Header menu link for other important links
Pell's RSA key generation and its security analysis
, Vijayaragavan R.
Published in IEEE

In this paper, a new variant of RSA has been proposed whose key generation method is distinct with the standard RSA. Generally the RSA family of variants can be applied at the secured channel to enhance its data trust level on various applications such as E-commerce, Internet applications, etc., The boundary level of the private key has been recommended here, to raise over these variant to stay away from the possibility of getting the Small 'd' value either by continuous fraction method of Wiener's attack, or by Coppersmith's lattice based method of Boneh & Durfee attack, or by retrieving the Euler's totient function value by Fermat factorization method. This paper discusses the proposal of Pell's RSA key generation and its security analyses over the standard RSA, N Prime RSA, Dual RSA. Finally the application of Pell's RSA, Blind signatures, are proposed. © 2013 IEEE.

About the journal
JournalData powered by Typeset2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
PublisherData powered by TypesetIEEE
Open Access0