Computer Science ›› 2023, Vol. 50 ›› Issue (6A): 220300107-7.doi: 10.11896/jsjkx.220300107

• Information Security • Previous Articles     Next Articles

Research Progress of RSA Algorithm in Network Data Transmission

WANG Xinmiao, SUN Tingting, MA Jingjun   

  1. College of Science and Technology,Hebei Agricultural University,Cangzhou,Hebei 061000,China
  • Online:2023-06-10 Published:2023-06-12
  • About author:WANG Xinmiao,born in 2000,undergraduate.Her main research interest is computer software and theory. MA Jingjun,born in 1971,professor.His main research interests include data mining and algorithm optimization.
  • Supported by:
    Key R&D Program of Hebei Province(19220119D).

Abstract: In the process of people’s “ face-to-face ” information exchange using various electronic devices,both sides do not want their information to be obtained by the third party,which leads to the problem of communication security.Data security is not enough,the data transmission process is vulnerable to external interference,resulting in information duplication,missing,packet loss or delay.These problems are still not completely avoided.One of the important reasons is that the security of data is not enough,and it is disturbed by the outside world in the transmission process.In response to this problem,the majority of scientific researchers have actively responded,invented data encryption technology and introduced cryptography,which uses cryptographic algorithms to encrypt the data to reduce the interference in the transmission process,thereby protecting the data.In essence,among many technologies that guarantee various functional characteristics of information security,data encryption technology is the core and key technology of information security.Data encryption technology encrypts data from plaintext to ciphertext and communicates through encryption algorithm,and then decrypts the plaintext through corresponding decryption algorithm,which can improve the security of data transmission and ensure the integrity of data transmission.In order to further understand the working principle of cryptographic algorithm in network data transmission,this paper selects the RSA algorithm in asymmetric cryptographic system as the research object,introduces the encryption and decryption process of this algorithm in detail,compares and analyzes the advantages and disadvantages of RSA algorithm and ECC algorithm,and summarizes the corresponding optimization measures and optimization results in view of the defects of RSA algorithm.Finally,the research progress and practical application of RSA algorithm in network data transmission are summarized,and the future of RSA algorithm is prospected,hoping to provide some reference for data protection.

Key words: RSA algorithm, Cryptosystem, Data encryption, Authentication, Digital signature

CLC Number: 

