Analytical Comparison of RSA and RSA with Chinese Remainder Theorem
Journal Title: Journal of Independent Studies and Research - Computing - Year 2016, Vol 14, Issue 1
Abstract
RSA encryption algorithm is one of the most powerful public key encryption algorithm. The problem with RSA algorithm is that RSA decryption is relatively slow in comparison to RSA encryption. Chinese Remainder Theorem (CRT), a modulo based mathemati- cal theorem, is proposed by researchers as a way to enhance the performance of decryption. CRT minimizes the mathematical computation to large extent, thus improving the speed. CRT is well known for improving RSA’s decryption speed, but it has some drawbacks which limits its usage. The problem is that the limitations or drawbacks of CRT are not highlighted. The goal of this research paper is to address disadvantages of CRT when used for RSA decryption. Apart from the social and economic impacts, this paper covers the effects of research on current cryptographic protocols used by different browsers as well as organizations. In order to achieve goal, we are comparing several factors between RSA decryption with RSA-CRT decryption. We are using JAVA programming language to analyze the decryption algorithms. The significance of this research paper is to serve as the foundation for further research on RSA-CRT decryption. In addition, this paper addresses situations where CRT decryption is faster and beneficial to use by stating its advantages and disadvantages.
Constructing Ghost Free High Dynamic Range Images Using Convolutional Neural Network and Structural Similarity Index
A foreign object, commonly called as a ghost artifact, is integrated in the HDR output image when there is a moving object in the photography scene. The problem is persisting even after numerous models proposed by resear...
Enhancing Data Quality using Human Computation and Crowd Sourcing
This paper is aimed at addressing the issues that are present in the data dumps available at DBpedia by using the concept of associations i.e. concept hierarchy to enhance the quality of those data dumps. These data dump...
Online Optical Tomography System Application of Charge-Coupled Device (CCD) for Object Detection in Crystal Clear Water
This research presents an application of Charge-Coupled Device (CCD) linear sensor and laser diode in an optical tomography system. These optoelec- tronic sensors are believed to detect solid objects rather than transpar...
Probabilistic Vs. Soft Computing for Classifying Credit Card Transactions. A Case Study of Pakistani's Credit Card Data
Credit cards are now widely used by consumers for purchasing various goods and services due to widespread use of internet and consequential growth of E-commerce over the past few decades. This enhanced use of credit card...
Performance Analysis of TCP and UDP over Mobile Ad hoc Network
In the network computing domain, mobile ad hoc networks (MANETs) have gained promi- nence during the recent years. These networks have been used in almost all domains of today’s life; especially in military and emergency...