Professional Documents
Culture Documents
10 Chapter5
10 Chapter5
10 Chapter5
CHAPTER 5
5.1 INTRODUCTION
decryption. RSA uses two keys namely the public key and the private key.
The public is known to everyone and the private key is kept secret. The
decryption may be performed only if the private key is known. the trapdoor
function is used at the source for encryption and the decryption is done by the
server where only the server knows the secret key.
EPWA(NA)
FS(rA)
fKAS(NA)
EPWB(NB)
FS(rB)
fKBS(NB)
NARS ,NBRS ,
fKAS(NARS)
fKBS(NBRS) Then
Step 6 : From the obtained hash value client A will authenticate server
and from NBRS lient A will find its key.
Step 7 : From the obtained hash value client B will authenticate server
and from NARS client B will find its key.
Table 5.1 represents the computing time required for encrypting the
random numbers ranging from 128 bits to 2048 bits using RSA-Trap door
function.
128 1031
256 4742
512 21740
1024 110007
2048 350950
126
Figure 5.1 Graphical representation of the Running time for TDF(F S(rA))
Table 5.2 represents the computing time required for encrypting the
random numbers ranging from 128 bits to 2048 bits using RSA-Trap door
function with examples.
Running
Bits Random number (rA) time in
micro sec
128 340282366901131422834808524128598884352 1031
256 1157920892373161954235709850086879078532699846656009
49958200451847912450686975 4742
512 1340780792994221602675294150306041380359877583447108
6175801850454072995051396875127234117648304748223514
823452990801027315199939961357985136637183508086783
21740
1024 1797693134862315907729305190789024733617976978942306
5351967166675538256081992211537808004666652773924636
8345540921697976343008459198562648787748140473783700
1007583010721341756849568864504549912231177539316083
110007
8340299107490680537655464187877561044547481066944734
9967392350041425897825114263607735702681137709056
127
NA=gRA(mod p)
KAS=NArA(mod p)
The value of p represent the large prime number and based on the
different prime values the value of KAS changes. The running time for the
128
64 351.4
128 523.3
256 798.1
512 1347.2
1024 2655.9
2048 4778.5
5.5.1 Security
5.5.2 Efficiency
400000
350000
300000 Proposed
Protocol
250000
Series1
Existing
200000
Protocol
Series2
150000
100000
50000
0
0 128 256 384 512 640 768 896 1024 1152 1280 1408 1536 1664 1792 1920 2048 2176
Bits
300
250
200
Existing Protocol
150
Proposed Protocol
100
50
0
P1 P2 P3 P4 P5 P6 P7 P8 P9 P10
Prime numbers
1) EPWA(NA)
2) FS(rA)
3) fKAS(NA)
From the obtained hash value client A will authenticate server and
from NBRS client A will find its key.
From the obtained hash value client B will authenticate server and
from NARS client B will find its key.