Subscribe to the PwC Newsletter

Join the community, edit social preview.

latest research paper on rsa algorithm

Add a new code entry for this paper

Remove a code repository from this paper, mark the official implementation from paper authors, add a new evaluation result row.

TASK DATASET MODEL METRIC NAME METRIC VALUE GLOBAL RANK REMOVE

Remove a task

Add a method, remove a method, edit datasets, demystifying the rsa algorithm: an intuitive introduction for novices in cybersecurity.

5 Aug 2023  ·  Zhengping Jay Luo , Ruowen Liu , Aarav Mehta , Md Liakat Ali · Edit social preview

Given the escalating importance of cybersecurity, it becomes increasingly beneficial for a diverse community to comprehend fundamental security mechanisms. Among these, the RSA algorithm stands out as a crucial component in public-key cryptosystems. However, understanding the RSA algorithm typically entails familiarity with number theory, modular arithmetic, and related concepts, which can often exceed the knowledge base of beginners entering the field of cybersecurity. In this study, we present an intuitively crafted, student-oriented introduction to the RSA algorithm. We assume that our readers possess only a basic background in mathematics and cybersecurity. Commencing with the three essential goals of public-key cryptosystems, we provide a step-by-step elucidation of how the RSA algorithm accomplishes these objectives. Additionally, we employ a toy example to further enhance practical understanding. Our assessment of student learning outcomes, conducted across two sections of the same course, reveals a discernible improvement in grades for the students.

Code Edit Add Remove Mark official

Datasets edit.

  • Work & Careers
  • Life & Arts

Chinese researchers claim to find way to break encryption using quantum computers

To read this article for free, register now.

Once registered, you can: • Read free articles • Get our Editor's Digest and other newsletters • Follow topics and set up personalised events • Access Alphaville: our popular markets and finance blog

Explore more offers.

Then $75 per month. Complete digital access to quality FT journalism. Cancel anytime during your trial.

FT Digital Edition

Today's FT newspaper for easy reading on any device. This does not include ft.com or FT App access.

  • Global news & analysis
  • Expert opinion

Standard Digital

Essential digital access to quality FT journalism on any device. Pay a year upfront and save 20%.

  • FT App on Android & iOS
  • FT Edit app
  • FirstFT: the day's biggest stories
  • 20+ curated newsletters
  • Follow topics & set alerts with myFT
  • FT Videos & Podcasts

Terms & Conditions apply

Explore our full range of subscriptions.

Why the ft.

See why over a million readers pay to read the Financial Times.

  • Corpus ID: 16068349

The RSA Algorithm

  • Evgeny Milanov , In , +2 authors Leonard
  • Published 2009
  • Computer Science, Mathematics

124 Citations

Distinguish from symmetric and asymmetric crypto systems. cite the strengths and shortcomings of the each system, asymmetric cryptosystems, nhskca: a new heuristic for symmetric key cryptographic algorithm, secret sharing and authentication using visual cryptography with rsa algorithm, data encryption and decryption using rsa algorithm in a network environment, fast implementation of the rivest-shamir-adleman (rsa) algorithm with robust packet data loss detection function, securing distributed database using elongated rsa algorithm, post quantum cryptography: comparison between rsa and mceliece, a public key cryptography based on the m-injectivity of $z_{pq}$ over itself, secure mailing system, 2 references, related papers.

Showing 1 through 3 of 0 Related Papers

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

  • [email protected]
  • +971 507 888 742

SciAlert

Information Technology Journal

  • Vol 12 (9), 2013

crossmark

Research Article

Analysis and research of the rsa algorithm.

Received: March 27, 2013;   Accepted: May 07, 2013;   Published: July 03, 2013

How to cite this article

Introduction.

Fig. 1: Process of RSA encryption and decryption
Fig. 2: Symmetric cipher model
Fig. 3: Symmetric cipher model
A uses RSA algorithm to generate their own public key (n, e) and the private key (n, d) and sends the information to B that contains the public key (n, d) and ID of A
B gets the session key k and uses the public key encrypt the message to A, Ke mod n
A uses his private key to decrypt the Ke mod n, then can get K. In this way, A and B can communicate with symmetric encryption algorithm and the session key K. Simple process is shown in
Fig. 4: Exchange of symmetric encryption algorithm key processes
Fig. 5: RSA algorithms in the digital signature
Fig. 6: Flow chart
Fig. 7: Result of encryption
Fig. 8: Result of decryption
Fake public-key algorithms. The user should not worry if public key leak, but need to consider someone takes another's place by counterfeiting published false public key, so it should be possible to widely publish the right key to public to prevent counterfeiting
Complexity of the key creation. Because of the RSA algorithm is limited by the prime and efficiency of generating primes is relatively low, so it is difficult to achieve a secret once ( )
Security needs to be proofed. The RSA security depends on the difficulty of factoring large numbers, but is equivalent to factoring has not been proved theoretically, because there is no proof of cracked RSA will need factorization. If there is an algorithm can fast decompose a large number, so the RSA algorithm's security would be threatened. In addition, the computational ability of the computer to continuously improve, the cost of computer to reduce, the parallel technology of the computer to develop, then attack the RSA algorithm will get huge growth ability
Slow of the speed. The RSA encryption and decryption algorithm need a lot of calculation and the speed is slowly, compared with the symmetric cryptographic algorithm thousands of times slower. With the development of large number of decomposition technique, key length would increase to ensure safety, so the computation will be greater

