Analysis of Rabin and Rabin-P Cryptosystem for specifying correct plain text
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 5
Abstract
This work, introduced a new, competent and useful scheme based on the Rabin cryptosystem without using the Jacobi symbol [1], message redundancy technique or the needs of extra bits in order to specify the correct plaintext. This system involves only a single prime number. This also analysed and discussed the comparison between the old system and the new system with suitable examples and results. Further demonstrate that the decryption is unique and proven to be equivalent to factoring. The scheme is performs better when compared to a number of Rabin cryptosystem variants.
Authors and Affiliations
Rakesh Nayak
Performance Analysis Of Adaptive Median Filter In Reducing Impulse Noise
A methodology based on median filter for the removal of salt and pepper noise by its detection followed by filtering in binary images has been proposed in this paper.The,filter such as adaptive median filter is derive...
Performance and analysis of NTRU and Advanced NTRU cryptosystems
Authentication and Confidentiality is the main goal of the public key cryptosystems deal when communication takes place between both the parties. The mostly used cryptographic methods are broadly classified as symmet...
Secure Group Communication by Establishing a Novel Trust Relationship Model and Detecting Malicious nodes in Peer to Peer Systems
Trust administration in P2P framework is utilized to distinguish vindictive practices and to advance legitimate and agreeable communications. The fundamental objective of the prior P2P frameworks is the capacity of c...
A Novel Privacy-Preserving Mechanism That Supports Public Auditing On Shared Data Stored In The Cloud
Numerous use of cloud data e.g., data mining and machine learning do not unavoidablycall for users to download the entire cloud data to local devices. It is since cloud providers such as Amazon can proffer users calc...
Ensuring Data Storage Security in a Cloud Computing Using ‘MONA’
Due to the frequent change of the membership, sharing data in a multi-owner manner is a major problem in cloud computing. Identity privacy and Privacy preserving from an entrusted cloud is still a challenging issue....