S. Ivasiev, M. Kasyanchuk, I. Yakymenko, Oksana Gomotiuk, Inna Shylinska, Lesia Bilovus
{"title":"Algorithmic Support for Rabin Cryptosystem Implementation Based on Addition","authors":"S. Ivasiev, M. Kasyanchuk, I. Yakymenko, Oksana Gomotiuk, Inna Shylinska, Lesia Bilovus","doi":"10.1109/ACIT49673.2020.9208923","DOIUrl":null,"url":null,"abstract":"This paper deals with algorithmic support for Rabin cryptosystem implementation based on addition without performing computationally expensive arithmetic operations. Due to this, there is a reduction in time and hardware complexity of the encryption and decryption processes. The proposed approach allows us to increase the amount of input data and the size of the keys in order to improve the security of the cryptosystem not affecting its efficiency. An example of Rabin cryptosystem implementation based on addition is given.","PeriodicalId":372744,"journal":{"name":"2020 10th International Conference on Advanced Computer Information Technologies (ACIT)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 10th International Conference on Advanced Computer Information Technologies (ACIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ACIT49673.2020.9208923","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
This paper deals with algorithmic support for Rabin cryptosystem implementation based on addition without performing computationally expensive arithmetic operations. Due to this, there is a reduction in time and hardware complexity of the encryption and decryption processes. The proposed approach allows us to increase the amount of input data and the size of the keys in order to improve the security of the cryptosystem not affecting its efficiency. An example of Rabin cryptosystem implementation based on addition is given.