TY - JOUR KW - Cybersecurity KW - Miller-Rabin primality test improvement KW - Public Key Cryptography AU - Nikolai Stoianov AU - Andrey Ivanov AB -
Public key cryptography algorithms are based on number theory laws and principles. For every cryptography system one of the most important is-sues is the user’s key which he/she uses to encrypt the messages. That is the reason the key generation process is always fundamental for data protection and, since cryptography takes up more space in our daily lives, the public key generation principles are so important. In this article the authors discuss the Miller–Rabin primality test in its relation to the key generation process.
BT - Information & Security: An International Journal DA - 2020 DO - https://doi.org/10.11610/isij.4717 IS - 2 LA - eng N2 -Public key cryptography algorithms are based on number theory laws and principles. For every cryptography system one of the most important is-sues is the user’s key which he/she uses to encrypt the messages. That is the reason the key generation process is always fundamental for data protection and, since cryptography takes up more space in our daily lives, the public key generation principles are so important. In this article the authors discuss the Miller–Rabin primality test in its relation to the key generation process.
PY - 2020 SE - 249 SP - 249 EP - 260 T2 - Information & Security: An International Journal TI - Public Key Generation Principles Impact Cybersecurity VL - 47 ER -