T
E
L
KO
MNIK
A
, V
ol
.
1
7
,
No.
6
,
Dec
e
mb
er
201
9
, p
p.
2
81
8
~
2825
IS
S
N: 1
69
3
-
6
93
0
,
accr
ed
ited
F
irst
Gr
ad
e b
y K
em
en
r
istekdikti,
Decr
ee
No: 2
1/E/
K
P
T
/20
18
DOI:
10.12928/TE
LK
OM
N
IK
A
.v
1
7
i
6
.
13201
◼
28
18
Rec
ei
v
ed
Ma
y
23
,
20
1
9
; R
ev
i
s
ed
J
un
e 3
0
, 2
01
9
;
A
c
c
ep
te
d
J
ul
y
1
8
, 2
01
9
Modif
i
ed RS
A
-
b
ased al
go
rit
hm
:
a do
ub
le s
ecure
app
ro
ach
Isr
a
a Al_
Bar
az
anch
i
*
1
,
S
h
ihab
A.
S
h
aw
ka
t
2
,
Moa
ye
d
H. Ham
ee
d
3
,
Kh
ali
d
S
ae
ed
Lat
ee
f
Al
-
b
a
d
r
i
4
1
Ba
g
h
d
a
d
Co
l
l
e
g
e
o
f
E
c
o
n
o
m
i
c
Sc
i
e
n
c
e
s
U
n
i
v
e
rs
i
ty
,
Ba
g
h
d
a
d
,
Ira
q
2
Dir
e
c
t
o
ra
te
o
f
Ed
u
c
a
ti
o
n
,
Sa
l
a
h
Al
-
Di
n
,
Ira
q
3
Dep
a
rt
m
e
n
t
o
f
A
c
c
o
u
n
ti
n
g
,
T
h
e
f
a
c
u
l
t
y
o
f
m
a
n
a
g
e
ri
a
l
a
n
d
f
i
n
a
n
c
i
a
l
s
c
i
e
n
c
e
s
,
Uni
v
e
r
s
i
t
y
o
f
I
m
a
m
J
a
a
f
a
r
Al
s
a
d
i
q
,
Ir
a
q
4
Dep
a
rt
m
e
n
t
o
f
Ph
y
s
i
c
s
,
Col
l
e
g
e
o
f
E
d
u
c
a
ti
o
n
,
Un
i
v
e
r
s
i
t
y
o
f
Sa
m
a
rra
,
Sa
m
a
rra
,
Ira
q
*C
o
rre
s
p
o
n
d
i
n
g
a
u
th
o
r,
e
-
m
a
i
l
:
i
s
ra
a
4
4
4
4
4
@g
m
a
i
l
.c
o
m
1
,
s
h
a
h
a
b
8
4
a
h
m
e
d
@g
m
a
i
l
.c
o
m
2
,
m
o
a
y
e
d
_
h
a
m
a
d
@y
a
h
o
o
.c
o
m
3
,
s
a
a
e
d
k
h
a
l
i
d
@g
m
a
i
l
.c
o
m
4
Ab
strac
t
Se
c
u
ri
ty
a
l
g
o
ri
th
m
s
l
i
k
e
RSA
a
re
b
e
c
o
m
i
n
g
i
n
c
r
e
a
s
i
n
g
l
y
i
m
p
o
rta
n
t
fo
r
c
o
m
m
u
n
i
c
a
t
i
o
n
s
t
o
p
ro
v
i
d
e
c
o
m
p
a
n
i
e
s
,
o
rg
a
n
i
z
a
ti
o
n
s
,
a
n
d
u
s
e
r
s
a
r
o
u
n
d
th
e
worl
d
,
s
e
c
u
r
e
a
p
p
l
i
c
a
ti
o
n
s
who
r
e
l
y
h
e
a
v
i
l
y
o
n
th
e
m
i
n
t
h
e
i
r
d
a
i
l
y
work
.
S
e
c
u
r
i
ty
a
l
g
o
r
i
th
m
s
u
s
e
d
i
ff
e
re
n
t
a
c
q
u
a
i
n
ta
n
c
e
s
a
m
o
n
g
c
o
m
p
a
n
i
e
s
whi
c
h
m
i
g
h
t
b
e
l
o
n
g
to
v
a
ri
o
u
s
c
o
u
n
tri
e
s
o
r
e
v
e
n
c
i
ti
e
s
.
S
u
c
h
d
a
ta
s
h
o
u
l
d
e
s
s
e
n
ti
a
l
l
y
b
e
e
n
c
ry
p
t
e
d
to
m
a
k
e
s
u
re
th
a
t
th
e
re
i
s
s
e
c
u
ri
t
y
i
n
tra
n
s
p
o
rta
t
i
o
n
.
Th
u
s
,
th
e
c
u
rre
n
t
re
s
e
a
r
c
h
p
a
p
e
r
l
e
a
d
s
to
th
e
n
o
v
e
l
s
y
s
te
m
o
f
s
e
c
u
ri
t
y
fo
r
th
e
s
a
fe
tr
a
n
s
f
e
r
o
f
d
a
ta
.
Th
i
s
p
a
p
e
r
e
x
a
m
i
n
e
s
t
h
e
g
e
n
e
ra
l
p
ri
n
c
i
p
l
e
s
o
f
e
n
c
r
y
p
t
i
o
n
a
n
d
fo
c
u
s
e
s
o
n
th
e
d
e
v
e
l
o
p
m
e
n
t
o
f
RSA
a
n
d
th
e
c
o
m
p
l
e
x
i
ty
o
f
t
h
e
e
n
c
ry
p
ti
o
n
k
e
y
s
o
th
a
t
i
t
b
e
c
o
m
e
s
m
o
re
s
e
c
u
re
i
n
th
e
a
p
p
l
i
c
a
t
i
o
n
s
u
s
e
d
.
In
th
i
s
p
ro
j
e
c
t,
we
wil
l
work
o
n
th
e
R
SA
a
l
g
o
r
i
th
m
b
y
a
d
d
i
n
g
s
o
m
e
c
o
m
p
l
e
x
i
t
y
to
th
e
3
k
e
y
s
(3
k
).
Th
i
s
a
d
d
i
t
i
o
n
wil
l
i
n
c
r
e
a
s
e
th
e
s
e
c
u
ri
t
y
a
n
d
c
o
m
p
l
e
x
i
t
y
o
f
th
e
a
l
g
o
r
i
th
m
'
s
s
p
e
e
d
whi
l
e
m
a
i
n
ta
i
n
i
n
g
e
n
c
r
y
p
t
i
o
n
a
n
d
d
e
c
ry
p
t
i
o
n
ti
m
e
.
Th
e
p
a
p
e
r
a
l
s
o
p
re
s
e
n
ts
a
n
a
p
p
ro
a
c
h
b
y
m
e
a
n
s
o
f
p
u
b
l
i
c
k
e
y
enc
r
y
p
ti
o
n
to
e
n
h
a
n
c
e
c
r
y
p
t
o
g
r
a
p
h
i
c
s
e
c
u
ri
ty
.
M
o
re
o
v
e
r,
d
o
u
b
l
e
s
e
c
u
ri
t
y
i
s
p
ro
v
i
d
e
d
b
y
th
e
a
l
g
o
ri
th
m
o
f
RSA
.
Th
i
s
n
o
v
e
l
RSA
a
l
g
o
ri
th
m
wa
s
i
n
v
e
s
t
i
g
a
t
e
d
i
n
M
ATL
AB.
Nu
m
e
ri
c
a
l
re
s
u
l
t
s
fo
r
th
e
v
a
r
i
o
u
s
p
a
ra
m
e
te
r
s
s
u
c
h
a
s
M
e
a
n
Sq
u
a
r
e
Erro
r
(
M
SE),
c
o
rre
l
a
t
i
o
n
a
n
d
Bi
t
Erro
r
Rat
i
o
(BER)
were
i
m
p
l
e
m
e
n
te
d
fo
r
th
e
e
n
c
ry
p
ti
o
n
o
f
th
e
m
e
s
s
a
g
e
.
Th
e
e
x
p
e
ri
m
e
n
t
a
l
r
e
s
u
l
ts
d
e
m
o
n
s
tra
te
d
t
h
a
t
t
h
e
p
r
o
p
o
s
e
d
a
l
g
o
ri
th
m
f
o
r
3
k
e
y
s
h
a
s
s
m
a
l
l
e
rro
r
ra
te
i
n
t
h
e
re
tr
i
e
v
a
l
o
f
th
e
e
n
c
o
d
e
d
t
e
x
t
Key
w
ords
:
d
e
c
ry
p
ti
o
n
,
e
n
c
r
y
p
ti
o
n
,
RSA
a
l
g
o
ri
th
m
,
RSA2
k
,
R
SA3
k
Copy
righ
t
©
2
0
1
9
Uni
v
e
rsi
t
a
s
Ahm
a
d
D
a
hl
a
n.
All
rig
ht
s
r
e
s
e
rve
d
.