ACKNOWLEDGMENTS

  • Kahata, A., 2005. Cryptography and Network Security. Tsinghua University Press, Beijing, China.
  • Chen, Z., 2012. The encryption algorithm and security of RSA. J. Hengyang Normal Univ., 12: 69-69.
  • Wei, X., Z. Li and Y. Zhu, 2011. On the RSA algorithm and application. J. Honghe Univ., 4: 31-32.
  • Shi, Z., 2007. Computer Network Security Tutorial. Tsinghua University Press, Beijing, China.
  • Cai, C. and Y. Lu, 2011. Asymmetric encryption JAVA and VC. Comput. Knowled. Technol., 18: 4306-4307.
  • He, C. and H. Wu, 2004. Public key RSA algorithm is applied to several problems. Mod. Comput., 178: 72-74.
  • Buchmann, J., 2001. Einfuhrung in die Kryptographie [Introduction to Cryptography]. 2nd Edn., Springer, Berlin, Germany.
  • Wang, H. and R. Song, 2011. The length of the key influences the degree of security of the RSA system. Comput. Knowledge Technol., 10: 7104-7105.
  • Chen, C. and Z. Zhu, 2006. Application of RSA algorithm and implementation details. Comput. Eng. Sci., 9: 13-14.
  • Shi, Z., Q. Tan and H. Duan, 2008. The research and application of the RSA algorithm in the digital signature. Microcomput. Appl., 6: 50-51.
  • Zhang, Y. and T. Cao, 2011. Application of encryption based on RSA algorithm. Sci. Technol. Advisory (Technol. Admin.), 25: 79-80.
  • Zhang, S., W. Wan and J. Zhang, 2009. Applied Cryptography. Xi'an Electronic and Science University Press, Xi'an, China.
  • Si, H. and B. Tang, 2009. Application of RSA and its application in an encrypted file. Comput. Telecommun., 6: 76-77.
  • Guo, H., 2011. Efficient implementation of RSA algorithm based on C language. Mod. Comput., 8: 14-14.
  • Internet Data Center, 2011. Data encryption technology of [DB/OL]. http://zy.zhku.edu.cn/info/kcln/10/3.htm.

Leave a Comment

Your email address will not be published. Required fields are marked *

U.S. flag

An official website of the United States government

Here’s how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

https://www.nist.gov/blogs/cybersecurity-insights/implementation-challenges-privacy-preserving-federated-learning

Cybersecurity Insights

a NIST blog

Implementation Challenges in Privacy-Preserving Federated Learning

In this post, we talk with Dr. Xiaowei Huang and Dr. Yi Dong (University of Liverpool), Dr. Mat Weldon ( United K ingdom (UK) Office of National Statistics (ONS)), and Dr. Michael Fenton (Trūata) who were winners in the UK-US Privacy-Enhancing Technologies ( PETs) Prize Challenges. We discuss implementation challenges of privacy-preserving federated learning (PPFL) - specifically, the areas of threat modeling and real world deployments.

Threat Modeling

In research on privacy-preserving federated learning (PPFL), the protections of a PPFL system are usually encoded in a threat model  that defines what kinds of attackers the system can defend against. Some systems assume that attackers will eavesdrop on the system’s operation but won’t be able to affect its operation (a so-called honest but curious attacker), while others assume that attackers may modify or break the system’s operation (an active or fully malicious attacker). Weaker attackers are generally easier to defend against than stronger ones.

Unfortunately, it remains challenging to determine whether a threat model is realistic. In the real world, will attackers be honest but curious, or fully malicious? Or somewhere in between? It’s often very difficult to say with confidence—and making the wrong choice may result in deployment of a system that is not sufficiently well-defended. Moreover, it can be difficult even to compare different threat models to determine their relative strength.

Authors: What assumptions do system designers make about the capabilities of attackers when designing a threat model?

Dr. Xiaowei Huang and Dr. Yi Dong, University of Liverpool:  Depending on the assumptions, different threat models enable the attacker with different capabilities. For example, an attacker can eavesdrop on communications between agents and use the observations to figure out the secrets (e.g., reconstruct the global model). Another attacker may tamper with the labels of a local dataset to induce erroneous predictions. A local agent can also be an attacker, in the sense that they can inject backdoors into the global model or steal the global model without contribution. An attacker to the central agent can manipulate the model update to prevent the global model from converging.  

Authors: What are the challenges in defining and comparing threat models for privacy-preserving federated learning?

Dr. Xiaowei Huang and Dr. Yi Dong, University of Liverpool:  Even for a well-discussed attack such as poisoning attack, due to its distributed nature and privacy constraints, there might be different threat models (e.g., noisy, observational, or Byzantine attackers).  

To enable a rigorous study, a threat model needs to be well-articulated. However, a formal model that can describe different assumptions is still missing. This state of the art has made the comparison between methods (either learning or defense) hard.

The Theory-Reality Gap

Research on privacy-preserving federated learning often makes simplifying assumptions that are not reasonable in real-world deployments. These gaps between theory and practice remain a barrier to developing deployable PPFL systems, and most existing systems have filled these gaps with custom solutions. In addition to limiting the potential for PPFL systems to be adoptable on a wider scale, this approach also means that it’s difficult to ensure that deployed PPFL systems are reliable and free of bugs. This challenge is compounded by the need for real-world PPFL systems to integrate with existing data infrastructure—a requirement that can also lead to important security and privacy problems. Several participants in the UK-US PETs Prize Challenges highlighted issues relating to this.

Authors: What major gaps still exist between the theory and practice of privacy-preserving federated learning?

