
Subjects
Online AccessGet full text
DOI10.1109/RTEICT42901.2018.9012116

Cover

Abstract Key exchange for cryptographic system is always a challenge. A private key algorithm is used to encipher and decipher the message, but after the symmetric key encrypts the message the digital envelope concept is used where the public key method or symmetric key algorithms are used to send the private key to the other party. A significant amount of research has focused on methods to improve the efficiency of cryptographic algorithms. Public key based cryptographic algorithms are usually considered as slower than their corresponding symmetric key based algorithms due to their root in modular arithmetic. So for encrypting the large message, symmetric key algorithms are used whereas for the relatively smaller key, asymmetric key algorithm is used. Here we are implementing this digital envelope system using asymmetric key algorithm. The goal is to improve the system by implementing the algorithm with parallelization using OpenMP on the GCC infrastructure.
AbstractList Key exchange for cryptographic system is always a challenge. A private key algorithm is used to encipher and decipher the message, but after the symmetric key encrypts the message the digital envelope concept is used where the public key method or symmetric key algorithms are used to send the private key to the other party. A significant amount of research has focused on methods to improve the efficiency of cryptographic algorithms. Public key based cryptographic algorithms are usually considered as slower than their corresponding symmetric key based algorithms due to their root in modular arithmetic. So for encrypting the large message, symmetric key algorithms are used whereas for the relatively smaller key, asymmetric key algorithm is used. Here we are implementing this digital envelope system using asymmetric key algorithm. The goal is to improve the system by implementing the algorithm with parallelization using OpenMP on the GCC infrastructure.
Author Kalburgi, Ayisha M
Jalapur, Shruti
Author_xml – sequence: 1
  givenname: Ayisha M
  surname: Kalburgi
  fullname: Kalburgi, Ayisha M
  organization: Secab Institute of Engineering and Technology,Dept of Computer Science and Engineering,Vijayapur,India
– sequence: 2
  givenname: Shruti
  surname: Jalapur
  fullname: Jalapur, Shruti
  organization: Secab Institute of Engineering and Technology,Dept of Computer Science and Engineering,Vijayapur,India
BookMark eNotj9FKwzAYhSPohZs-gTd5gdb8SdskV1LK1MHQsXXXIzZ_NBCbklZhPr2F7eocvgMfnAW57mOPhFBgOQDTj7t2tW7agmsGOWeg8rlwgOqKLKAUquJFwdgtearpW_zFQOthSNF0X9TFRPfY_SQ_nehh9P0n3e1rujXJhIDB_5nJx55uU-xwHO_IjTNhxPtLLsnhedU2r9nm_WXd1JvMA6gpU8JxKZWqtHWytMikExI0swwqVIUwrPtQTllw2ph5qmZshbUKBe9cycWSPJy9HhGPQ_LfJp2Ol0_iHwUBRps
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/RTEICT42901.2018.9012116
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1538624400
9781538624401
EndPage 1437
ExternalDocumentID 9012116
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i118t-83f2778869df75de07f37190d016e843a0cb8f8d1f9aaf37616ed3dd8e32cf523
IEDL.DBID RIE
IngestDate Thu Jun 29 18:38:57 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i118t-83f2778869df75de07f37190d016e843a0cb8f8d1f9aaf37616ed3dd8e32cf523
PageCount 5
ParticipantIDs ieee_primary_9012116
PublicationCentury 2000
PublicationDate 2018-May
PublicationDateYYYYMMDD 2018-05-01
PublicationDate_xml – month: 05
  year: 2018
  text: 2018-May
PublicationDecade 2010
PublicationTitle 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)
PublicationTitleAbbrev RTEICT
PublicationYear 2018
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.6628741
Snippet Key exchange for cryptographic system is always a challenge. A private key algorithm is used to encipher and decipher the message, but after the symmetric key...
SourceID ieee
SourceType Publisher
StartPage 1433
SubjectTerms Ciphers
Cryptography
Digital signatures
Encryption
OpenMP
parallelization
Public key
Receivers
RSA
Title A Novel Approach for Security Using RSA Parallelization Process
URI https://ieeexplore.ieee.org/document/9012116
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NawIxEA3qqae2aOk3OfTYrFs3bpJTEanYQkWqgjdJNhMoFS2y9tBf30k2Wlp66C0kC7thCO_N5r0ZQm4A8sKl0jLJC804MlKmnQCmEN48oikwQSA7yocz_jTvzmvkdu-FAYAgPoPED8Ndvl0XW_-rrK1CQbK8TupC5pVXayfOSVUb-d9jf8r9xaCXbMkkPv6jb0qAjcEhed69sFKLvCXb0iTF569ajP_9oiPS-jbo0fEeeo5JDVZNct-jo_UHLGkv1gmnSEjpJDaoo0EcQF8mPTrWG99BZRktmDSaBVpkNniY9ocs9kdgr5gWlExmriMwhc2VdaJrIRUuEwjwFmkcSJ7ptDDSSXvnlNa4lOO0zayVkHUKhxnoCWms1is4JZQ7IzR0udHccWUwy8iUcXjeLdIdyPQZafrNL96rEhiLuO_zv6cvyIEPQKULvCSNcrOFK8Tu0lyHoH0BzJKadg
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFH5BPOhJDRh_24NHN6brtvZkCJGAAiECCTfSrq-JkYAhw4N_va_bwGg8eGvaLFvz0nzfW7_vPYAbxDi1gTCe4KnyODFST9kEPUnw5hBNos4FsoO4M-FP02hagdutFwYRc_EZ-m6Y3-WbZbp2v8oaMi9IFu_AbsQ5jwq31kaeE8gGMcBua8zd1aATbQm_fOBH55QcONoH0N-8stCLvPnrTPvp569qjP_9pkOof1v02HALPkdQwUUNHppssPzAOWuWlcIZUVI2KlvUsVwewF5GTTZUK9dDZV6aMFlpF6jDpP04bnW8skOC90qJQeaJ0N4nlMTG0tgkMhgkNkwI4g0RORQ8VEGqhRXmzkqlaCmmaRMaIzC8Ty3loMdQXSwXeAKMW50ojLhW3HKpKc8IpbZ04g0RHgzVKdTc5mfvRRGMWbnvs7-nr2GvM-73Zr3u4Pkc9l0wCpXgBVSz1RovCckzfZUH8AsVMZ3D
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2018+3rd+IEEE+International+Conference+on+Recent+Trends+in+Electronics%2C+Information+%26+Communication+Technology+%28RTEICT%29&rft.atitle=A+Novel+Approach+for+Security+Using+RSA+Parallelization+Process&rft.au=Kalburgi%2C+Ayisha+M&rft.au=Jalapur%2C+Shruti&rft.date=2018-05-01&rft.pub=IEEE&rft.spage=1433&rft.epage=1437&rft_id=info:doi/10.1109%2FRTEICT42901.2018.9012116&rft.externalDocID=9012116