1.
Int
r
o
d
u
ctio
n
S
ec
urit
y
i
n
di
g
i
ta
l
s
y
s
tem
s
de
s
c
r
i
be
s
t
he
ac
t
of
m
ai
n
ta
i
ni
ng
i
nfo
r
m
ati
on
c
on
f
i
de
nti
al
an
d
protec
ti
ng
i
t
fr
o
m
un
au
th
oriz
ed
ac
c
es
s
an
d
us
ers
.
In
s
ec
urit
y
,
c
on
fi
d
en
t
i
a
l
i
ty
al
l
u
de
s
to
the
pr
oc
es
s
of
k
ee
pi
ng
da
ta
s
a
fe
w
he
r
e
as
i
n
teg
r
i
ty
de
s
c
r
i
be
s
t
he
pr
oc
es
s
of
prev
e
nti
ng
mo
d
i
fi
c
at
i
o
n
of
the
d
ata
.
F
u
r
the
r
,
av
a
i
l
ab
i
l
i
ty
me
a
ns
th
a
t
th
e
da
ta
i
s
ac
c
es
s
i
b
l
e
by
t
he
au
t
ho
r
i
z
ed
us
ers
when
ne
ed
e
d.
T
he
s
e
three
s
ec
urit
y
go
al
s
c
an
be
ac
hi
ev
ed
v
i
a
c
r
y
pto
gr
ap
hy
.
T
he
pu
b
l
i
c
k
ey
c
r
y
pto
graphy
i
s
m
ad
e
of
a
s
et
of
ap
pr
oa
c
he
s
tha
t
are
uti
l
i
z
e
d
i
n
th
e
e
nc
r
y
pti
on
of
s
e
ns
i
ti
v
e
me
s
s
ag
e
to
m
ak
e
i
t
r
ea
d
ab
l
e
to
t
he
au
t
ho
r
i
z
e
d
pe
r
s
on
n
el
.
P
r
ov
i
di
ng
s
ec
urit
y
for
da
t
a
tr
a
ns
fer
a
nd
s
up
po
r
t
f
or
the
mo
s
t
r
e
l
i
a
bl
e
an
d
s
ec
ure
way
t
o
ha
nd
l
e
s
en
s
i
t
i
v
e
da
ta
i
n
c
on
ne
c
ti
on
i
s
o
ne
o
f
th
e
mo
s
t
c
r
i
ti
c
a
l
r
e
qu
i
r
em
en
ts
f
or
s
ec
ure
ap
p
l
i
c
at
i
o
ns
tha
t
me
et
us
er
r
eq
u
i
r
em
e
nts
,
th
e
mo
s
t
i
mp
ort
an
t
prac
ti
c
al
as
pe
c
ts
of
c
om
m
un
i
c
at
i
o
ns
an
d
ap
p
l
i
c
a
ti
o
ns
[1]
.
T
he
ha
r
m
l
es
s
c
om
m
u
ni
c
at
i
on
of
da
ta
r
em
ai
ns
an
es
s
en
t
i
a
l
p
art
o
f
l
i
fe.
T
hu
s
,
i
t
i
s
c
r
uc
i
al
to
s
hi
e
l
d
the
da
t
a
fr
o
m
a
ny
ex
p
l
oi
tat
i
on
.
Dat
a
c
an
be
tr
a
ns
forme
d
i
n
to
a
c
r
y
pto
s
y
s
tem
by
way
of
en
c
r
y
pti
on
and
de
c
r
y
pti
o
n.
T
h
e
c
on
v
ers
i
on
of
the
pl
a
i
n
tex
t
i
nt
o
th
e
e
nc
r
y
pte
d
o
ne
i
s
ter
me
d
as
e
nc
r
y
pti
on
.
O
r
the
da
ta
w
hi
c
h
ha
s
t
o
b
e
c
on
v
ers
ed
to
y
i
el
d
the
c
i
ph
e
r
tex
t
by
uti
l
i
z
i
ng
e
nc
r
y
pti
o
n
k
ey
i
s
k
no
wn
as
en
c
r
y
pte
d
da
ta.
W
h
ereas
,
the
d
ec
r
y
pti
on
k
ey
us
e
d
for
the
tr
an
s
f
ormat
i
on
of
th
e
c
i
ph
ertex
t
t
o
the
pl
ai
n
/
ori
gi
n
a
l
tex
t
i
s
ter
me
d
as
de
c
r
y
pti
o
n.
S
y
mm
etr
i
c
c
r
y
pto
graphy
r
e
pres
en
ts
t
he
s
am
en
es
s
of
en
c
r
y
pti
on
or dec
r
y
pti
o
n
k
ey
or
de
r
i
v
at
i
v
e
of
e
ac
h
ot
h
er.
S
uc
h
ty
pe
of
c
r
y
pto
s
y
s
tem
c
an
be
a
s
ub
j
ec
t
t
o
wr
ec
k
ag
e
i
f
un
au
tho
r
i
z
ed
p
ers
on
ne
l
g
ai
n
ac
c
es
s
to
the
de
c
r
y
pt
or
en
c
r
y
pt
k
ey
.
Ma
r
t
i
n
He
l
l
ma
n
and
W
hi
tf
i
e
l
d
fr
om
S
ta
nfo
r
d
U
ni
v
ers
i
ty
pr
es
en
te
d
a
me
c
ha
ni
s
m
to
es
c
al
ate
t
he
prot
ec
ti
o
n
w
i
th
t
h
e
h
el
p
of
P
u
bl
i
c
k
ey
c
r
y
pto
s
y
s
tem
[2]
.
T
hi
s
me
c
ha
n
i
s
m
us
es
a
pa
i
r
of
c
orr
el
at
ed
de
c
r
y
pti
on
a
nd
en
c
r
y
pti
on
k
ey
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KO
MNIK
A
IS
S
N: 1
69
3
-
6
93
0
◼
Mo
d
i
fi
ed
R
S
A
-
ba
s
ed
al
go
r
i
t
hm
: a
do
ub
l
e s
ec
ure
ap
pro
ac
h
(
Is
r
aa
A
l
_
B
araz
a
nc
hi
)
2819
O
ut
of
the
s
e
t
wo,
o
ne
pr
i
v
ate
k
ey
r
eta
i
ns
un
d
i
s
c
l
os
e
d,
where
as
the
p
ub
l
i
c
k
ey
ge
ts
r
ev
ea
l
ed
.
Mo
r
eo
v
er,
the
e
nc
r
y
pte
d
me
s
s
ag
e
i
s
ge
n
erate
d
thr
ou
gh
p
ub
l
i
c
k
ey
w
he
r
ea
s
de
c
r
y
pte
d
wi
t
h
the
he
l
p
of
a
priv
a
te
k
ey
,
an
d
th
i
s
protec
ts
de
c
r
y
pt
i
on
v
i
a
a
pu
b
l
i
c
k
ey
.
T
hi
s
i
s
what
m
ad
e
c
om
mu
ni
c
at
i
on
s
ec
ur
i
ty
c
o
nc
ei
v
ab
l
e.
T
h
e
b
es
t
prev
al
en
t
a
l
go
r
i
th
m
for
pu
bl
i
c
k
ey
i
s
RS
A
,
wh
i
c
h
was
na
m
ed
aft
er
au
th
ors
s
uc
h a
s
Ri
v
es
t
-
S
ha
mi
r
-
A
dl
e
ma
n.
T
he
proc
es
s
i
n
g
c
om
p
ete
n
c
i
es
,
s
ec
urit
y
me
as
ures
,
a
nd
s
ho
r
ta
ge
of
s
ec
ure
da
t
a
are
the
mo
s
t
em
p
ha
s
i
z
e
d
f
ea
t
ures
for
s
af
er
c
om
mu
ni
c
at
i
on
.
Nor
ma
l
l
y
fou
r
s
tep
s
are
r
eq
ui
r
e
d
f
or
s
ec
ure
c
om
mu
ni
c
at
i
o
n
i
nv
ol
v
i
n
g
en
c
o
di
ng
-
s
en
d
i
n
g
-
r
e
c
ei
v
i
ng
-
de
c
o
d
i
ng
.
How
ev
er,
thi
s
c
an
b
e
breac
he
d
i
nto
t
wo
p
ha
s
es
,
i
.e.
,
th
e
f
i
r
s
t
ph
as
e
i
nc
l
ud
es
the
i
nte
r
c
e
pti
on
o
f
en
c
o
de
d
da
ta
s
uc
h
as
i
ts
tr
an
s
fer
to
the
r
ec
e
i
v
er
fr
om
the
s
en
de
r
.
W
hi
l
e
the
s
ec
on
d
ph
as
e
s
i
gn
i
fi
es
the
da
t
a
de
c
od
i
ng
[1]
.