Dr. Xiaowei Huang and Dr. Yi Dong, University of Liverpool:  Current federated learning (FL) or PPFL focus on algorithmic development, by abstracting away some real-world settings on which the FL or PPFL algorithm will run. For example, it may not consider the cases where some or all local agents do not have sufficient computational powers or memory to conduct large scale training and inference, and it may not consider the open environment in which there are eavesdropper or attacker to compromise security or privacy properties of the algorithms.

Dr. Mat Weldon, UK Office for National Statistics (ONS), Data Science Campus:  The problem with the current, highly bespoke, federated learning solutions is that there are so many moving parts, and every moving part needs to be independently threat tested for each new solution. It’s easier to design a new federated learning architecture than it is to red team it.

The discipline is currently in a very fluid state – every new solution is bespoke and tailored to a particular engineering problem. This makes it difficult to achieve economies of scale. I predict that over the next few years we’ll see protocols emerge that crystallize common patterns, in the same way that cryptographic protocols emerged and crystallized web commerce.

Dr. Michael Fenton, Trūata:  In the majority of solutions that we have observed, small but critical flaws in the overall system design can lead to privacy breaches. These flaws typically arise because solution designers often seek to retrofit existing legacy solutions or systems to add privacy-preserving elements as a time and cost-saving measure. The net result is that the overall system becomes poorly optimized for privacy protection since in many cases an optimal solution may necessitate starting from scratch which can be prohibitively expensive from a development perspective.  Privacy-by-design means building privacy protections into a system on paper and in practice (i.e. both designing a system to be privacy-preserving from the ground up and testing the entire system to ensure those privacy protections are having the desired effect).

Meeting the Challenge

The challenges described in this post are associated with the early stage of development for PPFL systems—a situation that many working in this area hope will improve with time. 

As organizations begin building and deploying PPFL systems, we are learning more about processes for threat modeling. For example, it’s important to carefully articulate the most important security and privacy risks of the deployment context and ensure that the threat model includes all the attacker capabilities associated with these risks.

Growing interest in practical deployments is also driving the development of flexible software tools. Open-source software frameworks like Flower ,  PySyft ,  FATE , and  TensorFlow Federated are fast becoming more mature and capable, and collaborative efforts like the  UN PET Lab , the  National Secure Data Service , and challenges like the  UK-US PETs Prize Challenge are continuing to raise awareness about the need for these technologies.

Coming Up Next

Solutions for privacy-preserving federated learning combine distributed systems with complex privacy techniques, resulting in unique scalability challenges. In our next post, we’ll discuss these challenges and some of the emerging ideas for addressing them.

About the author

Joseph Near

Joseph Near

Joseph Near is an assistant professor of computer science at the University of Vermont who supports NIST as a moderator for the Privacy Engineering Collaboration Space. His research interests include data privacy, computer security, and programming languages. Joseph received his B.S. in computer science from Indiana University, and his M.S. and Ph.D. in computer science from MIT.

David Darais

David Darais

David Darais is a Principal Scientist at Galois, Inc. and supports NIST as a moderator for the Privacy Engineering Collaboration Space. David's research focuses on tools for achieving reliable software in critical, security-sensitive, and privacy-sensitive systems. David received his B.S. from the University of Utah, M.S. from Harvard University and Ph.D. from the University of Maryland.

Mark Durkee

Mark Durkee

Mark Durkee is Head of Data & Technology at the Centre for Data Ethics and Innovation (CDEI). He leads a portfolio of work including the CDEI's work on the Algorithmic Transparency Recording Standard, privacy enhancing technologies, and a broader programme of work focused on promoting responsible access to data. He previously led CDEI's independent review into bias in algorithmic decision-making. He has spent over a decade working in a variety of technology strategy, architecture and cyber security roles within the UK government, and previously worked as a software engineer and completed a PhD in Theoretical Physics.

Related posts

Protecting trained models in privacy-preserving federated learning, nist’s international cybersecurity and privacy engagement update – mexico city, rsa conference, and more, latest nice framework update offers improvements for the cybersecurity workforce, add new comment.

  • No HTML tags allowed.
  • Web page addresses and email addresses turn into links automatically.
  • Lines and paragraphs break automatically.

Image CAPTCHA

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

sensors-logo

Article Menu

latest research paper on rsa algorithm

  • Subscribe SciFeed
  • Recommended Articles
  • Author Biographies
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Eaia: an efficient and anonymous identity-authentication scheme in 5g-v2v.

latest research paper on rsa algorithm

1. Introduction

  • In the mutual authentication between vehicles process, the proposed protocol achieves authentication and session key negotiation without the involvement of TAs and RSUs, enabling vehicles to communicate in scenarios lacking traffic infrastructure.
  • Using temporary anonymous identities, nodes cannot resolve each other’s real identities, thereby protecting privacy. Once the authentication session is initiated, the established temporary session key is used, avoiding the burden of key management and making it difficult for attackers to obtain keys or tamper with messages.
  • Considering the limited computational resources of vehicles, the authentication protocol is designed to be lightweight and efficient while resisting various complex typical attacks.

2. Related Work

3. preliminaries, 3.1. elliptic curve cryptosystem, 3.2. mathematical problems.

