Enhance key generation algorithm based user string identity as public key

This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. This algorithm uses a user’s identity to replace the numbers that are used as a publ...

Full description

Bibliographic Details
Main Author: Norhidayah, Muhammad
Format: Thesis
Language:English
Published: 2015
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/13065/19/Enhance%20key%20generation%20algorithm%20based%20user%20string%20identity%20as%20public%20key.pdf
_version_ 1796991273913024512
author Norhidayah, Muhammad
author_facet Norhidayah, Muhammad
author_sort Norhidayah, Muhammad
collection UMP
description This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. The main advantage of the Tripathi algorithm is that users can easily recall the public key, since it is their own identity. However, this algorithm is unable to use all of users’ E-mail addresses as public keys, only certain E-mails can be used as public keys. This is due to two main reasons: i) this algorithm uses the same modulo value for every E-mail. Consequently, if the E-mail is not relative prime to modulo value, the new E-mail should be entered, and ii) once the E-mail converted to decimal value, it is composed of odd and even numbers. If the decimal value is in even numbers, then it can’t be used as a public key. Only odd decimal values can be used in a public key using the Tripathi algorithm. Therefore, the Tripathi algorithm needs to be improved so that all E-mail addresses can be used as public keys. The proposed algorithm enables the algorithm to be applicable to all E-mail address domains, such as yahoo, gmail, edu, company, among others.In this study, two experiments were conducted. In the first experiment, an algorithm called the LB-RSA was developed. A looping process was added to this algorithm in order to produce a new modulo value to make the E-mail entered relative prime to the new modulo value, which helps to produce more E-mail addresses that can be used as public keys. This algorithm has shown promising results, and 50% of the total number of E-mails can be used as public keys. This number is greater than the amount generated by the Tripathi algorithm, which is only 10%. Since the result produced by this algorithm did not reach 100%, the second experiment was conducted to further enhance the LB-RSA algorithm. In this experiment, an algorithm called the CLB-RSA was developed. Classifications of decimal values to determine whether the E-mail entered contains odd or even numbers were added to this algorithm. This algorithm achieved 100%, hence, all E-mails considered can be used as public keys.
first_indexed 2024-03-06T12:03:35Z
format Thesis
id UMPir13065
institution Universiti Malaysia Pahang
language English
last_indexed 2024-03-06T12:03:35Z
publishDate 2015
record_format dspace
spelling UMPir130652021-11-08T06:04:18Z http://umpir.ump.edu.my/id/eprint/13065/ Enhance key generation algorithm based user string identity as public key Norhidayah, Muhammad Q Science (General) QA Mathematics QA76 Computer software This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. The main advantage of the Tripathi algorithm is that users can easily recall the public key, since it is their own identity. However, this algorithm is unable to use all of users’ E-mail addresses as public keys, only certain E-mails can be used as public keys. This is due to two main reasons: i) this algorithm uses the same modulo value for every E-mail. Consequently, if the E-mail is not relative prime to modulo value, the new E-mail should be entered, and ii) once the E-mail converted to decimal value, it is composed of odd and even numbers. If the decimal value is in even numbers, then it can’t be used as a public key. Only odd decimal values can be used in a public key using the Tripathi algorithm. Therefore, the Tripathi algorithm needs to be improved so that all E-mail addresses can be used as public keys. The proposed algorithm enables the algorithm to be applicable to all E-mail address domains, such as yahoo, gmail, edu, company, among others.In this study, two experiments were conducted. In the first experiment, an algorithm called the LB-RSA was developed. A looping process was added to this algorithm in order to produce a new modulo value to make the E-mail entered relative prime to the new modulo value, which helps to produce more E-mail addresses that can be used as public keys. This algorithm has shown promising results, and 50% of the total number of E-mails can be used as public keys. This number is greater than the amount generated by the Tripathi algorithm, which is only 10%. Since the result produced by this algorithm did not reach 100%, the second experiment was conducted to further enhance the LB-RSA algorithm. In this experiment, an algorithm called the CLB-RSA was developed. Classifications of decimal values to determine whether the E-mail entered contains odd or even numbers were added to this algorithm. This algorithm achieved 100%, hence, all E-mails considered can be used as public keys. 2015-06 Thesis NonPeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/13065/19/Enhance%20key%20generation%20algorithm%20based%20user%20string%20identity%20as%20public%20key.pdf Norhidayah, Muhammad (2015) Enhance key generation algorithm based user string identity as public key. Masters thesis, Universiti Malaysia Pahang (Contributors, UNSPECIFIED: UNSPECIFIED).
spellingShingle Q Science (General)
QA Mathematics
QA76 Computer software
Norhidayah, Muhammad
Enhance key generation algorithm based user string identity as public key
title Enhance key generation algorithm based user string identity as public key
title_full Enhance key generation algorithm based user string identity as public key
title_fullStr Enhance key generation algorithm based user string identity as public key
title_full_unstemmed Enhance key generation algorithm based user string identity as public key
title_short Enhance key generation algorithm based user string identity as public key
title_sort enhance key generation algorithm based user string identity as public key
topic Q Science (General)
QA Mathematics
QA76 Computer software
url http://umpir.ump.edu.my/id/eprint/13065/19/Enhance%20key%20generation%20algorithm%20based%20user%20string%20identity%20as%20public%20key.pdf
work_keys_str_mv AT norhidayahmuhammad enhancekeygenerationalgorithmbaseduserstringidentityaspublickey