A
r
e
gu
l
ar
po
wer
of
c
o
mp
ut
at
i
on
c
an
as
s
i
s
t
i
n
r
ev
ers
e
en
g
i
n
ee
r
i
n
g
o
f
the
c
r
y
pto
graph
i
c
a
l
g
orit
h
m
af
ter
t
he
ob
s
o
l
es
c
en
c
e
of
a
s
ec
ure
s
y
s
tem
of
c
om
m
un
i
c
a
ti
o
n.
T
he
c
r
y
pto
gra
ph
i
c
a
l
go
r
i
th
mi
c
s
ec
uri
ty
i
s
s
tr
a
i
gh
tfo
r
war
dl
y
as
s
oc
i
ate
d
w
i
th
th
e
m
ath
e
ma
t
i
c
al
op
erat
i
o
ns
’
c
om
pl
ex
i
ty
,
wh
i
c
h
a
l
s
o
d
es
c
r
i
be
s
th
e
es
s
en
ti
al
s
o
f
a
n
en
di
ng
proc
e
du
r
e.
A
no
the
r
r
es
ea
r
c
h
wor
k
i
n
di
c
at
ed
a
c
om
pa
r
at
i
v
e
l
y
s
ma
l
l
l
i
fec
y
c
l
e
of
ea
c
h
c
r
y
pto
gra
ph
i
c
al
g
orit
h
m
w
i
th
ha
r
dware
-
as
s
i
s
ted
r
ev
ers
e
en
gi
n
ee
r
i
ng
wh
i
l
e
ev
o
l
v
i
ng
t
he
po
w
er
o
f
c
om
pu
t
a
ti
on
[3
].
T
h
us
,
the
r
e
l
i
ab
i
l
i
ty
of
a
s
afe
r
c
o
mm
u
ni
c
at
i
on
s
y
s
tem
d
ep
e
nd
s
up
on
t
he
r
e
l
i
ab
i
l
i
ty
of
a
c
r
y
pto
grap
hi
c
al
g
orit
h
m.
T
h
e
gro
wth
of
e
-
c
om
me
r
c
e
an
d
c
o
mp
ute
r
t
e
c
hn
ol
og
y
h
as
prov
i
d
ed
an
e
x
ten
s
i
v
e
s
pa
c
e
for
RS
A
t
ec
hn
o
l
o
gy
ap
pl
i
c
a
ti
on
.
R
S
A
s
o
ftware
i
s
s
u
i
ta
bl
e
for
a
n
i
nd
i
v
i
d
u
al
’
s
us
a
g
e
ou
t
of
l
i
brar
y
s
oft
war
e,
ha
r
dw
are,
or
pr
od
uc
t
k
erne
l
.
T
h
e
IC
tec
h
no
l
og
y
i
s
es
t
ab
l
i
s
he
d
en
o
ug
h
i
n
c
as
e
of
‘
ha
r
d
war
e’
as
i
t
i
s
be
i
n
g
us
ed
i
n
el
ec
tr
o
ni
c
de
v
i
c
es
of
al
l
ty
pe
s
.
W
h
i
l
e
i
t
i
s
mo
s
t
l
y
uti
l
i
z
ed
i
n
c
as
e
of
s
oft
w
are
for
i
nt
ernet
di
gi
t
al
c
ert
i
fi
c
a
ti
o
n,
en
c
r
y
pti
on
c
orr
ec
ti
on
,
a
nd
di
gi
t
al
c
on
n
e
c
ti
on
.
B
ut
w
i
th
an
i
nc
r
ea
s
i
ng
v
ol
um
e
o
f
i
m
prov
i
ng
th
e
ne
e
ds
o
f
pe
o
pl
e
as
w
el
l
as
d
ata
e
ac
h
y
e
ar,
RS
A
i
s
s
ub
j
ec
t
to
di
ffe
r
en
t
c
ha
l
l
e
ng
es
.
T
he
s
e
i
nc
l
ud
e
a
dv
an
c
ed
p
ers
i
s
ten
t
thr
ea
ts
(
A
P
T
s
)
,
ap
p
l
i
c
at
i
on
/da
t
a
s
ec
urit
y
,
s
erv
i
c
e
r
ej
ec
ti
o
n
att
ac
k
s
,
priv
ac
y
,
m
ob
i
l
e
,
a
nd
al
go
r
i
t
hm
s
ec
urit
y
.
Ho
wev
er,
ad
v
an
c
e
me
nts
ha
v
e
b
ee
n
proj
ec
ted
i
n
a
f
ew
y
ea
r
s
.
T
he
prob
l
em
o
f
ma
t
he
m
ati
c
a
l
fac
tori
z
at
i
o
n
i
s
be
i
ng
r
el
i
ed
up
on
i
n
t
hi
s
c
a
s
e.
It
s
ug
g
es
ts
tha
t
i
n
a
hu
ge
qu
a
nti
ty
of
nu
mb
e
r
s
,
fi
n
di
n
g
tw
o
prim
e
nu
mb
ers
wi
th
a
g
i
v
en
pr
o
du
c
t
nu
m
be
r
i
s
no
t
po
s
s
i
b
l
e.
B
ec
au
s
e
w
i
th
a
n
i
nc
r
e
as
ed
nu
mb
er,
the
fac
tori
ng
po
s
s
i
bi
l
i
ty
de
c
l
i
ne
s
,
th
us
,
r
eq
ui
r
i
ng
a
w
orthy
p
ub
l
i
c
c
r
y
pto
s
y
s
tem
k
ey
i
n
a
l
ar
ge
qu
an
ti
ty
.
T
hi
s
s
y
s
tem
ma
k
es
breac
h
i
ng
m
ore
d
i
ff
i
c
u
l
t
as
on
e
es
s
en
t
i
a
l
l
y
f
i
r
s
t
i
de
nti
fy
t
he
c
arr
i
er
tha
t
ho
l
ds
th
e
s
ec
r
et
da
ta
be
fore
tr
y
i
n
g
to
ex
tr
ac
t
a
nd
de
c
i
ph
er
i
t
[4]
.
T
h
i
s
s
tud
y
pres
en
ts
a
mo
d
i
fi
ed
RS
A
al
go
r
i
t
hm
th
at
i
s
ba
s
ed
on
a
s
et
of
u
ni
q
ue
pri
me
nu
mb
ers
w
hi
c
h
us
es
do
ub
l
e
en
c
r
y
pti
o
n
an
d
de
c
r
y
pti
o
n
proc
es
s
.
T
hi
s
propos
e
d
s
y
s
tem
s
ee
k
s
to
s
ol
v
e
th
e
s
ho
r
tc
om
i
ng
s
as
s
oc
i
ate
d
wi
th
R
S
A
a
l
g
orit
hm
wh
i
c
h
tr
a
di
t
i
o
na
l
l
y
e
m
pl
oy
s
tw
o
pri
me
nu
mb
ers
,
s
am
e
k
ey
f
or
en
c
r
y
pti
o
n
an
d
s
i
gn
i
n
g
an
d
a
s
ma
l
l
en
c
r
y
pt
i
on
ex
po
n
en
t
.
T
he
prop
os
ed
s
o
l
ut
i
on
uti
l
i
z
es
“
n”
di
s
ti
nc
t
pr
i
me
n
um
be
r
i
ns
te
ad
of
th
e
c
on
v
e
nti
on
a
l
two
pr
i
me
n
um
be
r
s
i
nc
r
e
as
i
ng
t
he
po
ol
for
th
e
s
e
l
ec
t
i
on
of
a
b
i
gg
er
en
c
r
y
pti
on
ex
po
ne
nt
l
ea
d
i
n
g
to
en
h
an
c
ed
s
ec
urit
y
.
T
h
i
s
mo
di
f
i
ed
RS
A
ha
s
an
i
nc
r
ea
s
ed
fac
tor
i
ng
d
ue
to
the
i
nc
r
e
as
ed
pri
me
nu
m
be
r
s
a
nd
t
he
bi
g
en
c
r
y
pt
i
on
ex
po
ne
nt.
T
h
e
proc
es
s
of
d
ou
b
l
e
en
c
r
y
pt
i
on
a
nd
d
ec
r
y
pti
o
n
s
i
gn
i
f
i
c
an
t
l
y
i
nc
r
ea
s
e
the
s
ec
urit
y
of
the
R
S
A
al
go
r
i
thm
.
Cr
y
pto
grap
hy
T
he
G
r
ee
k
wor
d
‘
Cr
y
pt
og
r
a
ph
y
’
me
a
ns
‘
hi
dd
e
n
s
ec
r
et
’
whi
c
h
gi
v
es
s
ec
ure
c
o
mm
u
ni
c
at
i
on
i
n
th
e
c
om
pa
ny
of
ad
v
ers
arie
s
.
Us
u
a
l
l
y
,
i
t
wor
k
s
by
ov
erpowerin
g
th
e
i
nf
l
ue
nc
e
of
ad
v
ers
arie
s
/
t
hi
r
d
pa
r
t
i
es
.
