Figure 2 - uploaded by Qasem Abu Al-Haija
Content may be subject to copyright.
Proof of RSA algorithm 

Proof of RSA algorithm 

Source publication
Article
Full-text available
RSA Crypto-Algorithm is well-known and widely used public key cryptographic algorithm due to the prominent level of proven security which depends on the difficulty of large integer factorization problem. RSA is heavily based on the modular arithmetic of large integers and the whole RSA includes three parts: key generation, encryption and decryption...

Similar publications

Presentation
Full-text available
We present an algorithm for constructing (k,2)-arcs in Hall Plane and apply the algorithm (implemented in C#) to determine and classify them.
Conference Paper
Full-text available
O transporte é tido, na atualidade, como um influente fator de desenvolvimento regional, capaz de viabilizar diversas atividades socioeconômicas e atuar como agente da inclusão social. Diante disto, este artigo tem como objetivo principal propor a utilização de bases de dados do Google para aplicações e estudos diversos na área de transportes. A me...
Article
Full-text available
RESUMEN El presente artículo describe el resultado de la convergencia de tres importantes escenarios en la generación de conocimiento: la utilización de tecnología, la investigación y la vinculación con la comunidad. En el ámbito tecnológico se generó un software en lenguaje C#, que mediante una Interfaz Natural de usuario NUI reconoce coordenadas...
Article
Full-text available
This study presents the design and completion of attendance system by using GSM system and C-sharp language. A new advance technology in programmable attendance organization system comprehensive by means of computer programs has implemented. The proposal use the real time face detection included managements system with automatically detected regist...
Article
Full-text available
RESUMEN El presente artículo describe el resultado de la convergencia de tres importantes escenarios en la generación de conocimiento: la utilización de tecnología, la investigación y la vinculación con la comunidad. En el ámbito tecnológico se generó un software en lenguaje C#, que mediante una Interfaz Natural de usuario NUI reconoce coordenadas...

Citations

... In recent years, advanced synthesis and design have been achieved in the development of new telecommunication and data sharing technologies such as mobile-based applications, cloud computing, and Internet of things (IoT) [6]. This, in turn, has raised the demand to develop secure communication over insecure channels for different applications. ...
... Many types of research have been conducted to ensure data security for many shapes of shared data. For example, the software-based Rivest-Shamir-Adleman (RSA) cryptosystem which is used to encrypt and decrypt text messages prior communicating them by sender and receiver [6]. On the other hand, there is a need for portable email version along with the one offered by KFU official website which enables the user to access the KFU email by the web-based links. ...
Article
Full-text available
Nowadays, the development of innovative technology has emerged, particularly in mobile phones. People are often using smartphones daily in almost every aspect of their lives to use different applications and share various types of information quickly while moving anywhere. Mobile's email applications are classified as one of the important applications to communicate ubiquitously since the use of email is considered as the best formal way for communication inside any organization. Due to this importance of e-mail and the daily needs of using it especially for faculty members and students, we propose to develop a mobile application for KFU E-Mail system with secure data transmission. The proposed application has encryption and decryption features to ensure security. As a result, the students and faculty members can communicate via the email application in a safer and more comfortable way.
... In recent years, advanced synthesis and design have been achieved in the development of new telecommunication and data sharing technologies such as mobile-based applications, cloud computing, and Internet of things (IoT) [6]. This, in turn, has raised the demand to develop secure communication over insecure channels for different applications. ...
... Many types of research have been conducted to ensure data security for many shapes of shared data. For example, the software-based Rivest-Shamir-Adleman (RSA) cryptosystem which is used to encrypt and decrypt text messages prior communicating them by sender and receiver [6]. On the other hand, there is a need for portable email version along with the one offered by KFU official website which enables the user to access the KFU email by the web-based links. ...
Preprint
Full-text available
Nowadays, the development of innovative technology has emerged, particularly in mobile phones. People are often using smartphones daily in almost every aspect of their lives to use different applications and share various types of information quickly while moving anywhere. Mobile's email applications are classified as one of the important applications to communicate ubiquitously since the use of email is considered as the best formal way for communication inside any organization. Due to this importance of e-mail and the daily needs of using it especially for faculty members and students, we propose to develop a mobile application for KFU E-Mail system with secure data transmission. The proposed application has encryption and decryption features to ensure security. As a result, the students and faculty members can communicate via the email application in a safer and more comfortable way.