Improved Trial Division Algorithm by Lagrange's Interpolation Function
Improved Trial Division Algorithm by Lagrange's Interpolation Function
*
Maloth Bhavsingh, 1M. Sri Lakshmi, 2Dr. S. Prem Kumar,3N. Parashuram
1,3
Assistant Professor, Dept. of CSE, G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh
2
Prof &HOD, Dept of CSE, G Pullaiah College of Engineering and Technology, Kurnool.Andhra Pradesh.
Abstract- Nowadays data communication over the internetgrowths the security risk on the side of receiver and transmitter. To reduce risk level,
cryptography technique has been used which is based on aprivate and public key in disquiet of endorsement. The process of encryption and
decryption improved the capacity of data security. Asymmetric cryptography technique provides renowned RSA public key cryptography
technique. The success story of RSA algorithm depends on the prime factor. For the estimation of theprime factor used various mathematical
functions. In this paper,Lagranges interpolation derivation for the estimation of aprime factoris used. The estimated prime factor is very
complex and reduces the complexity of prime factor.
__________________________________________________*****_________________________________________________
1227
IJRITCC | May 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 5 1227 - 1231
_______________________________________________________________________________________________
1228
IJRITCC | May 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 5 1227 - 1231
_______________________________________________________________________________________________
4. PROPOSED METHOD AND MODEL were tested on Intel core-i5 PC 2.50 GHz with 4 GB RAM
In this section, we will discuss the improved algorithm of under Microsoft Windows-8.1 Pro 32-bit using Dot Net. The
RSA factor generation using the interpolation derivatives original and modified Factorization method implementations
and algorithm. The interpolation derivates derived the input are shown in Fig 2.
message regarding data and create a variable size matrix for
the processing of input data of through Lagranges
interpolation and generate P and Q Prime Factor.
Table 1: Result table shows the number value of N, a factor of N and taken time using TDF, KNJ, LIF Methods in our Modified
Trial Division Algorithm, using Lagrange's Interpolation Method to factorize RSA Public Key Encryption.
1943 67*29
00.0010952 0.0048015 00.0000008
998299 1213*823
00.0033018 0.0047859 00.0000004
85928201 9817*8753
00.0946525 0.0043368 00.0000004
1323172573 47591*27803
01.8576520 0.0047592 00.0000004
Even though the number of digits in N is increased; the better prime value and minimum period. In future increase,
proposed algorithm takes less time to compute the factors of the duration of integer and reduces the time complexity.
N as compared to the Modified Trial Division Algorithm
using KNJ Factorization method. Hence, the time execution REFERENCES
in the Lagranges Factorization method is very less as [1] AL-Hamami AL-Ani, Technology of information
security and protection systems, ISBN 978-9957-11-697-
compare to Modified Trial Division method. Therefore
2, pp.173 - 223, Dar Wael , Jordan. 2007
Lagranges Factorization method gives better results,
[2] NidhiLal, AnuragPrakash Singh and Shishupal Kumar
increases thespeed of computation and provides anefficient Modified Trial Division Algorithm Using KNJ-
way of factorization. Factorization Method to Factorize RSA Public Key
Encryption, IEEE, 2014, Pp 1-4.
7. CONCLUSION AND FUTURE WORK [3] Nils Gura, Arun Patel, Arvinderpal Wander, Hans Eberle
The proposed interpolation algorithm reduces the time and Sheueling Chang Shantz Comparing Elliptic Curve
complexity and space complexity in point factor Cryptography and RSA on 8-bit CPUs, Springer, 2014,
interpolation. The main concept is to check only those Pp 119-132.
factors which are odd, as well as those, are prime numbers. [4] Alese, B. K., Philemon E. D. and Falaki, S.
The proposed Lagranges Interpolation Factorization O.Comparative Analysis of Public-Key Encryption
Schemes, International Journal of Engineering and
algorithm works very efficiently on those factors that are
Technology, 2012, Pp 1552-1568.
nearby and very closest to N. The Lagranges interpolation
[5] Kamran Ali, Muhammad AsadLodhi and Ovais bin
enhanced the capacity of prime factorization of RSA Usman FPGA Implementation of RSA Encryption
algorithm. The Lagranges interpolation used the point System, LUMS, 2012. Pp 2-9.
distribution function for the estimation of aprime number. If [6] Tal Malkin, Isamu Teranishi and Moti Yung Ecient
the distribution function length is increased, the complexity Circuit-Size Independent Public Key Encryption with
of time is also increased. The 12-digit number factor gives KDM Security, 2013, Pp 1-20.
1230
IJRITCC | May 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 5 1227 - 1231
_______________________________________________________________________________________________
[7] Joppe W. Bos, J. Alex Halderman, Nadia Heninger,
Jonathan Moore, Michael Naehrig and Eric Wustrow
Elliptic Curve Cryptography in Practice, Springer,
2014, Pp 157-175.
[8] Mohamed HamdyEldefrawy, Muhammad KhurramKhan
and KhaledAlghathbar A Key Agreement Algorithm
with Rekeying for Wireless Sensor Networks using
Public Key Cryptography, IEEE, 2010, Pp 1-6.
[9] Jesus Ayuso, Leandro Marin, Antonio J. Jara and
Antonio F. GomezSkarmeta Optimization of Public
Key Cryptography (RSA and ECC) for 16-bits Devices
based on 6LoWPAN, International Workshop on the
Security of the Internet of Things, 2010, Pp 1-8.
[10] Hoeteck Wee Public Key Encryption AgainstRelated
Key Attacks, NSF CAREER, 2011, Pp 1-18.
[11] Michael Hutter and Erich Wenger Fast Multi-precision
Multiplication for Public-Key Cryptography on
Embedded Microprocessors, International Association
for Cryptologic Research, 2011, Pp 459-474.
[12] Samuel Neves and Filipe Araujo On the Performance of
GPU Public-Key Cryptography, IEEE, 2011, Pp 133-
140.
[13] DhananjayPugila, Harsh Chitrala, SalpeshLunawat and
P.M.Durai Raj Vincent An efficient encryption
algorithm based on public keycryptography, IJET,
2013, Pp 3064-3067.
[14] Thomas Poppelmann and Tim Guneysu Towards
Practical Lattice-Based Public-Key Encryption on
Recongurable Hardware, Springer, 2014, Pp 68-85.
[15] B.Persis Urbana Ivy and PurshotamMandiwa. Mukesh
Kumar A modified RSA cryptosystem based on n
prime numbers, IEEE, 2013, Pp 1-4.
1231
IJRITCC | May 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________