Henc
e,
fac
i
l
i
t
ati
ng
i
n
i
nv
es
ti
ga
ti
o
n
a
nd
as
s
em
b
l
ag
e
prac
ti
c
es
of
i
nfo
r
ma
t
i
on
s
ec
urit
y
d
ata
,
f
or
i
ns
tan
c
e,
d
ata
i
nte
grit
y
,
no
n
-
r
ep
ud
i
ati
on
,
a
uth
en
t
i
c
a
ti
on
,
an
d
d
ata
c
on
fi
d
en
t
i
a
l
i
ty
.
M
od
er
n
c
r
y
pto
gra
ph
y
i
n
ters
ec
ts
di
ff
erent
d
i
s
c
i
pl
i
n
es
l
i
k
e
c
om
pu
ter
s
c
i
en
c
es
,
el
ec
tr
i
c
a
l
e
ng
i
ne
erin
g,
a
n
d
ma
t
he
ma
t
i
c
s
.
F
urtherm
ore,
i
ts
ap
p
l
i
c
at
i
o
ns
c
om
pris
e
c
om
pu
ter
pa
s
s
wor
ds
,
e
l
ec
tr
on
i
c
c
om
me
r
c
e,
a
nd
A
T
M
c
ards
[
5]
.
F
ormer
mo
de
r
n
ag
e
c
r
y
pto
grap
hy
was
co
ns
i
de
r
e
d
to
b
e
eff
i
c
i
en
tl
y
i
de
nt
i
c
al
t
o
en
c
r
y
pti
on
whos
e
pri
ma
r
y
foc
us
was
c
on
v
erti
ng
t
he
r
ea
da
bl
e
i
n
forma
ti
on
i
nto
s
ee
mi
ng
bo
l
on
ey
.
T
he
hi
s
tory
i
nd
i
c
ate
d
th
at
t
he
i
ns
ti
ga
tor
of
an
en
c
r
y
pte
d
m
es
s
ag
e
s
ha
r
e
d
the
prac
t
i
c
e
of
de
c
o
di
ng
to
the
an
ti
c
i
pa
t
ed
r
ec
i
p
i
e
nts
on
l
y
.
T
hu
s
,
prev
en
ti
ng
un
de
s
i
r
a
bl
e
pe
r
s
on
s
fr
om
de
c
od
i
ng
for
ori
gi
n
al
da
t
a.
B
y
t
he
ti
me
of
W
orl
d
W
ar,
I
as
wel
l
as
the
c
om
p
ute
r
arr
i
v
al
,
op
erat
i
ng
c
r
y
pto
l
og
y
be
c
a
me
i
ntr
i
c
ate
a
nd
prev
a
l
en
t
[
6].
A
s
mo
d
ern
c
r
y
pto
l
og
y
i
s
c
en
tere
d u
po
n
c
om
pu
t
er s
c
i
en
c
e
an
d
ma
t
he
ma
ti
c
a
l
th
eo
r
i
es
.
T
he
r
efo
r
e,
c
o
mp
ut
ati
on
a
l
r
i
g
i
d
i
ty
as
s
u
mp
t
i
on
s
are
us
ed
to
d
es
i
g
n
c
r
y
pto
graph
i
c
al
g
orit
h
ms
w
hi
c
h
ma
k
e
al
g
orit
h
ms
u
nb
r
ea
k
ab
l
e
a
s
a
r
es
u
l
t
of
an
y
ad
v
er
s
ary
i
ntrus
i
on
.
T
he
oret
i
c
al
l
y
,
t
hi
s
s
y
s
tem
i
s
break
ab
l
e;
ho
wev
er,
no
t
po
s
s
i
bl
e
w
i
t
h
fa
mi
l
i
ar
prac
t
i
c
al
w
ay
s
.
S
uc
h
s
c
he
me
s
are
d
es
i
gn
ate
d
as
c
om
pu
t
ati
on
a
l
l
y
pro
t
ec
ted
.
F
as
t
c
om
pu
t
i
n
g
t
ec
hn
o
l
og
y
a
nd
Evaluation Warning : The document was created with Spire.PDF for Python.
◼
IS
S
N: 16
93
-
6
93
0
T
E
L
KO
MNIK
A
V
ol
.
1
7
,
No
.
6
,
D
ec
em
b
er
20
19
:
28
1
8
-
2825
2820
the
oret
i
c
a
l
a
dv
an
c
es
ne
e
d
pe
r
s
i
s
te
ntl
y
mo
di
f
i
e
d
s
o
l
uti
o
ns
.
T
h
eo
r
et
i
c
al
l
y
s
af
er
s
c
he
me
s
are
i
nd
es
tr
uc
ti
b
l
e
by
i
nfi
ni
te
c
o
mp
ut
i
ng
p
ower
s
uc
h
as
a
on
e
-
ti
me
pa
d.
Howev
er,
s
uc
h
s
c
he
m
es
’
i
mp
l
e
me
nt
ati
on
i
s
mo
r
e
probl
em
a
ti
c
th
an
t
ha
t
of
c
om
pu
t
ati
on
a
l
l
y
s
af
er
a
nd
th
eo
r
et
i
c
al
l
y
de
s
tr
uc
ti
b
l
e
pr
oc
ed
ures
.
T
he
s
i
tu
ati
on
of
en
c
r
y
pti
o
n
an
d
d
ec
r
y
pti
on
en
t
i
tl
ed
as
c
r
y
pto
s
y
s
tem
i
s
pres
en
te
d i
n Fi
gu
r
e
1.
F
i
g
ure
1.
A
s
y
s
tem
of
en
c
r
y
pti
o
n a
nd
d
ec
r
y
pti
o
n i
s
c
a
l
l
ed
a
c
r
y
pto
s
y
s
tem
[7]
RS
A
al
go
r
i
thm
T
he
as
s
oc
i
a
tes
of
Ma
s
s
ac
hu
s
ett
s
Ins
t
i
tut
e
o
f
T
ec
h
no
l
og
y
(
MIT)
fo
un
d
ed
pu
b
l
i
c
k
ey
as
RS
A
a
nd
the
or
i
gi
n
as
as
y
mm
etr
i
c
c
i
p
he
r
.
RS
A
ha
d
de
s
i
g
na
te
d
be
c
au
s
e
of
i
ts
r
ep
uta
t
i
o
n
an
d
broad
a
na
l
y
s
i
s
.
B
e
i
ng
c
o
m
me
r
c
i
a
l
,
an
al
go
r
i
t
hm
o
f
a
p
ub
l
i
c
k
ey
i
s
broad
l
y
prom
ot
ed
an
d
ut
i
l
i
z
ed
i
n
the
p
ers
on
a
l
an
d
b
us
i
n
es
s
c
om
m
un
i
c
a
ti
o
n
s
ec
t
or.
Rec
e
nt
ap
p
l
i
c
ati
on
s
of
RS
A
are
m
ore
be
ne
fi
c
i
al
be
c
a
us
e
of
i
ts
fl
e
x
i
bl
e
r
an
ge
of
k
ey
s
i
z
e
,
wh
i
c
h
i
s
2
to
20
48
bi
t.
A
l
g
orit
h
m’
s
s
afe
ty
r
el
i
es
up
on
th
e
c
ho
s
e
n
k
ey
s
i
z
e
by
progr
a
mm
er
or
us
er.
W
i
t
h
th
e
l
en
g
th
of
1
02
4
-
b
i
t
s
i
z
e
k
ey
i
s
us
ed
al
o
ng
wi
t
h t
h
i
s
al
g
orit
h
m.
T
ho
ug
h t
he
k
ey
s
i
z
e o
f 5
1
2 b
i
ts
i
s
s
ti
l
l
u
ti
l
i
z
ed
f
or man
y
a
pp
l
i
c
ati
on
s
[8
].
T
he
s
ec
r
et/
priv
ate
k
ey
e
nc
r
y
pti
on
fr
eq
ue
ntl
y
de
s
i
gn
at
e
d
as
a
s
y
mm
etri
c
k
ey
.
O
v
e
r
al
l
,
a
s
ol
o
k
ey
i
s
us
ed
t
o
‘
e
nc
r
y
pt’
/
‘
d
ec
r
y
pt’
the
me
s
s
a
ge
s
i
n
th
i
s
gro
up
i
ng
of
a
l
go
r
i
th
m
s
.
B
ec
a
us
e
o
f
the
k
ey
,
al
l
th
e
c
om
mu
n
i
c
at
i
on
am
o
ng
i
ntri
c
at
e
pa
r
t
i
es
wi
l
l
be
c
o
nfi
de
n
ti
a
l
.
T
o
ma
k
e
the
s
ec
uri
ty
i
de
al
,
ev
ery
c
o
mm
u
ni
c
a
tor
s
ho
ul
d
ha
v
e
a
di
s
c
r
ete
k
ey
.
T
hu
s
,
bo
th
c
orr
es
po
nd
en
ts
s
h
ou
l
d
m
ak
e
s
ure
to
pres
erv
e
the
di
s
c
r
eti
on
of
the
op
erator
k
ey
[
9].
