Thursday 25th of April 2024
 

Serious Security Weakness in RSA Cryptosystem


Majid Bakhtiari and Mohd Aizaini Maarof

Nowadays, RSA is the well-known cryptosystem which supports most of electronic commercial communications. RSA is working on the base of multiplication of two prime numbers. Currently different kinds of attacks have indentified against RSA by cryptanalysis. This paper has shown that regardless to the size of secret key and public key, it is possible to decrypt one cipher text by different secret keys RSA algorithm and in excellent condition, there are two similar key at least available in domain of two prime numbers multiplication.

Keywords: RSA, Similar Key, Different Secret Key, Encryption, cryptanalysis.

Download Full-Text


ABOUT THE AUTHORS

Majid Bakhtiari
Department of Computer Science & Information Systems, University Technology Malaysia, Skudai Johor Bahru, 81310, MALAYSIA

Mohd Aizaini Maarof
Department of Computer Science & Information Systems, University Technology Malaysia, Skudai Johor Bahru, 81310, MALAYSIA


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »