IIUM Repository

Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges

Abubakar, Adamu and Jabaka, Shehu and Tijani, Bello Idrith and Zeki, Akram M. and Chiroma, Haruna and Usman, Mohammed Joda and Raji, Shakirat and Mahmud, Murni (2014) Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges. Journal of Theoretical and Applied Information Technology, 61 (1). pp. 37-43. ISSN 1817-3195 (O), 1992-8645 (P)

[img] PDF - Published Version
Restricted to Repository staff only

Download (352kB) | Request a copy
[img]
Preview
PDF (SCOPUS)
Download (144kB) | Preview

Abstract

RSA cryptosystem is an information security algorithm used for encrypting and decrypting of digital data in order to protect the content of the data and to ensure its privacy. Prior research studies have shown that RSA algorithm is very successful in protecting enterprises commercial services and systems as well as web servers and browsers to secure web traffic. In an email application, it's utilized to ensure the privacy and authenticity of email message. Some studies have also shown the efficiency of RSA algorithm in securing remote login sessions, and electronic credit-card payment systems. Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. Its strength lies with its ability of withstanding many forms of attacks. While many studies focus on proving that RSA algorithm is breakable under certain cryptanalytic attacks, yet there are some confrontations on the circumstances of applying those attacks. This paper presents the issues and challenges on some key aspects of cryptanalytic attacks on RSA algorithm. The paper also explores the perceived vulnerabilities of implementing RSA algorithm which can render a cryptanalyst easier means of attack.

Item Type: Article (Journal)
Additional Information: 6153/36589
Uncontrolled Keywords: RSA Cryptosystem, Cryptanalysis, Cryptanalytic Atta cks
Subjects: T Technology > T Technology (General)
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): Kulliyyah of Information and Communication Technology > Department of Information System
Kulliyyah of Information and Communication Technology > Department of Information System
Depositing User: Akram M Zeki
Date Deposited: 12 May 2014 09:19
Last Modified: 19 Sep 2017 15:25
URI: http://irep.iium.edu.my/id/eprint/36589

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year