R
S
A
al
go
r
i
t
hm
s
pres
e
nt
t
he
k
ey
ge
n
erati
on
as
an
i
ni
ti
a
l
s
te
p.
M
oreov
er,
ev
ery
c
us
tom
er
n
ee
ds
t
o
c
r
ea
te
a
pa
i
r
of
the
pu
b
l
i
c
-
pri
v
ate
k
ey
[10
].
T
he
t
op
ac
k
no
w
l
e
dg
e
d
an
d
ex
ten
s
i
v
e
l
y
us
e
d
s
c
he
m
e
of
pu
bl
i
c
k
ey
forma
ti
o
n
tr
ai
l
s
t
he
s
u
bs
eq
u
en
t
s
tep
s
. The
al
g
orit
hm
of
k
ey
ge
n
erati
on
ha
s
th
e f
o
l
l
owi
n
g p
art
i
c
ul
ars
:
a.
T
wo
great
pri
me
n
um
b
er
ar
e
c
ho
s
en
.
S
u
pp
os
e
the
y
ar
e
“
p”
an
d
“
q”.
B
o
th
p
an
d
q
are
i
n
an
y
c
as
e 5
12
bi
ts
i
n s
i
z
e
. Thus
the
s
e a
r
e
r
ep
r
es
e
nte
d
as
p!
=
q
b.
Comp
uta
t
i
o
n o
f s
y
s
tem
mo
du
l
us
i
s
do
ne
w
hi
c
h
i
s
N=
p*
q,
he
r
e
, ɸ (
N)
=
(
p
-
I)
1(q
-
1)
c.
Cal
c
u
l
ate
“
n” to f
i
n
d n
t
hrou
gh
n=
p
*
q
d.
A
m
i
n
or o
dd
i
nt
eg
er “
e”
i
s
s
el
ec
te
d w
hi
c
h
i
s
c
o
mp
arati
v
el
y
m
aj
or to
ɸ
(
N)
&
no
t
to
t
he
1.
H
ere,
1 i
s
l
es
s
th
an
ot
h
ers
l
i
k
e
1
<
e<
g<
N. th
us
, re
pres
en
t
ed
as
gc
d (e, ɸ (
N)
=
1
e.
F
urther,
“
d”
i
s
c
al
c
u
l
at
ed
t
o
be
c
o
me
the
mu
l
t
i
pl
i
c
at
i
v
e
i
nv
ers
e
of
“
e”
mo
du
l
o
“
ɸ
(
N)
”
.
at
th
i
s
ti
me
, e
.
d=
1 m
od
ɸ
(
N)
&
0
<
d<
N
f.
T
hu
s
,
the
en
c
r
y
pt
i
on
k
ey
w
hi
c
h
i
s
the
R
S
A
pu
b
l
i
c
k
ey
of
order
ed
pa
i
r
(
e,
n).
T
h
i
s
k
ey
i
s
go
i
ng
to
be
pu
bl
i
s
he
d.
g.
W
he
r
e
as
,
de
c
r
y
pti
on
k
ey
i
s
the
R
S
A
pr
i
v
ate
k
ey
wh
i
c
h
i
s
order
ed
pa
i
r
of
(
d,
n).
T
hi
s
k
ey
s
ho
ul
d
be
k
e
pt
i
n
s
ec
r
et.
h.
Not t
o
c
om
pro
mi
s
e
y
ou
r
c
r
y
pto
s
y
s
tem
’
s
s
ec
uri
ty
, a
n
ni
h
i
l
at
i
on
of
“
p”
&
“
q” m
us
t b
e
a
s
s
ured.
RS
A
E
nc
r
y
pt
i
on
T
he
pu
b
l
i
c
k
ey
of
a
r
ec
i
p
i
e
nt
(
K
U=
{
e,
N}
)
i
s
at
tai
ne
d
fi
r
s
tl
y
by
s
en
d
er
for
e
nc
r
y
pti
on
of
me
s
s
ag
e
M
t
hroug
h
R
S
A
.
T
he
e
nc
r
y
pte
d
m
es
s
ag
e
i
s
c
om
pu
t
ed
ac
c
ordi
n
g
to
(
1)
aft
er
r
ec
e
i
v
i
n
g
the
p
ub
l
i
c
k
ey
from
th
e
r
ec
i
pi
e
nt
[1
1].
C=
M
mo
d N
(
1)
where 0≤
M<
N
Henc
e,
C
r
ep
r
es
en
ts
t
he
m
es
s
ag
e
wh
i
c
h
i
s
en
c
r
y
pte
d
an
d
g
i
v
en
to
t
he
r
ec
i
pi
e
nt
t
hroug
h
a
p
ub
l
i
c
s
et
up
.
M
es
s
ag
e
M
c
an
no
t
b
e
ob
ta
i
n
ed
by
an
y
us
er
ot
he
r
t
ha
n
t
he
r
e
c
i
pi
e
nt
throu
gh
de
c
r
y
pti
o
n
of
C
.
T
he
two
p
ub
l
i
c
an
d
priv
a
te
k
ey
s
are
i
mp
orta
nt
i
n
R
S
A
en
c
r
y
pti
on
.
P
r
i
v
at
e
o
ne
i
s
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KO
MNIK
A
IS
S
N: 1
69
3
-
6
93
0
◼
Mo
d
i
fi
ed
R
S
A
-
ba
s
ed
al
go
r
i
t
hm
: a
do
ub
l
e s
ec
ure
ap
pro
ac
h
(
Is
r
aa
A
l
_
B
araz
a
nc
hi
)
2821
k
ep
t
i
n
r
es
erv
e
by
t
he
r
ec
e
i
v
er
whi
l
e
pu
bl
i
c
on
e
i
s
bro
a
dc
as
ted
pu
b
l
i
c
a
l
l
y
.
T
he
r
e
for
e,
p
ub
l
i
c
k
ey
i
s
us
ed
by
s
en
d
er
t
o
p
r
ov
i
de
en
c
r
y
pti
on
al
t
ho
u
gh
,
t
hrou
gh
priv
at
e
k
e
y
de
c
r
y
pti
o
n
i
s
prov
i
de
d
[1
2].
K
ey
s
are
l
e
s
s
i
n
nu
m
be
r
bu
t
l
es
s
eff
ec
ti
v
e
f
or
l
on
g
er
me
s
s
ag
es
.
T
h
i
s
c
on
d
i
t
i
on
i
s
r
ep
r
es
en
te
d i
n Fi
gu
r
e
2.
F
i
gu
r
e
2.
A
s
i
m
pl
e a
s
y
mm
e
tr
i
c
k
ey
c
r
y
pto
graphy
m
od
e
l
[7]
2.
Rel
ated
W
o
r
k
La
te
l
y
,
t
he
s
afe
ty
l
ev
e
l
s
of
c
om
pu
t
i
n
g
c
o
mm
u
ni
c
at
i
o
n
ap
p
l
i
c
at
i
on
s
are
d
em
o
ns
tr
a
ted
by
v
ario
us
s
ec
urit
y
m
ea
ns
.
T
hi
s
i
s
th
e
d
ev
el
o
pe
d
proc
es
s
for
the
s
us
te
n
an
c
e
of
us
ed
i
nfo
r
ma
t
i
on
/
da
t
a.
Co
mp
et
e
nt
al
g
orit
hm
of
s
ec
uri
ty
progr
es
s
i
on
pe
r
mi
ts
th
e
us
ers
to
r
ea
c
h
the
i
r
da
ta
mo
r
e
f
l
ex
i
b
l
y
.
T
h
i
s
off
ers
hu
g
e
s
torag
e
c
o
mp
et
en
c
e
at
l
es
s
c
os
ts
.
It
em
b
ol
d
en
s
the
c
us
t
om
ers
t
o
s
h
i
ft
be
t
w
ee
n
ap
pl
i
c
ati
on
s
i
n
the
i
r
o
w
n
s
torag
e
[
13
].
T
h
e
s
tu
dy
[1
4]
us
e
d
ge
n
eral
RS
A
a
l
go
r
i
th
m
w
i
th
thre
e
k
ey
s
bu
t
the
s
tud
y
s
ti
l
l
ne
ed
s
prov
e
the
s
ec
urit
y
l
ev
e
l
t
o
s
o
l
v
e
the
prob
l
e
m
i
n
up
l
o
ad
da
t
a
fr
om
s
erv
er.
T
he
a
uth
or
[1
5
]
pro
po
s
ed
Du
al
R
S
A
s
ec
ur
i
ty
fr
a
me
w
ork
bu
t
Dua
l
RS
A
c
an
’
t
be
us
ed
i
n
a
l
l
a
pp
l
i
c
at
i
on
b
ec
a
us
e
t
he
al
go
r
i
t
hm
s
of
k
ey
form
ati
on
ha
s
i
mp
r
ov
e
d i
n c
om
pl
i
c
ati
on
.
3.
Imp
lem
ent
atio
n
of
P
r
o
p
o
se
d
S
ys
t
em
T
he
us
a
ge
of
mo
r
e
t
ha
n
2
k
ey
s
by
the
s
u
gg
es
te
d
s
y
s
tem
up
s
urges
the
RS
A
al
g
orit
h
m
s
ec
urit
y
.
T
hu
s
,
ma
k
i
ng
the
al
go
r
i
t
hm
furth
er
i
ntri
c
ate
for
th
e
on
e
who
tr
y
to
a
c
c
es
s
da
ta
by
de
c
od
i
ng
.
D
i
g
i
ta
l
s
i
g
na
tur
e
s
an
d
k
ey
ex
c
ha
ng
e
bo
th
c
an
us
e
th
e
RS
A
a
l
go
r
i
thm
.
RS
A
prac
ti
c
es
c
on
v
en
ti
on
a
l
l
y
ac
c
el
erat
i
v
e
ma
th
em
a
ti
c
s
whi
l
e
us
i
ng
nu
mb
ers
wi
th
h
un
dreds
of
di
gi
ts
.
RS
A
ba
s
e
d
priv
ate
an
d
pu
bl
i
c
k
ey
i
s
c
r
ea
te
d b
y
s
ub
s
e
qu
e
nt
s
te
ps
:
a.
T
wo
of
th
e
pr
i
me
nu
mb
ers
are
c
ho
s
e
n
i
nc
l
u
di
ng
‘
p,
q”
&
r
.
Mo
d
ul
us
by
s
ub
2
c
an
b
e
c
al
c
u
l
at
ed
us
i
ng
the
s
e
nu
mb
ers
s
uc
h
as
n=
p*
q
*
2.
b.
W
h
i
l
e
be
i
ng
t
he
p
ub
l
i
c
ex
p
o
ne
nt,
t
he
3
rd
nu
mb
er
‘
e
’
wh
i
c
h
c
an
no
t
di
v
i
de
e
qu
a
l
l
y
i
s
s
el
ec
ted
.
It
s
ho
ws
pri
m
e re
l
ev
an
c
y
to
p
r
od
uc
t o
f (
p
–
1), (
q
–
1), (
r
–
1)
.
c.
T
he
i
nte
g
er “
d” i
s
a
pri
v
at
e
ex
po
ne
nt
w
hi
c
h c
a
n
b
e c
al
c
ul
ate
d f
r
o
m q
u
oti
en
t
(
−
1
)
(
−
1
)
(
−
1
)
(
−
1
)
.
d.
T
he
‘
n’
an
d
‘
e
’
are
nu
m
be
r
pa
i
r
of
pu
bl
i
c
k
ey
s
.
T
ho
u
gh
th
es
e
are
pu
b
l
i
c
a
l
l
y
ac
k
no
wl
e
dg
e
d
v
al
ue
s
b
ut
i
nc
om
pe
te
nt
f
or
the
d
ete
r
m
i
n
ati
on
o
f
“
d”
fr
om
‘
e’
an
d
‘
n
’
ev
e
n
wh
en
q
an
d
p
are
great e
no
ug
h.
e.
T
he
c
i
ph
er
tex
t
‘
C
’
i
s
pro
du
c
ed
thro
ug
h
a
pu
b
l
i
c
k
ey
for
t
he
c
r
ea
ti
on
of
en
c
r
y
pte
d
m
es
s
ag
e
‘
M’
.
F
or thi
s
p
urpos
e,
eq
ua
t
i
on
C
=
M
e
M
od
n
i
s
us
e
d.
f.
T
he
d
es
i
r
ed
c
i
p
he
r
t
ex
t
i
s
de
c
r
y
pte
d
by
r
ec
e
i
v
er
wh
i
l
e
ut
i
l
i
z
i
n
g
pr
i
v
ate
k
ey
an
d
eq
ua
t
i
on
M
=
C
d
M
od
n
.
3.1.
T
h
e
Key
s fo
r
E
n
cr
ypt
ion
S
t
ep
P
r
es
um
e
a
s
i
tua
ti
o
n
i
n
whi
c
h
a
s
e
nd
er
‘
A
’
d
es
i
r
es
to
di
r
ec
t
a
me
s
s
ag
e
t
o
the
r
ec
e
i
v
er ‘
B
’
. F
or th
i
s
, th
e s
en
d
er has
t
o f
o
l
l
ow s
om
e s
ub
s
eq
ue
nt
s
tep
s
.
a.
S
en
de
r
h
as
to
a
tta
i
n t
he
p
u
bl
i
c
k
ey
“
e
&
n”
of
th
e rec
i
pi
en
t
B
.
b.
S
i
g
ni
fy
t
he
pl
ai
n
me
s
s
ag
e b
y
th
e wa
y
of
a
po
s
i
t
i
v
e f
i
gu
r
e ‘
M
’
.
c.
Comp
uta
t
i
o
n o
f c
i
ph
er tex
t i
s
pe
r
forme
d u
s
i
ng
C
=
M
e
Mo
d
n
d.
S
en
di
ng
t
he
C c
i
ph
er tex
t t
o t
he
pe
r
s
on
B
.
F
i
gu
r
e
3 s
y
mb
o
l
i
z
es
t
he
f
l
o
w c
ha
r
t o
f
al
go
r
i
t
hm
en
c
r
y
pti
on
.
Evaluation Warning : The document was created with Spire.PDF for Python.
◼
IS
S
N: 16
93
-
6
93
0
T
E
L
KO
MNIK
A
V
ol
.
1
7
,
No
.
6
,
D
ec
em
b
er
20
19
:
28
1
8
-
2825
2822
3.2.
T
h
e
Key
s fo
r
D
ec
r
ypt
ion
S
t
ep
A
fte
r
t
he
s
e
nt
m
es
s
ag
e t
he
r
ec
i
pi
en
t
‘
B
’
w
i
l
l
tra
i
l
t
he
s
te
ps
gi
v
en
be
l
ow:
a.
P
r
i
v
ate
k
ey
d
a
nd
n
i
s
us
e
d
fo
r
th
e
c
om
p
uta
t
i
o
n M
=
C
d
Mo
d
n
b.
T
he
i
nte
g
er des
c
r
i
p
ti
v
e
M i
s
ex
tr
ac
ted
f
or pl
ai
n t
ex
t.
t
he
r
e
pres
e
nts
the
es
s
en
ti
al
l
y
m
i
n
i
mu
m
v
al
ue
of
mo
du
l
us
n
an
d
R
S
A
al
go
r
i
t
h
m
wor
k
s
for
i
t.
Dec
r
y
pti
on
proc
es
s
es
are
i
l
l
us
tr
ate
d we
l
l
i
n
Fig
ure 4.
F
i
gu
r
e
3.
A
fl
ow c
h
art i
l
l
us
tr
ati
n
g t
h
e R
S
A
de
c
r
y
pti
o
n a
l
go
r
i
thm
F
i
gu
r
e
4.
A
fl
ow C
ha
r
t t
o I
l
l
us
tr
ate
the
d
ec
r
y
pti
o
n a
l
go
r
i
thm
T
hi
s
s
tud
y
erad
i
c
ate
s
the
priv
ac
y
c
on
c
erns
of
da
t
a
v
i
a
al
go
r
i
thm
s
of
c
r
y
pto
g
r
ap
hs
.
W
h
i
l
e
b
oo
s
t
i
ng
u
p
the
a
l
go
r
i
th
m
of
s
ec
urit
y
ac
c
or
di
n
g
to
the
p
erc
ep
t
i
on
o
f
c
us
tom
ers
i
n
ap
p
l
i
c
at
i
on
s
.
T
h
i
s
wor
k
r
e
c
om
me
nd
e
d
a
m
ul
t
i
l
ev
el
s
y
s
tem
for
de
c
r
y
pti
on
an
d
en
c
r
y
pti
o
n
for
the
prov
i
s
i
on
of
m
ore
s
ec
ur
i
ty
to
s
torag
e i
nf
ormat
i
o
n.
F
or
ex
c
l
us
i
on
of
t
he
s
ec
urit
y
c
on
c
erns
fr
om
pe
r
s
on
a
l
al
go
r
i
t
hm
s
of
s
afe
s
torage
,
thre
e
v
ario
us
k
ey
s
for
s
e
c
urit
y
wer
e
proj
ec
ted
.
RS
A
h
as
be
en
us
ed
as
an
as
y
mm
e
tr
i
c
al
g
orit
h
m f
or k
ey
s
i
n t
hi
s
s
tud
y
, whi
c
h i
nv
ol
v
es
th
e u
s
a
ge
of
s
ev
eral
k
ey
s
for
the
pu
r
p
os
e
of
en
c
r
y
pti
o
n
an
d
de
c
r
y
pt
i
on
.
How
ev
er,
i
t
i
s
i
nt
en
de
d
for
th
e
m
ai
nt
en
an
c
e
of
t
ex
t
fi
l
es
s
ec
urit
y
.
