A Novel Approach for Security Using RSA Parallelization Process
Key exchange for cryptographic system is always a challenge. A private key algorithm is used to encipher and decipher the message, but after the symmetric key encrypts the message the digital envelope concept is used where the public key method or symmetric key algorithms are used to send the privat...
        Saved in:
      
    
          | Published in | 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) pp. 1433 - 1437 | 
|---|---|
| Main Authors | , | 
| Format | Conference Proceeding | 
| Language | English | 
| Published | 
            IEEE
    
        01.05.2018
     | 
| Subjects | |
| Online Access | Get full text | 
| DOI | 10.1109/RTEICT42901.2018.9012116 | 
Cover
| Abstract | Key exchange for cryptographic system is always a challenge. A private key algorithm is used to encipher and decipher the message, but after the symmetric key encrypts the message the digital envelope concept is used where the public key method or symmetric key algorithms are used to send the private key to the other party. A significant amount of research has focused on methods to improve the efficiency of cryptographic algorithms. Public key based cryptographic algorithms are usually considered as slower than their corresponding symmetric key based algorithms due to their root in modular arithmetic. So for encrypting the large message, symmetric key algorithms are used whereas for the relatively smaller key, asymmetric key algorithm is used. Here we are implementing this digital envelope system using asymmetric key algorithm. The goal is to improve the system by implementing the algorithm with parallelization using OpenMP on the GCC infrastructure. | 
    
|---|---|
| AbstractList | Key exchange for cryptographic system is always a challenge. A private key algorithm is used to encipher and decipher the message, but after the symmetric key encrypts the message the digital envelope concept is used where the public key method or symmetric key algorithms are used to send the private key to the other party. A significant amount of research has focused on methods to improve the efficiency of cryptographic algorithms. Public key based cryptographic algorithms are usually considered as slower than their corresponding symmetric key based algorithms due to their root in modular arithmetic. So for encrypting the large message, symmetric key algorithms are used whereas for the relatively smaller key, asymmetric key algorithm is used. Here we are implementing this digital envelope system using asymmetric key algorithm. The goal is to improve the system by implementing the algorithm with parallelization using OpenMP on the GCC infrastructure. | 
    
| Author | Kalburgi, Ayisha M Jalapur, Shruti  | 
    
| Author_xml | – sequence: 1 givenname: Ayisha M surname: Kalburgi fullname: Kalburgi, Ayisha M organization: Secab Institute of Engineering and Technology,Dept of Computer Science and Engineering,Vijayapur,India – sequence: 2 givenname: Shruti surname: Jalapur fullname: Jalapur, Shruti organization: Secab Institute of Engineering and Technology,Dept of Computer Science and Engineering,Vijayapur,India  | 
    
| BookMark | eNotj9FKwzAYhSPohZs-gTd5gdb8SdskV1LK1MHQsXXXIzZ_NBCbklZhPr2F7eocvgMfnAW57mOPhFBgOQDTj7t2tW7agmsGOWeg8rlwgOqKLKAUquJFwdgtearpW_zFQOthSNF0X9TFRPfY_SQ_nehh9P0n3e1rujXJhIDB_5nJx55uU-xwHO_IjTNhxPtLLsnhedU2r9nm_WXd1JvMA6gpU8JxKZWqtHWytMikExI0swwqVIUwrPtQTllw2ph5qmZshbUKBe9cycWSPJy9HhGPQ_LfJp2Ol0_iHwUBRps | 
    
| ContentType | Conference Proceeding | 
    
| DBID | 6IE 6IL CBEJK RIE RIL  | 
    
| DOI | 10.1109/RTEICT42901.2018.9012116 | 
    
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present  | 
    
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| EISBN | 1538624400 9781538624401  | 
    
| EndPage | 1437 | 
    
| ExternalDocumentID | 9012116 | 
    
| Genre | orig-research | 
    
| GroupedDBID | 6IE 6IL CBEJK RIE RIL  | 
    
| ID | FETCH-LOGICAL-i118t-83f2778869df75de07f37190d016e843a0cb8f8d1f9aaf37616ed3dd8e32cf523 | 
    