  • Elliptic Curve Discrete Logarithm Problem (ECDLP) The ECDLP is the foundation of elliptic curve cryptography. Given an elliptic curve E and two points P and Q on it, if there exists an integer k such that Q = k P , then k is the discrete logarithm of Q with respect to P . Computing this k is known as solving the ECDLP. This problem is considered very difficult, especially over large prime fields, providing the security basis for elliptic curve cryptography.
  • Elliptic-Curve Diffie–Hellman (ECDH) ECDH is a key-exchange protocol based on elliptic curves. It allows two participants, who do not share any prior secret information, to agree on a shared key over an insecure communication channel. The steps are as follows: Step 1 Key Generation: each participant chooses a private key a and b and computes the corresponding public keys A = a P and B = b P , where P is a generator on the elliptic curve. Step 2 Key exchange: participants exchange their public keys. Step 3 Shared Key Computation: Each participant uses the other’s public key and their own private key to compute the shared key. The first participant computes S = a B , and the second participant computes S ′ = b A . Since S = S ′ = a b P , both participants arrive at the same shared key.

3.3. Certificate-Less Public Key Cryptography (CL-PKC)

4. system model, 4.1. system model, 4.2. attack model.

  • Eavesdropping, Interception, Modification, or Deletion of Messages: An adversary can eavesdrop on, intercept, modify, or delete publicly transmitted messages, potentially compromising the confidentiality and integrity of the communication. Passive attacks may also be used to gather sensitive information.
  • Replay Attacks: an adversary might capture and resend previously transmitted data packets to deceive other vehicles or infrastructure, leading to the propagation of duplicate or misleading information.
  • Message or credential forgery: an adversary might forge false messages or credentials to impersonate legitimate vehicles or road infrastructure, causing the dissemination of incorrect traffic information or false warning messages, thereby impacting road safety.
  • Man-in-the-middle attacks: an adversary could position themselves between communicating parties, establishing normal connections with both sides and deceiving them into exchanging data through the attacker.

5. Proposed Scheme EAIA

5.1. system initialization, 5.2. registration, 5.3. mutual authentication, 5.4. pseudoidentity update, 6. security evaluation, 6.1. security analysis.

  • Mutual authentication: For two vehicles requiring mutual authentication, O B U i encrypts its identity using O B U j ’s public key, ensuring that only O B U j can extract O B U i ’s identity. To validate the signature and verify the validity of O B U i , O B U j uses its private key to compute M ′ . Only the target vehicle O B U j can obtain the correct identity and random number A of O B U i and verify O B U i ’s identity. Therefore, O B U i can also validate the validity of O B U j .
  • Secure session key agreement: The integrity and confidentiality of the session key are ensured by the principles of ECCDH. If an adversary could forge a session key between vehicles, it would imply that the adversary could solve the computational Diffie–Hellman problem, which is known to be difficult, as discussed in Section 3.2 .
  • Anonymity and privacy protection: In the proposed protocol, real identities are anonymized by generating pseudonyms, which are then obscured by hash functions. During the authentication process, the messages { B , N , σ , T a } and { D , η , T b } do not directly transmit identities. Instead, identities are linked with random numbers, preventing the sender’s identity from being disclosed. Thus, the proposed protocol satisfies user anonymity and privacy protection requirements.
  • Resistance to man-in-the-middle attacks: During authentication, authenticated OBUs can verify the requesting OBU by generating its signature σ using the requesting vehicle’s private key x i + y i . Without this private key, the authenticated vehicle cannot extract the identity of the requesting vehicle. If an adversary attempts a man-in-the-middle attack, they must possess x i + y i to complete identity authentication and key exchange. However, x i + y i remains unknown to any adversary.
  • Resistance to impersonation attacks: To successfully impersonate a vehicle, an attacker needs to know the private key x i + y i of the requesting OBU to generate a legitimate signature σ . Since the attacker cannot obtain the private key x i + y i of the requesting vehicle, they cannot generate a valid signature, thus preventing impersonation.
  • Resistance to Replay Attacks: in the proposed protocol, timestamps T a and T b ensure that session keys cannot be reused by adversaries to disrupt the mutual authentication process.
  • Perfect forward secrecy: Forward secrecy ensures that even if participants’ long-term private keys and previous session keys are compromised, the current session key remains secure. In the proposed protocol, if the private keys x i + y i and x j + y j of two participants are leaked, adversaries still cannot access the session key without knowing the temporary keys. Assuming the current session keys are S K j − i = h 3 I D i ′ I D j d k A ′ + X i and S K i − j = h 3 I D i I D j D k a + X i , adversaries might access I D i and I D j . For d k A ′ + X i , it should be computed as d k a + x i P , where k = h 1 ( I D i | | I D j | | A | | D | | T b ) . However, adversaries do not have access to the temporary keys d or a involved in generating the session key. Therefore, our protocol meets the requirements for forward secrecy.
  • Resistance to Random Number Leakage: during the authentication process, even if the random numbers a , b , and d are leaked, adversaries cannot generate the correct session key because the secret keys of the vehicles are used as part of the session key.

6.2. Formal Proof by BAN Logic

  • Goal 1: O B U i | ≡ ( Y i , y i )
  • Goal 2: O B U i | ≡ O B U i ⟷ S K O B U j
  • Goal 3: O B U i ≡ O B U j ≡ O B U i ⟷ S K O B U j
  • Goal 4: O B U j | ≡ O B U i ⟷ S K O B U j
  • Goal 5: O B U j | ≡ O B U i | ≡ O B U i ⟷ S K O B U j
  • Message 1: O B U i → A M F : { R I D , X i }
  • Message 2: A M F → O B U i : { y i , Y i , I D , R }
  • Message 3: O B U i → O B U j : { B , N , σ , T a }
  • Message 4: O B U j → O B U i : { D , η , T b }
  • A 1 : O B U i | ≡ → p k A M F
  • A 2 : O B U i | ≡ # ( X i , Y i )
  • A 3 : O B U i | ≡ A M F ⟹ ( X i , Y i )
  • A 4 : O B U j | ≡ ⟶ X i + Y i O B U i
  • A 5 : O B U i | ≡ ⟶ X j + Y j O B U j
  • A 6 : O B U j ≡ # ( T a , O B U j ≡ # ( T b
  • A 7 : O B U i ≡ # ( T a , O B U i ≡ # ( T b
  • A 8 : O B U j | ≡ O B U i ⟹ O B U i ⟷ S K O B U j
  • A 9 : O B U i | ≡ O B U j ⟹ O B U i ⟷ S K O B U j

6.3. Formal Verification by Scyther Tool

7. performance evaluation, 7.1. computation cost, 7.2. communication cost, 7.3. energy consumption, 7.4. discussion, 8. conclusions, author contributions, institutional review board statement, informed consent statement, data availability statement, conflicts of interest.

  • Muhammad, M.; Safdar, G.A. Survey on existing authentication issues for cellular-assisted V2X communication. Veh. Commun. 2018 , 12 , 50–65. [ Google Scholar ] [ CrossRef ]
  • Chen, S.; Hu, J.; Shi, Y.; Zhao, L.; Li, W. A Vision of C-V2X: Technologies, Field Testing, and Challenges with Chinese Development. IEEE Internet Things J. 2020 , 7 , 3872–3881. [ Google Scholar ] [ CrossRef ]
  • Peter, M.N.; Rani, M.P. V2V Communication and Authentication: The Internet of Things Vehicles(Iotv). Kluw. Commun. 2021 , 120 , 231–247. [ Google Scholar ] [ CrossRef ]
  • Shang, Z.; Ma, M.; Li, X. A Secure Group-Oriented Device-to-Device Authentication Protocol for 5G Wireless Networks. IEEE Trans. Wireless Commun. 2020 , 19 , 7021–7032. [ Google Scholar ] [ CrossRef ]
  • Weerasinghe, N.; Usman, M.A.; Hewage, C.; Pfluegel, E.; Politis, C. Threshold Cryptography-Based Secure Vehicle-to-Everything (V2X) Communication in 5G-Enabled Intelligent Transportation Systems. Future Internet 2023 , 15 , 5. [ Google Scholar ] [ CrossRef ]
  • Hakeem, S.A.A.; Kim, H. Authentication and encryption protocol with revocation and reputation management for enhancing 5G-V2X security. J. King Saud Univ.-Comput. Inf. Sci. 2023 , 35 , 101638. [ Google Scholar ] [ CrossRef ]
  • Ali, I.; Hassan, A.; Li, F. Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey. Veh. Commun. 2019 , 16 , 45–61. [ Google Scholar ] [ CrossRef ]
  • Azam, F.; Yadav, S.K.; Priyadarshi, N.; Padmanaban, S.; Bansal, R.C. A Comprehensive Review of Authentication Schemes in Vehicular Ad-Hoc Network. IEEE Access 2021 , 9 , 31309–31321. [ Google Scholar ] [ CrossRef ]
  • Gu, T.; Lim, K.; Choi, G.H.; Wang, X. A Lidar Information-based Privacy-Preserving Authentication Scheme Using Elliptic Curve Cryptosystem in VANETs. In Proceedings of the 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 8–11 January 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 525–526. [ Google Scholar ] [ CrossRef ]
  • Liu, X.; Zhang, R. A Robust Authentication Scheme with Continuously Updated Information for Vehicular Sensor Networks. IEEE Access 2018 , 6 , 70473–70486. [ Google Scholar ] [ CrossRef ]
  • Liu, Y.; Wang, Y.; Chang, G. Efficient Privacy-Preserving Dual Authentication and Key Agreement Scheme for Secure V2V Communications in an IoV Paradigm. IEEE Trans. Intell. Transp. Syst. 2017 , 18 , 2740–2749. [ Google Scholar ] [ CrossRef ]
  • Xie, Q.; Ding, Z.; Zheng, P. Provably Secure and Anonymous V2I and V2V Authentication Protocol for VANETs. IEEE Trans. Intell. Transp. Syst. 2023 , 24 , 7318–7327. [ Google Scholar ] [ CrossRef ]
  • Wu, L.; Sun, Q.; Wang, X.; Wang, J.; Yu, S.; Zou, Y.; Liu, B.; Zhu, Z. An Efficient Privacy-Preserving Mutual Authentication Scheme for Secure V2V Communication in Vehicular Ad Hoc Network. IEEE Access 2019 , 7 , 55050–55063. [ Google Scholar ] [ CrossRef ]
  • Vasudev, H.; Deshpande, V.; Das, D.; Das, S.K. A Lightweight Mutual Authentication Protocol for V2V Communication in Internet of Vehicles. IEEE Trans. Veh. Technol. 2020 , 69 , 6709–6717. [ Google Scholar ] [ CrossRef ]
  • Wang, P.; Chen, C.-M.; Kumari, S.; Shojafar, M.; Tafazolli, R.; Liu, Y.-N. HDMA: Hybrid D2D Message Authentication Scheme for 5G-Enabled VANETs. IEEE Trans. Intell. Transp. Syst. 2021 , 22 , 5071–5080. [ Google Scholar ] [ CrossRef ]
  • Palaniswamy, B.; Camtepe, S.; Foo, E.; Simpson, L.; Baee, M.A.R.; Pieprzyk, J. Continuous authentication for VANET. Veh. Commun. 2020 , 25 , 100255. [ Google Scholar ] [ CrossRef ]
  • Zhou, L.; Leng, S.; Wang, Q.; Liu, Q. Integrated Sensing and Communication in UAV Swarms for Cooperative Multiple Targets Tracking. IEEE Trans. Mob. Comput. 2023 , 22 , 6526–6542. [ Google Scholar ] [ CrossRef ]
  • Zhou, L.; Leng, S.; Liu, Q.; Wang, Q. Intelligent UAV Swarm Cooperation for Multiple Targets Tracking. IEEE Internet Things J. 2022 , 9 , 743–754. [ Google Scholar ] [ CrossRef ]
  • Xie, Q.; Ding, Z.; Tang, W.; He, D.; Tan, X. Provable secure and lightweight blockchain-based V2I handover authentication and V2V broadcast protocol for VANETs. IEEE Trans. Veh. Technol. 2023 , 72 , 15200–15212. [ Google Scholar ] [ CrossRef ]
  • Li, Q. A V2V Identity Authentication and Key Agreement Scheme Based on Identity-Based Cryptograph. Future Internet 2023 , 15 , 25. [ Google Scholar ] [ CrossRef ]
  • Mun, H.; Seo, M.; Lee, D.H. Secure Privacy-Preserving V2V Communication in 5G-V2X Supporting Network Slicing. IEEE Trans. Intell. Transp. Syst. 2022 , 23 , 14439–14455. [ Google Scholar ] [ CrossRef ]
  • Lim, K.; Tuladhar, K.M. LIDAR: Lidar Information based Dynamic V2V Authentication for Roadside Infrastructure-less Vehicular Networks. In Proceedings of the 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 11–14 January 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Hakeem, S.A.A.; Kim, H. Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based on the Bilinear Pairing Cryptography for 5G-V2X. Sensors 2021 , 21 , 665. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Wang, Q.; Li, Y.; Tan, Z.; Fan, N.; Yao, G. Conditional privacy-preserving authentication scheme for V2V communication without pseudonyms. J. Inf. Secur. Appl. 2023 , 78 , 103616. [ Google Scholar ] [ CrossRef ]
  • Mohammed, B.A.; Al-Shareeda, M.A.; Manickam, S.; Al-Mekhlafi, Z.G.; Alreshidi, A.; Alazmi, M.; Alshudukhi, J.S.; Alsaffar, M. FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks. IEEE Access 2023 , 11 , 18571–18581. [ Google Scholar ] [ CrossRef ]
  • Nyangaresi, V.O.; Rodrigues, A.J.; Abeka, S.O. Efficient Group Authentication Protocol for Secure 5G Enabled Vehicular Communications. In Proceedings of the 2020 16th International Computer Engineering Conference (ICENCO), Cairo, Egypt, 29–30 December 2020; pp. 25–30. [ Google Scholar ] [ CrossRef ]
  • Vasudev, H.; Das, D. A Lightweight Authentication Protocol for V2V Communication in VANETs. In Proceedings of the 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), Guangzhou, China, 8–12 October 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1237–1242. [ Google Scholar ] [ CrossRef ]
  • Meng, L.; Xu, H.; Xiong, H.; Zhang, X.; Zhou, X.; Han, Z. An Efficient Certificateless Authenticated Key Exchange Protocol Resistant to Ephemeral Key Leakage Attack for V2V Communication in IoV. IEEE Trans. Veh. Technol. 2021 , 70 , 11736–11747. [ Google Scholar ] [ CrossRef ]
  • Cremers, C.J.F. Scyther: Semantics and Verification of Security Protocols ; Eindhoven University Technology: Eindhoven, The Netherlands, 2006. [ Google Scholar ]
  • 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Service Requirements for the 5G System; (Release 16), document TS 22.261, V16.12.0, 3GPP, July 2020. Available online: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId=3107 (accessed on 17 March 2023).
  • Klaoudatou, E.; Konstantinou, E.; Kambourakis, G.; Gritzalis, S. A survey on cluster-based group key agreement protocols for wsns. IEEE Commun. Surv. Tutor. 2011 , 13 , 429–442. [ Google Scholar ] [ CrossRef ]
  • Tan, C.H.; Teo, J.C.M. Energy-efficient idbased group key agreement protocols for wireless network. In Proceedings of the 20th IEEE International Parallel Distributed Processing Symposium, Rhodes Island, Greece, 25–29 April 2006; p. 8. [ Google Scholar ]

Click here to enlarge figure

NotionDescription
The security parameter for the system.
p, qThe large primes.
lThe length of session keys.
GThe additive group over the elliptic curve cryptography.
PThe generator of G.
sThe master key of system.
The public key of system.
The hash functions (i = 1,…,4).
a, b, dThe random number.
, The timestamps chosen in the communication.
, The real identity of .
, The pseudoidentity of .
The static private key pair of .
The static public key of .
The session keys generated in the proposed method.
NotationMeaning
XP believes the message X
P saw the message X
P said the message X
P has the message X jurisdiction
The message X is fresh
X is encrypted with key K
K is the security key between P and Q
NotationsDescriptionOBU Computation Time ( s)
Hash (SHA-256)2
Scale multiplication576
Point addition related to the ECC20
Modular exponential operation (1024 bits)249
AES-256 encryption/decryption530/7425
The computation time of an ECDSA signature generation based on the secp256k1 curve12,560
The computation time of an ECDSA signature verification based on the secp256k1 curve450
Bilinear pairing6574
SchemeAuthenticationTime (ms)
HDMA 30.311
PPMA 0.036
PPDAS 15.687
SPPC 38.541
EAIA 2.354
SchemeMessage Size (Bits)Tt ( s)Tp ( s)
HDMA169667.840.67
PPMA150460.160.67
PPDAS227290.880.67
SPPC3216128.640.67
EAIA131252.480.67
NotationsDescriptionEnergy Consumption
The energy cost of one exponential operation in G9.1 mJ
The energy cost of an ECDSA (160 bits) signature generation8.8 mJ
The energy cost of an ECDSA (160 bits) signature verification10.9 mJ
The energy cost of one pairing operation47.0 mJ
The energy cost of one scalar multiplication8.8 mJ
The energy cost for transmitting one bit0.66 J
The energy cost for receiving one bit0.31 J
SchemeTypeOperationEnergy CostTotal Energy Cost
HDMAComputational 148.6150.245
Transmission16961.645
PPMAComputational0014.588
Transmission150414.588
PPDASComputational2 64.666.804
Transmission22722.204
SPPCComputational2 55.558.620
Transmission32163.120
EAIAComputational 35.236.473
Transmission13121.273
EAIAHDMAPPMAPPDASSPPC
RSUNYYYY
Mutual authenticationYYYYY
Key agreementYYNYY
Private ProtectionYYYYY
Communication costLMLHM
Computational costLHLMH
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

Du, Q.; Zhou, J.; Ma, M. EAIA: An Efficient and Anonymous Identity-Authentication Scheme in 5G-V2V. Sensors 2024 , 24 , 5376. https://doi.org/10.3390/s24165376

Du Q, Zhou J, Ma M. EAIA: An Efficient and Anonymous Identity-Authentication Scheme in 5G-V2V. Sensors . 2024; 24(16):5376. https://doi.org/10.3390/s24165376

Du, Qianmin, Jianhong Zhou, and Maode Ma. 2024. "EAIA: An Efficient and Anonymous Identity-Authentication Scheme in 5G-V2V" Sensors 24, no. 16: 5376. https://doi.org/10.3390/s24165376

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

IMAGES

  1. (PDF) Implementation and Performance Analysis of RSA Algorithm Using

    latest research paper on rsa algorithm

  2. The RSA Algorithm

    latest research paper on rsa algorithm

  3. Example of RSA algorithm.

    latest research paper on rsa algorithm

  4. RSA Algorithm in Cryptography

    latest research paper on rsa algorithm

  5. a). The RSA encryption algorithm flowchart

    latest research paper on rsa algorithm

  6. (PDF) Detailed Study on Modified RSA Algorithm

    latest research paper on rsa algorithm

COMMENTS

  1. (PDF) The RSA Algorithm

    One of the most reliable and secure encryption algorithms av ailable today. is the RSA algorithm, which provides great encryption and performance. using asymmetric cryptography, also known as ...

  2. Comparative Analysis of Aes and Rsa Algorithms for Data Security in

    In order to provide a safe environment, the aim of this paper is to analyze the well-known symmetric algorithm of the Advanced Encryption Standard (AES) and the Rivest-Shamir-Adleman (RSA) asymmetric algorithm based on time complexity, space, resource and power consumption, and suggest a new hybrid encryption process that is a combination ...

  3. An Overview of Fast Variants of The Rsa Cryptosystem for Modern

    RSA algorithms have been the subject of numerous research studies to improve their speed over the past few decades. This research has focused on developing various optimizations and alternative algorithms to reduce the computational complexity of RSA processes while ensuring an acceptable security level. This paper surveys four RSA variants ...

  4. Systematic and Critical Review of RSA Based Public Key Cryptographic

    The interconnected digital world is generating enormous data that must be secured from unauthorized access. Advancement in technologies and new innovative methods applied by attackers play an instrumental role in breaching data security. Public key Cryptography provides a set of cryptographic algorithms in achieving data security through confidentiality, integrity and authentication. Among all ...

  5. (PDF) RSA Public Key Cryptography Algorithm

    Shireen Nisha, Mohammed Farik. Abstract: This paper aims to review RSA, examine its strengths and weaknesses, and propose novel solutions to overcome the weakness. RSA (Rivest, Shamir, and Adleman ...

  6. (PDF) A Robust Approach to Secure Data Encryption: AES-RSA Hybrid with

    In this paper we are proposing an algorithm which uses AES technique of 128/192/256 bit cipher key in encryption and decryption of data. AES provides high security as compared to other encryption ...

  7. PDF A Method for Obtaining Digital Signatures and Public-Key Cryptosystems

    We demonstrate in this paper how to build these capabilities into an electronic mail system. At the heart of our proposal is a new encryption method. This method provides an implementation of a \public-key cryptosystem," an elegant concept invented by Di e and Hellman [1]. Their article motivated our research, since they presented

  8. [2308.02785] Understanding the RSA algorithm

    The RSA algorithm is one of the essential algorithms used in public-key cryptosystems. Understanding the RSA algorithm requires knowledge regarding number theory, modular arithmetic, etc., which is often beyond the knowledge pool of many beginners in cybersecurity. In this work, we provide an intuitive and onion-peeling style introduction to ...

  9. Papers with Code

    Stay informed on the latest trending ML papers with code, research developments, libraries, methods, and datasets. ... However, understanding the RSA algorithm typically entails familiarity with number theory, modular arithmetic, and related concepts, which can often exceed the knowledge base of beginners entering the field of cybersecurity. In ...

  10. RM- RSA algorithm

    In this paper, we are going to propose a new kind of public key cryptographic system, nearly four times more efficient in data storage and operational time to that of RSA and probably one fourth of security complexity of RSA. This new crypto system is possible only based on one of the strong pseudo prime test :Rabin-Miller test.

