Review on: Providing Arithmetic Operations on RSA using Homomorphic Technique
نویسنده
چکیده
Cloud computing is the sending of computing as a service rather than a product; and shared resources, software, and message are given to computers and other devices as a utility over a network. Traditionally departments store and maintain information in their own data centres, over which they had complete control. With the emergence of cloud computing organizations can store data in the cloud provider’s data centre, but the security of the data in the cloud is a major concern. Information can be store in the cloud in an encrypted format; but the problem is that while message can be sent to and from a cloud provider's data centre in encrypted form; the servers that power a cloud can't do any work on it that way. To the Homomorphic encryption; a company could encrypt its entire database and upload it to a cloud and it is possible to analyse data without decrypting it. Thus Homomorphic encryption is a type of form of encryption which allows specific types of computations to be carried out on ciphertext and obtain an encrypted result which is the ciphertext of the result of operations performed on the plaintext. To this paper we are describing Homomorphic technique with arithmetic operation on RSA, Improving the Security level without compromising the security of existing technique Keywords— Cloud, RSA, Homomorphic, DES, AES and
منابع مشابه
A Secure Database System using Homomorphic Encryption Schemes
Cloud computing emerges as an attractive solution that can be delegated to store and process confidential data. However, several security risks are encountered with such a system as the securely encrypted data should be decrypted before processing them. Therefore, the decrypted data is susceptible to reading and alterations. As a result, processing encrypted data has been a research subject sin...
متن کاملSecure cloud computations: Description of (fully)homomorphic ciphers within the P-adic model of encryption
In this paper we consider the description of homomorphic and fully homomorphic ciphers in the p-adic model of encryption. This model describes a wide class of ciphers, but certainly not all. Homomorphic and fully homomorphic ciphers are used to ensure the credibility of remote computing, including cloud technology. The model describes all homomorphic ciphers with respect to arithmetic and coord...
متن کاملRSA Cryptography using our Designed Processor and MicroBlaze Soft Processor in FPGAs
Some applications such as RSA encryption/decryption need integer arithmetic operations with many bits. However, such operations cannot be performed directly by conventional CPUs, because their instruction supports integers with fixed bits, say, 64 bits. Since the CPUs need to repeat arithmetic operations to numbers with fixed bits, they have considerably overhead to execute applications involvi...
متن کاملRSA Cryptography using Designed Processor and MicroBlaze Soft Processor in FPGAs
Some applications such as RSA encryption/decryption need integer arithmetic operations with many bits. However, such operations cannot be performed directly by conventional CPUs, because their instruction supports integers with fixed bits, say, 64 bits. Since the CPUs need to repeat arithmetic operations to numbers with fixed bits, they have considerably overhead to execute applications involvi...
متن کاملHomomorphically Encrypted Arithmetic Operations Over the Integer Ring
Fully homomorphic encryption allows cloud servers to evaluate any computable functions for clients without revealing any information. It attracts much attention from both of the scientific community and the industry since Gentry’s seminal scheme. Currently, the BrakerskiGentry-Vaikuntanathan scheme with its optimizations is one of the most potentially practical schemes and has been implemented ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015