Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(551.89KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N 1024 Bit and 4096 Bit
Desi Wulansari, Much Aziz Muslim, Endang Sugiharti
Pages - 186 - 194     |    Revised - 31-10-2016     |    Published - 01-12-2016
Volume - 10   Issue - 5    |    Publication Date - December 2016  Table of Contents
MORE INFORMATION
KEYWORDS
Encryption and Decryption, RSA, RSA-CRT, 1024 bit and 4096 bit.
ABSTRACT
Cryptography has several important aspects in supporting the security of the data, which guarantees confidentiality, integrity and the guarantee of validity (authenticity) data. One of the public-key cryptography is the RSA cryptography. The greater the size of the modulus n, it will be increasingly difficult to factor the value of n. But the flaws in the RSA algorithm is the time required in the decryption process is very long. Theorem used in this research is the Chinese Remainder Theorem (CRT). The goal is to find out how much time it takes RSA-CRT on the size of modulus n 1024 bits and 4096 bits to perform encryption and decryption process and its implementation in Java programming. This implementation is intended as a means of proof of tests performed and generate a cryptographic system with the name "RSA and RSA-CRT Text Security". The results of the testing algorithm is RSA-CRT 1024 bits has a speed of approximately 3 times faster in performing the decryption. In testing the algorithm RSA-CRT 4096 bits, the conclusion that the decryption process is also effective undertaken more rapidly. However, the flaws in the key generation process and the RSA 4096 bits RSA-CRT is that the time needed is longer to generate the keys.
1 Google Scholar 
2 refSeek 
3 Scribd 
4 SlideShare 
5 PdfSR 
1 Muslim, M. A., & Prasetiyo, B. "Implementation Twofish Algorithm for Data Security in a Communication Network using Library Chilkat Encryption Activex." Journal of Theoretical and Applied Information Technology, 84 (3), 370. 2016.
2 Chen, C., Wang, T., & Tian, J. "Improving Timing Attack on RSA-CRT via Error Detection and Correction Strategy." Information Sciences, 232, 464-474. 2013.
3 Lu, Y., Zhang, R., & Lin, D. "New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents." In International Conference on Applied Cryptography and Network Security (pp. 151-162), Springer International Publishing. June, 2014.
4 Quisquater, J. J., & Couvreur, C. Fast Decipherment Algorithm for RSA Public-Key Cryptosystem. Electronics Letters, 18(21), 905-907. 1982.
5 Abutaha, Mohammed, et al. "Survey Paper: Cryptography is the Science of Information Security." International Journal of Computer Science and Security (IJCSS), 5.3: 298. 2011.
6 Alawadhi, R., & Nair, S. "A Crypto-System with Embedded Error Control for Secure and Reliable Communication." International Journal of Computer Science and Security (IJCSS), 7(2), 48. 2013.
Miss Desi Wulansari
Semarang State University - Indonesia
desiwulans03@gmail.com
Mr. Much Aziz Muslim
Universitas Negeri Semarang - Indonesia
Mrs. Endang Sugiharti
Universitas Negeri Semarang - Indonesia