Improved RSA Algorithm and Application in Digital Signature

Article Preview

Abstract:

In order to enhance the operation efficiency of RSA algorithm, a new improved algorithm was suggested in this paper which made some improvements in structure and operation, and it was applied to digital signature. The experiment made comparison between a combinatorial optimization algorithm which combined SMM with index of 2k hexadecimal algorithm and the new algorithm. It shows that the new algorithm reaches a high level in operation speed.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1741-1745

Citation:

Online since:

January 2015

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] C. Fu: An efficient implementation of RSA digital signature algorithm. Wireless Communications, Networking and Mobile Computing, 2008. WiCOM'08. 4th International Conference on 12-14 Oct 2008, Page(s): 1-4.

DOI: 10.1109/wicom.2008.2914

Google Scholar

[2] Q. Liu: Two efficient variants of the RSA cryptosystem. Computer Design and Applications (ICCDA), 2010 International Conference on Volume: 5, 25-27 June 2010, Page(s): 550-553.

Google Scholar

[3] B. Yang: Modern cryptography (Tsinghua university press, Beijing 2007).

Google Scholar

[4] F. Hu: Improved RSA digital signature algorithm and its application (Northeastern University, Shenyang 2008).

Google Scholar

[5] W. Stallings: Cryptography and Network Security - Principles and Practice (Electronic Industry Press, Beijing 2011).

Google Scholar

[6] S. L. Zhou: Research of RSA encryption algorithm and improved implementations (Nanchang University, Jiangxi 2008).

Google Scholar

[7] Y. L. He: Research and Implementation of RSA encryption algorithm (Central South University, Hunan 2009).

Google Scholar

[8] K. Y. Su: DES_RSA hybrid encryption and transmission to achieve (Nanjing University of Posts and Telecommunications, Jiangsu 2012).

Google Scholar

[9] L. G. Chen: Mathematical Foundations of Information Security (Tsinghua University Press, Beijing 2004).

Google Scholar