O
ur
a
nt
i
c
i
pa
t
ed
s
y
s
tem
s
tr
ate
gy
e
mp
h
a
s
i
z
es
on
fo
l
l
owi
ng
ob
j
ec
ts
f
or
th
e
i
nc
r
ea
s
e
of
s
torag
e d
a
ta
s
af
ety
.
a.
T
ex
t fi
l
es
’
e
nc
r
y
pti
o
n
b.
P
l
a
i
n
tex
t d
i
s
pl
ay
to
t
he
c
o
n
s
um
er.
V
erif
i
c
at
i
on
of
s
tore
d
da
t
a
i
s
m
an
d
ato
r
y
for
t
he
es
tab
l
i
s
hm
en
t
of
we
l
l
pro
tec
ted
c
om
mu
ni
c
at
i
on
f
or
l
i
nk
e
d
an
d
c
i
r
c
ul
a
ted
p
os
s
es
s
i
on
s
.
T
he
draw
ba
c
k
wi
th
s
ec
ure
a
l
g
orit
h
m
i
s
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KO
MNIK
A
IS
S
N: 1
69
3
-
6
93
0
◼
Mo
d
i
fi
ed
R
S
A
-
ba
s
ed
al
go
r
i
t
hm
: a
do
ub
l
e s
ec
ure
ap
pro
ac
h
(
Is
r
aa
A
l
_
B
araz
a
nc
hi
)
2823
the
s
ec
urit
y
c
ha
l
l
e
ng
es
s
i
nc
e
the
da
ta
i
n
the
ap
pl
i
c
a
ti
o
ns
are
ma
n
ag
e
d
by
thi
r
d
pa
r
ty
.
S
teg
an
o
grap
hy
a
nd
c
r
y
pto
graphy
are
s
om
e
of
t
he
s
ec
urit
y
m
ea
s
ures
ap
pl
i
ed
i
n
t
he
ap
p
l
i
c
a
ti
o
ns
to
s
ec
ure
us
er
da
t
a.
W
he
r
e
i
t
was
E
nc
r
y
pti
o
n
b
e
c
om
bi
n
ed
w
i
th
a
s
ec
ure
al
go
r
i
t
hm
t
o
i
nc
r
ea
s
e
s
ec
urit
y
an
d
da
ta
be
s
e
nt
t
o
the
s
of
tware
aft
er
en
c
r
y
pti
on
t
o
i
nc
r
ea
s
e
s
ec
urit
y
a
n
d
thi
s
r
es
e
arc
h
pa
pe
r
,
us
es
c
r
y
pto
graph
i
c
al
g
orit
h
m
to
e
l
i
mi
na
t
e
the
priv
ac
y
c
on
c
erns
of
da
t
a.
T
hi
s
i
m
prov
es
c
om
mu
ni
c
at
i
on
s
ec
urit
y
ac
c
ordi
ng
to
t
he
di
ff
erent
po
i
n
t o
f v
i
ew o
f
s
oft
war
e
c
l
i
en
ts
.
4.
E
xper
i
men
t
al
S
ett
ing
MA
T
L
A
B
v
ers
i
on
R2
01
6
a
s
oft
war
e
s
u
i
te
was
us
e
d
f
or
i
ns
t
i
ga
t
i
o
n
of
th
es
e
m
et
ho
ds
.
T
he
s
oft
war
e
w
as
r
un
on
a
priv
ate
c
om
pu
t
er
wi
th
an
o
pe
r
ati
ng
s
y
s
tem
h
av
i
ng
2.2
7
G
Hz
Int
el
(
R)
Cor
e (T
M) i
5 C
P
U w
i
th
W
i
n
do
ws
10
an
d 4
G
B
RA
M.
4.1
.
E
va
luat
ion
P
ar
a
met
er
s
Nume
r
i
c
al
pa
r
a
me
ters
t
ha
t
ev
al
u
ate
d
th
e
pr
op
os
e
d
s
y
s
tem
’
s
qu
al
i
ty
for
the
en
c
r
y
pti
on
me
s
s
ag
e
wer
e f
ou
r
i
n n
um
be
r
. The
de
s
c
r
i
pt
i
o
n o
f
the
s
e p
ara
me
t
ers
i
s
s
pe
c
i
f
i
ed
b
el
ow
[1
6
-
19].
4.1
.1
.
Me
an
S
q
u
ar
e
E
r
r
o
r
(
MS
E
)
A
mo
ng
the
e
nc
r
y
pte
d
t
ex
t
a
nd
t
he
orig
i
n
al
da
t
a,
the
av
e
r
ag
e
err
or
ma
gn
i
tud
e
i
s
es
t
i
ma
te
d
by
M
S
E
.
A
s
qu
are
i
s
t
ak
e
n
of
th
e
pe
r
c
ei
v
e
d
v
a
l
u
es
am
on
gs
t
t
ex
t
a
nd
ori
gi
na
l
en
c
r
y
pti
o
n
f
or
the
c
al
c
u
l
at
i
on
of
an
av
er
a
ge
[20
].
In
c
as
e
of
th
e
ex
i
s
t
en
c
e
of
h
ug
e
err
or,
R
MS
E
i
s
us
ed
,
wh
i
c
h
c
an
furth
er
prov
i
de
hi
g
h
r
el
ev
a
nc
y
wei
gh
t
t
o
th
e
err
ors
.
Howev
er,
f
or
th
e
c
al
c
ul
at
i
o
n
of
M
S
E
eq
ua
ti
o
n i
s
us
ed
as
f
ol
l
ows
:
(
2)
4.1
.2
.
Bit
E
r
r
o
r
Ra
t
io (
B
E
R)
T
he
am
ou
nt
of
the
r
ec
e
i
v
e
d
err
or
bi
ts
,
wh
en
d
i
v
i
de
d
wi
th
a
t
ota
l
tr
an
s
ferr
e
d
bi
t
,
i
s
c
al
l
ed
bi
t
err
or
r
ati
o.
T
he
es
ti
m
ati
on
o
f
B
E
R
i
s
do
n
e
w
i
th
the
he
l
p
of
i
nc
orr
ec
tl
y
ga
i
ne
d
bi
t
(
b
ec
au
s
e
of
no
i
s
e) pr
ob
a
bi
l
i
ty
c
a
l
c
ul
ati
o
n [
21
]. B
ei
ng
a
me
ek
c
on
c
e
pti
o
n,
B
E
R
c
an
b
e d
ete
r
m
i
n
ed
fro
m
(
3)
.
B
E
R
=
E
r
r
ors
/Tota
l
Nu
mb
er
of
B
i
ts
(
3)
4.1.3
.
Co
r
r
ela
t
ion
T
he
two
s
i
gn
a
l
s
be
c
o
m
e
al
i
k
e
whe
n
c
orr
el
a
ti
o
n
s
tr
etc
he
s
to
th
e
ma
x
i
mu
m
.
T
he
mu
l
t
i
pl
i
c
at
i
on
of
th
e
s
i
gn
a
l
’
s
i
ntri
c
at
e
c
on
j
ug
ate
r
el
at
ed
t
o
s
pe
c
tr
um
fr
eq
u
e
nc
y
wi
th
o
the
r
s
pe
c
tr
um
r
ate
s
de
f
i
n
es
to
b
e
c
orr
es
po
nd
i
ng
t
he
c
orr
el
a
ti
on
[
22
-
2
5
].
Mo
r
e
,
the
c
l
os
el
y
r
el
at
ed
d
ata
s
ets
of
v
ec
tors
/
two
s
i
g
na
l
s
are
de
t
ermi
ne
d
for
th
ei
r
r
el
at
ed
n
es
s
or
di
s
s
i
mi
l
arit
i
e
s
i
n
th
ei
r
s
tag
e
an
d
s
i
z
e.
T
he
r
an
ge
o
f
l
i
ne
a
r
c
oe
ffi
c
i
e
nt
of
c
orr
e
l
at
i
o
n
(
r
)
am
i
d 1
an
d
-
1
c
an
b
e
es
ti
ma
te
d
wi
t
h
th
e
he
l
p o
f (4)
.
Cor
r
el
ati
on
(
4)
4.2
.
E
xpe
r
imen
t
a
l Re
sult
s
T
ab
l
e
1
r
ep
r
es
en
ts
the
r
es
ul
ts
att
ai
n
ed
fr
o
m
the
ex
ec
uti
o
n
of
a
nti
c
i
pa
t
ed
R
S
A
(
2
k
,
3k
)
al
g
orit
h
m
proc
e
ed
i
ng
t
es
t
p
r
ofa
ni
ng
f
or
v
ario
us
s
i
z
es
of
tex
t.
F
urth
er
ob
s
erv
at
i
on
s
ho
we
d
th
e
z
ero
v
al
ue
for
c
orr
el
at
i
o
n
a
nd
B
E
R,
wh
ereas
,
on
e
f
or
a
l
l
s
i
z
e
s
of
t
ex
t.
