Research trends review on RSA scheme of asymmetric cryptography techniques

One of the cryptography classifications is asymmetric cryptography, which uses two different keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of asymmetric cryptography techniques. It is trying to present the domains of RSA scheme used including in public network,...

Full description

Bibliographic Details
Main Authors: Ahmad, J.I (Author), Din, R. (Author), Mohamad, M.S.A (Author)
Format: Article
Language:English
Published: Institute of Advanced Engineering and Science 2021
Series:Bulletin of Electrical Engineering and Informatics
Subjects:
Online Access:View Fulltext in Publisher
View in Scopus
LEADER 01787nam a2200217Ia 4500
001 10.11591-eei.v10i1.2493
008 220121s2021 CNT 000 0 und d
020 |a 20893191 (ISSN) 
245 1 0 |a Research trends review on RSA scheme of asymmetric cryptography techniques 
260 0 |b Institute of Advanced Engineering and Science  |c 2021 
490 1 |a Bulletin of Electrical Engineering and Informatics 
650 0 4 |a Integer factorization 
650 0 4 |a Public key cryptography 
650 0 4 |a RSA scheme 
856 |z View Fulltext in Publisher  |u https://doi.org/10.11591/eei.v10i1.2493 
856 |z View in Scopus  |u https://www.scopus.com/inward/record.uri?eid=2-s2.0-85103069359&doi=10.11591%2feei.v10i1.2493&partnerID=40&md5=837d7095a36c6a91115e69e35975e6dc 
520 3 |a One of the cryptography classifications is asymmetric cryptography, which uses two different keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of asymmetric cryptography techniques. It is trying to present the domains of RSA scheme used including in public network, wireless sensor network, image encryption, cloud computing, proxy signature, Internet of Things and embedded device, based on the perspective of researchers’ effort in the last decade. Other than that, this paper reviewed the trends and the performance metrics of RSA scheme such as security, speed, efficiency, computational complexity and space based on the number of researches done. Finally, the technique and strengths of the proposed scheme are also stated in this paper. © 2021, Institute of Advanced Engineering and Science. All rights reserved. 
700 1 0 |a Ahmad, J.I.  |e author 
700 1 0 |a Din, R.  |e author 
700 1 0 |a Mohamad, M.S.A.  |e author 
773 |t Bulletin of Electrical Engineering and Informatics