  11. arXiv:2308.02785v2 [cs.CR] 21 Jul 2024

    by Ron ivest, Adi hamir, and LeonardAdleman at the Mas-sachusetts Institute of Technology (MIT) in 1976, the RSA algorithm stands as a pioneering implementation of the public-key cryptosystem, c. nceptualized by Difie and Hellman [3]. Operating with two keys—a private key and a public key—the RSA algo.

  12. PDF On the High Dimensional RSA Algorithm--- A Public Key Cryptosystem

    in order, obviously, this is the algorithms given by [20], we consider these algorithms are just a simply repeat of RSA. The main purpose of this paper is to show that the high dimensional form of RSA algorithm is a lattice based on cryptosystem in general. To do this, we first establish a relationship between an algebraic number field

  13. PDF Improved RSA cryptosystem based on the study of number theory and

    American Journal of Engineering Research (AJER) e-ISSN : 2320-0847 p-ISSN : 2320-0936 Volume-4, Issue-1, pp-143-149 www.ajer.org Research Paper Open Access Improved RSA cryptosystem based on the study of number

  14. PDF Cryptography: Analysing RSA & AES for Security in Modern Communication

    This paper proposes a file encryption scheme that incorporates the advantages of the two algorithms based on the contrast between the RSA algorithm and the AES algorithm in terms of encryption and decryption time, security, key management and key length. This paper completely utilises the speed advantage of the AES algorithm in the encryption ...

  15. Chinese researchers claim to find way to break encryption using quantum

    The method, outlined in a scientific paper published in late December, could be used to break the RSA algorithm that underpins most online encryption using a quantum machine with only 372 qubits ...

  16. PDF Renovated RSA Algorithm for Sending Secret Numbers using Primes and 3

    International Journal of Latest Engineering Research and Applications (IJLERA) ISSN: 2455-7137 Volume - 08, Issue - 12, December 2023, PP - 99-104 ... Page Renovated RSA Algorithm for Sending Secret Numbers using Primes and 3-Length Words Employing Gaussian Primes Janaki G* and Gowri ... This paper's basic idea is to simply rewrite the ...

  17. [PDF] The RSA Algorithm

    In public key cryptography, messages are encoded using a public key E and decoded using a private key D and it must be the case that neither the plaintext message nor the private key can be derived from knowledge of the ciphertext or the public key. In public key cryptography, messages are encoded using a public key E and decoded using a private key D. Any agent A who wants to receive secret ...

  18. Research and implementation of RSA algorithm for encryption and

    Therefore, what kind of data you choose to be a key, how to distribute the private key, and how to save both data transmission keys are very important issues in the encryption and decryption algorithm. This paper proposed an implementation of a complete and practical RSA encrypt/decrypt solution based on the study of RSA public key algorithm.

  19. (PDF) Understanding the RSA algorithm

    The paper is organized as follows: the necessary foundational information of the RSA algorithm is provided in Section 2. Then the detailed onion-peeling style introduction of the algorithm is ...

  20. PDF The RSA Algorithm

    implemented. In their 1978 RSA paper, the authors of RSA predicted a secure email world to evolve and for RSA to be used to encrypt a live telephone conversation. Now, these things are indeed a part of more than just daily life because of RSA. The encryption device must not be the direct bu er between a terminal and the communications channel.

  21. PDF The RSA Algorithm: A Mathematical History of the Ubiquitous

    The RSA algorithm, introduced in 1977 by Rivest, Shamir, and Adlemen, is an algorithm for public-key. cryptography. RSA was the first and is still the most widely-used algorithm for public key cryptography. and it is used for thousands of applications from e-mail encryption to secure online purchasing. It was.

  22. Analysis and Research of the RSA Algorithm

    Safe of RSA algorithm: The system structure of RSA algorithm is based on the number theory of the ruler. It is the most security system in the key systems. The safe of RSA algorithm bases on difficulty in the factorization of the larger numbers (Zhang and Cao, 2011). If you want to break the information, you need to decompose a large number; it ...

  23. PDF A Comparative Analysis of AES and RSA Algorithms

    In this research paper comparison between AES and RSA algorithms have been studied and summarized. Main differences between both the techniques are also mentioned. As AES is private key based algorithm that suffers from key distribution and key agreement problems however these problem isovercome in RSA algorithm but encryption and decryption ...

  24. SDY-YOLOV8n: research on improved small target detection algorithm

    A UAV recognition algorithm developed using improved YOLOV8 (SLD-YOLOV8n) is proposed in this paper, To enhance the ability of multi-scale feature extraction, the proposed algorithm utilizes the LSKA attention mechanism to improve the structure of the SPPF; replaces the conv in the backbone with the SPD Conv, which increases the number of channels to save more image feature information; To ...

  25. Implementation Challenges in Privacy-Preserving Federated Learning

    Threat Modeling. In research on privacy-preserving federated learning (PPFL), the protections of a PPFL system are usually encoded in a threat model that defines what kinds of attackers the system can defend against.Some systems assume that attackers will eavesdrop on the system's operation but won't be able to affect its operation (a so-called honest but curious attacker), while others ...

  26. Sensors

    Vehicle Ad-hoc Networks (VANETs) have experienced significant development in recent years, playing a crucial role in enhancing the driving experience by enabling safer and more efficient inter-vehicle interactions through information exchange. Vehicle-to-Vehicle (V2V) communication is particularly vital as it not only helps to prevent collisions and improve traffic efficiency but also provides ...