Javascript must be enabled to continue!
The Optimal Equations with Chinese Remainder Theorem for RSA’s Decryption Process
View through CrossRef
This research was designed to provide an idea for choosing the best two equations that can be used to finish the RSA decryption process. In general, the four strategies suggested to accelerate this procedure are competitors. Chinese Remainder Theorem (CRT) is among four rivals. The remains are improved algorithms that have been adjusted from CRT. In truth, the primary building block of these algorithms is CRT, but the sub exponent of CRT is substituted with the new value. Assuming the modulus is obtained by multiplying two prime numbers, two modular exponentiations must be performed prior to combining the results. Three factors are chosen to determine the optimal equation: modular multiplications, modular squares, and modular inverses. In general, the proposed method is always the winner since the optimal equation is selected from among four methods. The testing findings show that the proposed technique is consistently 10-30% faster than CRT.
Title: The Optimal Equations with Chinese Remainder Theorem for RSA’s Decryption Process
Description:
This research was designed to provide an idea for choosing the best two equations that can be used to finish the RSA decryption process.
In general, the four strategies suggested to accelerate this procedure are competitors.
Chinese Remainder Theorem (CRT) is among four rivals.
The remains are improved algorithms that have been adjusted from CRT.
In truth, the primary building block of these algorithms is CRT, but the sub exponent of CRT is substituted with the new value.
Assuming the modulus is obtained by multiplying two prime numbers, two modular exponentiations must be performed prior to combining the results.
Three factors are chosen to determine the optimal equation: modular multiplications, modular squares, and modular inverses.
In general, the proposed method is always the winner since the optimal equation is selected from among four methods.
The testing findings show that the proposed technique is consistently 10-30% faster than CRT.
Related Results
Photosynthetic Physiological Basis of Forage Mass Stability in a Progeny of Rhizome-Rooted ‘Qingshui’ Medicago sativa L.
Photosynthetic Physiological Basis of Forage Mass Stability in a Progeny of Rhizome-Rooted ‘Qingshui’ Medicago sativa L.
Rhizome-rooted alfalfa (Medicago sativa L.) is an excellent forage for establishing grazing and ecological grasslands, requiring a high and stable yield. Studying the genetic and p...
Hidden Real Modulus RSA Cryptosystem
Hidden Real Modulus RSA Cryptosystem
Cryptographic techniques in cyber security can be categorized into symmetric and asymmetric. Among asymmetric cryptographic techniques, the RSA algorithm is more popular and consid...
Repeated sprint ability (RSA) performance is not related to body height and body weight measurements among perak sukma 2018 male rugby players
Repeated sprint ability (RSA) performance is not related to body height and body weight measurements among perak sukma 2018 male rugby players
Repeated sprint ability (RSA) is typically used for speed-endurance and agility-endurance training and assessment. RSA is preferred as it mimics actual performance during competiti...
Calcium Ionophore-Induced Tissue Factor (TF) Decryption Induces TF Immobilization Into Lipid Rafts and Negative Regulation of TF Procoagulant Activity.
Calcium Ionophore-Induced Tissue Factor (TF) Decryption Induces TF Immobilization Into Lipid Rafts and Negative Regulation of TF Procoagulant Activity.
Abstract
Abstract 1131
Cell exposed tissue factor (TF), the physiologic initiator of blood coagulation, is normally expressed in a low procoagulant, o...
Analisis Performa Kecepatan Algoritma Dual Modulus RSA dalam Pengamanan Data Teks dengan Python
Analisis Performa Kecepatan Algoritma Dual Modulus RSA dalam Pengamanan Data Teks dengan Python
This study analyzes the performance of the Dual Modulus RSA algorithm in securing text data using Python. The rapid growth of digital technology has increased the risk of data secu...
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
Introduction: With the advent of quantum computing, traditional encryption methods face significant challenges in maintaining security. This study explores quantum information proc...
Comparative Analysis of RSA and ElGamal Cryptographic Public-key Algorithms
Comparative Analysis of RSA and ElGamal Cryptographic Public-key Algorithms
An asymmetric algorithm is an encryption technique that uses different keys on the process of encryption and decryption. This algorithm uses two keys, public key, and private key. ...
Keamanan Data melalui Enkripsi Studi Kasus dengan Algoritma RSA
Keamanan Data melalui Enkripsi Studi Kasus dengan Algoritma RSA
Data security is a critical aspect in the digital era due to the increasing exchange of sensitive information through electronic media. One widely used approach to protect data con...