  • TP309
[1]GONG L,ZHANG L,ZHANG W,et al.The application of data encryption technology in computer network communication security[C]//AIP Conference Proceedings.New York:American Institute of Physics,2017.
[2]XIE X M.Establishment and Technical Analysis of Computer Network Information Security Protection Mode[J].Science and Technology Innovation,2019(7):66-67.
[3]《Law of the people’s Republic of China on Guarding State secrets》[Z].Beijing,2010.10.
[4]LIU S S,WANG P,LUO L,et al.Security Module in Information Unilateral Transmission System among Networks[C]//AASRI Procedia,NETHERLANDS:ELSEVIER SCIENCE BV.2012:100-105.
[5]ZHAO Y B,ZHANG X J,JIANG Y L.Application Research of High Strength File Encryption Based on Digital Envelope[J].Computer Engineering and Design,2007(18):4357-4359.
[6]DIFFIE W,HELLMAN M.New directions in cryptography[J].IEEE transactions on Information Theory,1976,22(6):644-654.
[7]LAMPORT L.Password authentication with insecure communication[J].Communications of the ACM,1981,24(11):770-772.
[8]YEN S M,LIAO K H.Shared authentication token secureagainst replay and weak key attacks[J],Information Processing Letters,1997,62(2):77-80.
[9]LEE S,PARK S.Mobile Password System for Enhancing Usab-ility-Guaranteed Security in Mobile Phone Banking[J].Web and Communication Technologies and Internet-Related Social Issues-HSI 2005,2005,3597:66-74.
[10]YANG Y J,DENG R H,BAO F.A practical password-based two-server authentication and key exchange system[J].IEEE Transactions on Dependable and Secure Computing,2006,3(2):105-114.
[11]LIU J Z.Internet/INTRANET Security Technology[J].Software and Integrated Circuit,1997(1):16-20.
[12]LIN X F,FUN M F.Data Security in Network Transmission[J].Software Guide,2012,11(1):139-141.
[13]ZHAO G P.Cryptography Technology in Network Data Transmission Security[J].Information and Computer(theoretical edition),2010(20):19.
[14]HUANG Y,HU W D,CHEN K F.Classification of Network Attack and Security Protection[J].Computer Engineering,2001(5):131-133,140.
[15]XU C.The Application of AES and RSA Hybrid EncryptionTechnology in Network Data Transmission[J].Wireless Interconnection Technology,2016(13):142-144.
[16]XU S S,ZHU X M,BAI L F,et al.Application of Attribute-based Cryptosystem in Network Security Level Protection[C]//Papers of the Seventh National Security Level Protection Technology Congress 2018.2018:159-164.
[17]HUANG H M.Data Encryption Technology and Its Application in Network Security Transmission[D].Xiamen:Xiamen University,2008.
[18]RIVEST R L,SHAMIR A,ADLEMAN L.A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978,21(2):120-126.
[19]HU J.Research and Implementation of RSA Encryption Algorithm[M].Maanshan:Anhui University of Technology,2011:1-48.
[20]SONG Y.Research and Application of Encryption Communication Based on RSA Algorithm[J].Electronic Test,2021(16):33-36,138.
[21]ARTO S.Public Key Cryptography[M].Beijing:National Defense Industry Press,1998.
[22]LU J Y.Research on Data Transmission Security TechnologyBased on Web Network[D].Nanjing:Nanjing University of Technology,2009:1-67.
[23]TIAN W Y,LI Z M.Research and Implementation of RSA Encryption Algorithm and Its Improved Algorithm[J].Shanxi Electronic Technology,2013(6):90-92.
[24]LIU W,ZHU M R,LIU Y L.Data Encryption Transmission in Remote Fault Diagnosis System[J].Network Security Techno-logy & Application,2008(1):83-84,21.
[25]HUANG Y L,LEU F Y,YOU I,et al.A secure wireless communication system integrating RSA,Diffie-Hellman PKDS,intelligent protection-key chains and a Data Connection Core in a 4G environment[J].Journal of Supercomputing,2014,67(3):635-652.
[26]KUMAR B J S,RAJ V K R,NAIR A.Comparative study onAES and RSA algorithm for medical images[C]//2017 International Conference on Communication and Signal Processing(ICCSP).New York:IEEE Press,2017:501-504.
[27]ABOUD S J.An efficient method for attack RSA scheme[C]//2009 Second International Conference on the Applications of Digital Information and Web Technologies.New York:IEEE Press,2009:587-591.
[28]ZHANG C N.Integrated approach for fault tolerance and digital signature in RSA[J].IEE Proceedings-Computers and Digital Techniques,1999,146(3):151-159.
[29]ZHANG Y F,QIN Z G,LIU J D.Performance Analysis of Elliptic Curve Encryption System[J].Journal of University of Electronic Science and Technology of China,2001(2):144-147.
[30]VANSTONE S A,ZUCCHERATO R J.Short RSA keys and their generation[J].Journal of Cryptology,1995,8(2):101-114.
[31]YU H,KIM Y.New RSA Encryption Mechanism Using One-Time Encryption Keys and Unpredictable Bio-Signal for Wireless Communication Devices[J].Electronics,2020,9(2):246.
[32]BHASKAR R,HEGDE G,VAYA P R.An efficient hardware model for RSA Encryption system using Vedic mathematics[C]//International Conference on Communication Technology and System Design 2011.NETHERLANDS:ELSEVIER SCIENCE BV,2012:124-128.
[33]QIU L,LIU Z,PEREIRA G C C F,et al.Implementing RSA for sensor nodes in smart cities[J].Personal and Ubiquitous Computing,2017,21(5):807-813.
[34]KARATSUBA A,OFMAN Y U.Multiplication of multidigitnumbers on automata[J].Soviet physics doklady,1963,7:595-596.
[35]PRANESH R,HARISH V,VIGNESHWARAN M,et al.Anew approach for secure data transmission[C]//Proceedings of IEEE International Conference on Circuit,Power and Computing Technologies(ICCPCT 2016).New York:IEEE Press,2016:1-4.
[36]CHAUDHURY P,DHANG S,ROY M,et al.ACAFP:Asymmetric key based cryptographic algorithm using four prime numbers to secure message communication.A review on RSA algorithm[C]//2017 8th Annual Industrial Automation and Electromechanical Engineering Conference(IEMECON).New York:IEEE Press,2017:332-337.