| IEDL.DBID | RIE | 
    
| IngestDate | Thu Jun 29 18:38:57 EDT 2023 | 
    
| IsPeerReviewed | false | 
    
| IsScholarly | false | 
    
| Language | English | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-i118t-83f2778869df75de07f37190d016e843a0cb8f8d1f9aaf37616ed3dd8e32cf523 | 
    
| PageCount | 5 | 
    
| ParticipantIDs | ieee_primary_9012116 | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2018-May | 
    
| PublicationDateYYYYMMDD | 2018-05-01 | 
    
| PublicationDate_xml | – month: 05 year: 2018 text: 2018-May  | 
    
| PublicationDecade | 2010 | 
    
| PublicationTitle | 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) | 
    
| PublicationTitleAbbrev | RTEICT | 
    
| PublicationYear | 2018 | 
    
| Publisher | IEEE | 
    
| Publisher_xml | – name: IEEE | 
    
| Score | 1.6628741 | 
    
| Snippet | Key exchange for cryptographic system is always a challenge. A private key algorithm is used to encipher and decipher the message, but after the symmetric key... | 
    
| SourceID | ieee | 
    
| SourceType | Publisher | 
    
| StartPage | 1433 | 
    
| SubjectTerms | Ciphers Cryptography Digital signatures Encryption OpenMP parallelization Public key Receivers RSA  | 
    
| Title | A Novel Approach for Security Using RSA Parallelization Process | 
    
| URI | https://ieeexplore.ieee.org/document/9012116 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NawIxEA3qqae2aOk3OfTYrFs3bpJTEanYQkWqgjdJNhMoFS2y9tBf30k2Wlp66C0kC7thCO_N5r0ZQm4A8sKl0jLJC804MlKmnQCmEN48oikwQSA7yocz_jTvzmvkdu-FAYAgPoPED8Ndvl0XW_-rrK1CQbK8TupC5pVXayfOSVUb-d9jf8r9xaCXbMkkPv6jb0qAjcEhed69sFKLvCXb0iTF569ajP_9oiPS-jbo0fEeeo5JDVZNct-jo_UHLGkv1gmnSEjpJDaoo0EcQF8mPTrWG99BZRktmDSaBVpkNniY9ocs9kdgr5gWlExmriMwhc2VdaJrIRUuEwjwFmkcSJ7ptDDSSXvnlNa4lOO0zayVkHUKhxnoCWms1is4JZQ7IzR0udHccWUwy8iUcXjeLdIdyPQZafrNL96rEhiLuO_zv6cvyIEPQKULvCSNcrOFK8Tu0lyHoH0BzJKadg | 
    
| linkProvider | IEEE | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8IwFH5BPOhJDRh_24NHN6brtvZkCJGAAiECCTfSrq-JkYAhw4N_va_bwGg8eGvaLFvz0nzfW7_vPYAbxDi1gTCe4KnyODFST9kEPUnw5hBNos4FsoO4M-FP02hagdutFwYRc_EZ-m6Y3-WbZbp2v8oaMi9IFu_AbsQ5jwq31kaeE8gGMcBua8zd1aATbQm_fOBH55QcONoH0N-8stCLvPnrTPvp569qjP_9pkOof1v02HALPkdQwUUNHppssPzAOWuWlcIZUVI2KlvUsVwewF5GTTZUK9dDZV6aMFlpF6jDpP04bnW8skOC90qJQeaJ0N4nlMTG0tgkMhgkNkwI4g0RORQ8VEGqhRXmzkqlaCmmaRMaIzC8Ty3loMdQXSwXeAKMW50ojLhW3HKpKc8IpbZ04g0RHgzVKdTc5mfvRRGMWbnvs7-nr2GvM-73Zr3u4Pkc9l0wCpXgBVSz1RovCckzfZUH8AsVMZ3D | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2018+3rd+IEEE+International+Conference+on+Recent+Trends+in+Electronics%2C+Information+%26+Communication+Technology+%28RTEICT%29&rft.atitle=A+Novel+Approach+for+Security+Using+RSA+Parallelization+Process&rft.au=Kalburgi%2C+Ayisha+M&rft.au=Jalapur%2C+Shruti&rft.date=2018-05-01&rft.pub=IEEE&rft.spage=1433&rft.epage=1437&rft_id=info:doi/10.1109%2FRTEICT42901.2018.9012116&rft.externalDocID=9012116 |