Three Novel Theorems for Applied Cryptography

Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
With advancements in computing capabilities public key cryptosystems are going to be more complex yet vulnerable over the modern day's computer networks and associated security mechanism, especially those based on novel approaches of applied mathematics. This paper explores three novel theorems derived while studying and implementing RSA algorithm, one of the strongest public key cryptosystem. The proposed theorems are best suited and adequate for RSA algorithm yet being applicable to some of other existing algorithms and theorems of applied mathematics.

Find By Topic