[37]THIZIERS A H,THÉODORE H C,ZOUEU J T,et al.Enhanced,Modified and Secured RSA Cryptosystem based on n Prime Numbers and Offline Storage for Medical Data Transmission via Mobile Phone[J].International Journal of Advanced Computer Science and Applications(IJACSA),2019,10(10):353-360.
[38]ZHU K,LIN Z,DING Y.A new RSA image encryption algorithm based on singular value decomposition[J].International Journal of Pattern Recognition and Artificial Intelligence,2019,33(1):1954002.
[39]ZHANG Y Z.Multi-character Sorting Encryption Transmission Method for Wireless Local Area Network Data[J].Automation &Instrumentation,2021(6):35-38,42.
[40]SUNDARI M,REVATHI P B,SUMESH S.Secure Communication Using Digital Watermarking with Encrypted Text Hidden in an Image[C]//Security in Computing and Communications(SSCC 2015).Berlin:Springer,2015:247-255.
[41]RAMAIYA M K,HEMRAJANI N.Improvisation of Security aspect of Steganographic System by applying RSA Algorithm[J].International Journal of Advanced Computer Science and Applications,2016,7(7):245-249.
[42]BANGERA K N,REDDY N V S,PADDAMBAIL Y,et al.Multilayer security using RSA cryptography and dual audio ste-ganography[C]//2017 2nd IEEE International Conference on Recent Trends in Electronics,Information & Communication Technology(RTEICT).New York:IEEE Press,2017:492-495.
[43]JIANG W B,XU H,DONG H,et al.An improved security framework for Web service-based resources[J].Turkish Journal of Electrical Engineering & Computer Sciences,2016,24(3):774-792.
[44]TIMOTHY D P,SANTRA A K.A hybrid cryptography algorithm for cloud computing security[C]//2017 International conference on Microelectronic Devices,Circuits and Systems(ICMDCS).New York:IEEE Press,2017:1-5.
[45]FOTOHI R,BARI S F,YUSEFI M.Securing Wireless SensorNetworks Against Denial-of-Sleep Attacks Using RSA Cryptography Algorithm and Interlock Protocol[J].International Journal of Communication Systems,2020,33(4):e4234.
[46]PARMAR N J,VERMA P K,MARTIN V.A ComparativeEvaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System[J].Security and Communication Networks,2017,2017:1467614.
[47]PANKAJ K,SAURABH K S.An Empirical Evaluation of Various Digital Signature Scheme in Wireless Sensor Network[J].IETE Technical Review,2022,39(4):974-984.
[48]SURACI C,PIZZI S,MOLINARO A,et al.An RSA-based Algorithm for Secure D2D-aided Multicast Delivery of Multimedia Services[C]//2020 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting(BMSB).New York:IEEE Press,2020:1-6.
[49]MILANOV E.The RSA algorithm[R].US:RSA laboratories,2009.
[50]DORUS R,VINOTH P.Mitigation of jamming attacks in wireless networks[C]//2013 IEEE International Conference on Emerging Trends in Computing,Communication and Nanotech-nology.New York:IEEE Press,2013:168-171.
[51]ZHU F,WONG D S,CHAN A H,et al.Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks[J].Information Security,Proceedings.2002,2433:150-161.
[52]NAGAR S A,ALSHAMMA S.High speed implementation of RSA algorithm with modified keys exchange[C]//2012 6th International Conference on Sciences of Electronics,Technologies of Information and Telecommunications.New York:IEEE Press,2012:639-642.
[53]AMBIKA S,RAJAKUMAR S,ANAKATH A S.A novel RSAalgorithm for secured key transmission in a centralized cloud environment[J].International Journal of Communication Systems,2020,33(5):e4280.
[54]ZHU M L,LIU J W.An Intelligent Door Lock Device Based on RSA Algorithm:China,201810181838.3[P].2018-08-03.
[55]LU J C,XIONG X M.A hardware system and method of encryption and decryption based on RSA algorithm:China,CN201810877374.X[P].2018-12-18.
[1] LIU Dingcai, WU Haotian, ZHUANG Zhenwei, HE Junhui. Reversible Data Hiding Scheme in NTRU Encrypted Domain Based on Polynomial Partition [J]. Computer Science, 2023, 50(8): 294-303.
[2] LIU Yingjun, LUO Yang, YANG Yujun, LIU Yuanni. Anonymous Authentication Protocol for Medical Internet of Things [J]. Computer Science, 2023, 50(8): 359-364.
[3] HONG Xuan, YUAN Mengling. Ring Confidential Transaction Protocol Based on Multivariate Public-key Cryptosystem [J]. Computer Science, 2023, 50(6A): 220100157-6.
[4] LIN Feilong, YUE Yuedong, ZHENG Jianhui, CHEN Zhongyu, LI Minglu. Blockchain-based Identity Authentication and Authorization Mechanism [J]. Computer Science, 2023, 50(6A): 220700158-9.
[5] ZHANG Shue, TIAN Chengwei, LI Baogang. Review of Identity Authentication Research Based on Blockchain Technology [J]. Computer Science, 2023, 50(5): 329-347.
[6] GUO Nan, SONG Xiaobo, ZHUANG Luyuan, ZHAO Cong. Anonymous Batch Authentication Scheme in Internet of Vehicles for WAVE Security Services [J]. Computer Science, 2023, 50(4): 308-316.
[7] ZHAO Yang, YI Peng, ZHANG Zhen, HU Tao, LIU Shaoxun. Anomaly Detection Method of SDN Network Edge Switch [J]. Computer Science, 2023, 50(1): 362-372.
[8] JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313.
[9] CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543.
[10] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[11] SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353.
[12] CHEN Li-ping, XU Peng, WANG Dan-chen, XU Yang. Study on Formal Verification of EAP-TLS Protocol [J]. Computer Science, 2022, 49(11A): 211100111-5.
[13] CHEN Bin, XU Huan, XI Jian-fei, LEI Mei-lian, ZHANG Rui, QIN Shi-han. Power Internet of Things Device Access Management Based on Cryptographic Accumulator [J]. Computer Science, 2022, 49(11A): 210900218-6.
[14] WANG Xiang-yu, YANG Ting. Routing Directory Server Defined by Smart Contract [J]. Computer Science, 2021, 48(6A): 504-508.
[15] JIANG Hao-kun, DONG Xue-dong, ZHANG Cheng. Improved Certificateless Proxy Blind Signature Scheme with Forward Security [J]. Computer Science, 2021, 48(6A): 529-532.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!