Get all the updates for this publication
In this paper, a new variant of RSA has been proposed whose key generation method is distinct with the standard RSA. Generally the RSA family of variants can be applied at the secured channel to enhance its data trust level on various applications such as E-commerce, Internet applications, etc., The boundary level of the private key has been recommended here, to raise over these variant to stay away from the possibility of getting the Small 'd' value either by continuous fraction method of Wiener's attack, or by Coppersmith's lattice based method of Boneh & Durfee attack, or by retrieving the Euler's totient function value by Fermat factorization method. This paper discusses the proposal of Pell's RSA key generation and its security analyses over the standard RSA, N Prime RSA, Dual RSA. Finally the application of Pell's RSA, Blind signatures, are proposed. © 2013 IEEE.
View more info for "Pell's RSA key generation and its security analysis"
Journal | Data powered by Typeset2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) |
---|---|
Publisher | Data powered by TypesetIEEE |
Open Access | 0 |