• Login
    View Item 
    •   Mak IR Home
    • College of Computing and Information Sciences (CoCIS)
    • School of Computing and Informatics Technology (CIT)
    • School of Computing and Informatics Technology (CIT) Collection
    • View Item
    •   Mak IR Home
    • College of Computing and Information Sciences (CoCIS)
    • School of Computing and Informatics Technology (CIT)
    • School of Computing and Informatics Technology (CIT) Collection
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Improving the RSA cryptographic algorithm using double encryption

    Thumbnail
    View/Open
    Thesis, Masters (2.697Mb)
    Date
    2006-02
    Author
    Mutyaba, Robert B.
    Metadata
    Show full item record
    Abstract
    Cryptographic algorithms are essential parts in network security, and cryptography is one of the main tools for privacy, trust, access control, electronic payments, corporate security, and countless other fields. The RSA algorithm is one of the most widely used and strongest cryptographic algorithms for over 20 years. It has braved attacks of many sorts, and been updated with various modifications. It is however feared that this algorithm is vulnerable, and its life-span is indeed a matter of an un-predictable technological revolution. In this Research, the RSA algorithm and key variants have been reviewed, and trends in attacks against it analysed. In the suggested modification, we use a transaction integer i and the public and private keys of the receiving entity in a given communication, to generate transaction public and private sub-keys for the communication. To do a double encryption, the public sub-key is used, and then the public key applied to the pre-cipher. The decryption is the reverse; where the receiving entity applies his/her private key before the private sub-key. The impact of this modification on RSA security has been briefly analyzed. Recommendations on further research in this direction are given, and particularly a detailed one suggested in which the Diffie-Hellman algorithm could be used to generate the sub-keys. The research concludes that such modifications to the RSA algorithm if further reasonably proved can considerably improve it, extend its lifespan and provide greater confidence for all its users.
    URI
    http://hdl.handle.net/10570/496
    Collections
    • School of Computing and Informatics Technology (CIT) Collection

    DSpace 5.8 copyright © Makerere University 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of Mak IRCommunities & CollectionsTitlesAuthorsBy AdvisorBy Issue DateSubjectsBy TypeThis CollectionTitlesAuthorsBy AdvisorBy Issue DateSubjectsBy Type

    My Account

    LoginRegister

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    DSpace 5.8 copyright © Makerere University 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV