Public Key Generation Principles Impact Cybersecurity
Source:
Information & Security: An International Journal,Volume: 47,
Issue2,
p.249-260
(2020)
Abstract:
Public key cryptography algorithms are based on number theory laws and principles. For every cryptography system one of the most important is-sues is the user’s key which he/she uses to encrypt the messages. That is the reason the key generation process is always fundamental for data protection and, since cryptography takes up more space in our daily lives, the public key generation principles are so important. In this article the authors discuss the Miller–Rabin primality test in its relation to the key generation process.
108
Views
386
Downloads
Doctor of Business Administration
(2024):
Bulletin of Electrical Engineering and Informatics
13,
no. 5
(2024):
3544~3551.
2023 2nd International Conference on Emerging Trends in Electrical, Control, and Telecommunication Engineering (ETECTE)
(2023):
2023 International Conference on Business Analytics for Technology and Security (ICBATS)
(2023):
Texas Journal of Engineering and Technology
(2023):
International Journal of Advanced Research in Computer and Communication Engineering
11,
no. 9
(2022):
"Cyber Protection of Critical Infrastructures, Novel Big Data and Artificial Intelligence Solutions."
Information & Security: An International Journal
47,
no. 1
(2020):
7-10.