Simulation Survey of RSA and Its Variants

Authors

  • R Kumar Sagar Institute of Science, Technology and Engineering (SISTec-E), Bhopal, India
  • AK Jain Sagar Institute of Science, Technology and Engineering (SISTec-E), Bhopal, India

Keywords:

CRT, Elgamal, Multi-prime RSA, Security, Three-prime RSA

Abstract

Cryptography is used in securing data transmission over insecure networks. The selection of algorithm requires the condition of fulfillment of authentication, confidentiality, integrity and non-repudiation. Among all public key encryption algorithms, RSA is globally accepted encryption algorithm due to its hardness against various possible attacks. In this paper, we studied RSA, enhanced RSA, Elgamal, chinese remainder theorem (CRT) based RSA, multi-power RSA, three-prime RSA and Elgamal-RSA cryptosystem.

References

Sarika Khatarkar and Rachana Kamble, "Encrypted RSA Public Key Sharing By Using Image Pixel Color Value", International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.231-235, 2015.

A. Menezes, P. van Oorschot and S. Vanstone, “Handbook of applied cryptography”, CRC Press, 1996.

Cetin Kaya Koc, “High speed RSA implementation”, Technical Report, RSA Laboratories, California, 1994.

T. Takagi., “Fast RSA-type cryptosystem modulo pkq”, In the Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO 1998), Santa Barbara, California, USA, pp.318-326, 1998.

Yonghong Yang, Z. Abid and Wei Wang, “CRT-based three-prime RSA with immunity against hardware fault attack”, In the Proceedings of the 4th IEEE International Workshop on System-on-Chip for Real-Time Applications (IWSOC 2004), Banff, Alta., Canada, pp.73-76, 2004.

Anand Krishnamurthy, Yiyan Tang, Cathy Xu and Yuke Wang, “An efficient implementation of multi-prime RSA on DSP processor”, In Proceedings of the 2003 IEEE lnternational Conference on Acoustics, Speech and Signal Processing (ICASSP 2003), Hong Kong, China, pp.413-416, 2003.

Al-Hamami, A. H., Aldariesh, I. A., “Enhanced method for RSA cryptosystem algorithm”, In the Proceedings of IEEE Advanced Computer Science Applications and Technologies (ACSAT), Kuala Lumpur, Malaysia, pp.402-408, 2012.

S. Mewada, P. Sharma and S. S. Gautam, "Exploration of efficient symmetric algorithms," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), India, pp. 663-666, 2016.

Rashmi Singh and Shiv Kumar, “Elgamal’s algorithm in cryptography”, International Journal of Scientific and Engineering Research, Vol.3(12), pp.1-4, 2012.

Ahmed, J. M. and Ali, Z. M, “The enhancement of computation technique by combining RSA and Elgamal cryptosystems”, In the Proceedings of IEEE Electrical Engineering and Informatics (ICEEI 2011), Bandung, Indonesia, pp.1-5, 2011.

Mini Malhotra, “A new encryption scheme based on enhanced RSA and Elgamal”, International Journal of Emerging Technologies in Computational and Applied Sciences, Vol.14(336), pp.138-142, 2014.

Cay S. Hostmann and Gary Cornell, “Core Java,” Volume 1-Fundamentals, Nineth Edition, Prentice Hall, USA, 2013.

Cay S. Hostmann and Gary Cornell, “Core Java,” Volume 2-Advanced Features, Nineth Edition, Prentice Hall, USA, 2013.

Downloads

Published

2025-11-11

How to Cite

[1]
R. Kumar and A. Jain, “Simulation Survey of RSA and Its Variants”, Int. J. Comp. Sci. Eng., vol. 5, no. 7, pp. 67–70, Nov. 2025.

Issue

Section

Research Article