keyboard_arrow_up
Priority Based RSA Cryptographic Technique

Authors

Meenakshi Shankar and Akshaya.P, Sri Venkateswara College of Engineering, India

Abstract

The RSA algorithm is one of the most commonly used efficient cryptographic algorithms. It provides the required amount of confidentiality, data integrity and privacy. This paper integrates the RSA Algorithm with round-robin priority scheduling scheme in order to extend the level of security and reduce the effectiveness of intrusion. It aims at obtaining minimal overhead, increased throughput and privacy. In this method the user uses the RSA algorithm and generates the encrypted messages that are sorted priority-wise and then sent. The receiver, on receiving the messages decrypts them using the RSA algorithm according to their priority. This method reduces the risk of man-in-middle attacks and timing attacks as the encrypted and decrypted messages are further jumbled based on their priority. It also reduces the power monitoring attack risk if a very small amount of information is exchanged. It raises the bar on the standards of information security, ensuring more efficiency.

Keywords

RSA Algorithm, Cryptography, Priority Scheduling, Encryption & Decryption, Information Security.

Full Text  Volume 4, Number 10