Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/18875
Title: IMPLEMENTATION OF RSA-KEM AND EXPLORATION OF LATEST ADVANCEMENT
Authors: MANISH KUMAR
Keywords: RAS
ENCRYPTION
DECRYPTION
RSA-KEM
QUANTUM COMPUTER
QUBITS
Issue Date: Jun-2021
Publisher: DELHI TECHNOLOGICAL UNIVERSITY
Series/Report no.: TD - 5426;
Abstract: Cryptography is used to protect information. Encryption and decryption can confirm the confidentiality, integrity of information and protect information from tampering, forgery and counterfeiting. RSA (Rivest, Shamir, Adleman) uses two keys: - private key and public key. RSA-KEM (Key Encapsulation Mechanism) is a hybrid encryption algorithm that uses RSA trapdoor permutation along with a key derivation function. RSA contains three functions:- Key generation, Encryption and Decryption. In RSA- KEM, password based key derivation function is used for key stretching. Password, salt, iteration is used for generation of derived key. Post-quantum cryptography is cryptography under the assumption that the attacker has a large quantum computer and cryptosystems aim to remain secure even in this scenario. This paper proposed an implementation of a RSA-KEM encrypt/decrypt based on the study of RSA public key algorithm and KEM. Shor’s Algorithm is used for integer factorization which is polynomial time for quantum computer. This can be threat for RSA security. In this paper matlab implementation of Shor’s algorithm is presented. This paper also discusses popular methods for making qubits like Silicon based Qubits in which electron is put inside nano material which is used as a transistor. In Superconducting circuit method insulator is used as a sandwich in between two metal layers. Used by Google, IBM, Intel, Microsoft. In Flux qubits method very small size loop of superconducting metal is used. This paper also discusses Quantum Proof Algorithm like Lattice-based cryptography used concept of good and bad base. In Learning with e errors method if we have more equation then variable, It is Over defined system. In Code based cryptography Some matrix’s allow for efficient error correction (good matrix) but most matrix’s does not (bad matrix) concept is used. In Hash based signatures scheme have long signatures or keys, but they are secure. Also discuss Multivariate Quantum proof algorithm.
URI: http://dspace.dtu.ac.in:8080/jspui/handle/repository/18875
Appears in Collections:M.E./M.Tech. Information Technology

Files in This Item:
File Description SizeFormat 
MTech Major II 2K19-ISY-10.pdf1.64 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.