T
h
us
,
i
t
d
es
i
gn
at
e
d
th
e
z
ero
-
err
or
r
ec
ei
v
ed
by
bi
ts
nu
m
be
r
.
I
t
i
s
ev
i
de
nt
th
at
the
prop
os
ed
al
go
r
i
thm
w
i
th
3k
ey
s
ha
s
a
v
ery
s
ma
l
l
err
or
r
ate
i
n
the
r
etri
ev
al
of
en
c
o
de
d
tex
t. A
c
l
e
ar di
f
ferenc
e
i
s
th
e v
aria
t
i
on
fr
om
th
e s
tan
da
r
d 2
k
ey
al
go
r
i
thm
,
bu
t
t
he
r
e
i
s
on
e
n
eg
at
i
v
e,
t
he
t
i
m
e
o
f
e
nc
r
y
pti
o
n,
w
hi
c
h
i
s
a
s
m
al
l
di
ff
erenc
e
c
om
pa
r
ed
to
the
f
i
r
s
t
al
g
orit
h
m,
a
nd
t
hi
s
i
s
c
al
c
ul
ate
d
t
o
th
e
prop
os
ed
me
th
od
as
ha
v
i
ng
a
s
tr
on
g
ad
v
a
nta
g
e
an
d
ha
s
an
ex
c
el
l
en
t
eff
ec
t
i
n
the
r
ate
of
err
or
a
nd
the
t
i
mi
ng
of
e
nc
r
y
pti
o
n.
A
n
d
t
ha
t
Cr
y
pto
gra
ph
y
i
s
a
Evaluation Warning : The document was created with Spire.PDF for Python.
◼
IS
S
N: 16
93
-
6
93
0
T
E
L
KO
MNIK
A
V
ol
.
1
7
,
No
.
6
,
D
ec
em
b
er
20
19
:
28
1
8
-
2825
2824
go
od
way
to
i
nc
r
ea
s
e
t
he
d
ata
s
ec
urit
y
.
R
S
A
2k
ey
i
s
b
ett
er
th
an
R
S
A
3k
ey
be
c
a
u
s
e
ti
me
tak
en
for enc
r
y
pti
ng
a
nd
de
c
r
y
pt
i
ng
d
ata
us
i
ng
RS
A
2k
ey
i
s
mu
c
h s
ma
l
l
er th
an
R
S
A
3k
ey
.
T
ab
l
e
1.
R
es
ul
ts
from I
mp
l
e
me
nt
i
ng
th
e
P
r
o
po
s
ed
RS
A
A
l
go
r
i
t
hm
(
2
k
,
3k
)
N
o
.
A
lgo
r
it
h
m
I
n
p
u
t
t
e
x
t
s
i
z
e
(
in
b
y
t
e
)
MS
E
BER
C
o
r
r
e
lat
ion
E
x
e
c
u
t
ion
in
Tim
e
(
i
n
S
e
c
)
1
R
S
A
2
k
10
0
.
0
6
2
7
0
1
0
.
0
4
0
6
3
7
R
S
A
3
k
0
.
0
6
0
8
0
1
0
.
0
5
1
2
0
7
2
R
S
A
2
k
20
0
.
0
5
7
1
0
1
0
.
0
2
6
4
5
9
R
S
A
3
k
0
.
0
5
0
0
0
1
0
.
0
4
1
9
9
7
3
R
S
A
2
k
30
0
.
0
5
1
8
0
1
0
.
0
3
0
5
5
4
R
S
A
3
k
0
.
0
4
9
8
0
1
0
.
0
3
5
1
6
3
4
R
S
A
2
k
40
0
.
0
4
6
8
0
1
0
.
0
3
2
9
6
3
R
S
A
3
k
0
.
0
4
5
2
0
1
0
.
0
3
6
7
0
4
5
R
S
A
2
k
50
0
.
0
4
2
2
0
1
0
.
0
3
3
9
6
4
R
S
A
3
k
0
.
0
4
0
8
0
1
0
.
0
3
5
1
9
2
6
R
S
A
2
k
60
0
.
0
3
9
1
0
1
0
.
0
3
0
6
3
6
R
S
A
3
k
0
.
0
3
6
3
0
1
0
.
0
3
3
9
5
8
7
R
S
A
2
k
70
0
.
0
3
4
9
0
1
0
.
0
2
8
0
1
0
R
S
A
3
k
0
.
0
3
2
2
0
1
0
.
0
3
0
5
4
4
8
R
S
A
2
k
80
0
.
0
2
9
5
0
1
0
.
0
2
7
0
9
7
R
S
A
3
k
0
.
0
2
8
2
0
1
0
.
0
2
9
1
2
5
9
R
S
A
2
k
90
0
.
0
2
5
8
0
1
0
.
0
2
7
1
2
8
R
S
A
3
k
0
.
0
2
4
7
0
1
0
.
0
2
8
1
9
1
10
R
S
A
2
k
100
0
.
0
2
3
6
0
1
0
.
0
3
4
3
1
5
R
S
A
3
k
0
.
0
2
1
3
0
1
0
.
0
3
5
6
3
8
5.
Co
n
clus
ion
s
G
en
eral
l
y
,
t
he
c
urr
en
t
proj
ec
t
ac
h
i
ev
ed
a
s
i
gn
i
fi
c
a
nt
mi
l
es
ton
e
be
c
au
s
e
the
i
mp
l
em
en
ta
ti
o
n
of
th
e
p
r
og
r
am
s
me
t
a
l
l
the
o
bj
ec
ti
v
es
s
et
at
the
s
tart.
A
s
we
l
l
a
s
al
l
tes
t
r
un
s
ha
v
e
prov
ed
t
he
r
ob
us
tne
s
s
of
the
ne
w
ap
pr
oa
c
h.
T
h
e
c
r
ea
ti
on
of
the
l
o
ng
er
k
ey
s
woul
d
prov
i
d
e
a
s
ec
urit
y
for
s
om
e
y
ea
r
s
s
uc
h
as
fac
tor
i
ng
the
m
i
s
no
t
f
ea
s
i
b
l
e
.
A
tes
t
w
as
be
i
ng
r
un
f
or
th
i
s
s
c
he
me
on
di
s
s
i
mi
l
ar i
np
ut
tex
t
ty
pe
s
wi
t
h
a
l
ter
ed
RS
A
k
ey
s
an
d
t
ex
t
s
i
z
es
.
T
he
n,
al
l
th
e
t
i
m
e,
an
up
r
i
g
ht
qu
al
i
ty
s
ec
r
et
tex
t
was
r
ec
ov
ered
s
uc
c
es
s
ful
l
y
.
T
he
c
om
p
aris
on
o
f
a
tr
ad
i
ti
on
a
l
RS
A
an
d
three
k
ey
s
R
S
A
s
h
owe
d
th
e
r
el
ati
v
e
l
y
h
i
gh
s
ec
urit
y
a
nd
a
l
tera
ti
o
ns
i
n
e
qu
at
i
o
n
f
ormat
i
on
for
3k
RS
A
a
l
g
orit
h
m.
A
l
l
t
he
c
as
e
ob
s
erv
ati
on
s
c
on
c
l
u
de
d
t
ha
t
an
y
i
mp
os
t
er
mi
g
ht
ge
t
s
uc
c
es
s
ful
to
ac
qu
i
r
e
en
c
r
y
pte
d
s
h
ares
of
th
e
ne
tw
ork
s
.
B
ut
th
at
p
ers
on
wo
n’
t
b
e
a
bl
e
t
o
r
ec
ov
er
s
ec
r
et
tex
t
whi
l
e
l
ac
k
i
ng
a
pr
i
v
ate
k
ey
ac
c
es
s
i
bi
l
i
ty
.
O
ur
forthc
o
mi
n
g
pl
an
i
nc
l
u
de
s
m
ore
i
mp
r
ov
em
e
nt
i
n
c
on
te
mp
or
ary
de
s
i
gn
,
pri
ma
r
i
l
y
.
Its
ex
ec
ut
i
o
n
on
a
bi
gg
er
s
c
al
e
wi
l
l
s
i
mu
l
ate
th
e
mu
l
ti
pl
e
c
ov
ers
a
nd
no
r
ma
l
c
o
l
l
ab
orati
v
e
pa
r
t
i
es
.
W
e
wi
l
l
i
ntrod
uc
e
a
s
e
qu
e
nc
e
of
l
i
s
te
ne
r
s
i
n
the
m
i
d
dl
e
of
s
en
de
r
an
d
r
ec
e
i
v
er
c
om
m
un
i
c
ati
on
pa
th
w
hi
c
h
w
i
l
l
a
l
s
o
i
nc
l
u
d
e
mo
s
t
of
the
s
et
of
art
s
t
ag
an
al
y
s
i
s
fi
l
ters
.
W
e
w
i
l
l
further
a
na
l
y
z
e
the
s
y
s
tem
for
i
ts
pl
ac
em
e
nt
m
ai
nte
na
nc
e
o
n
a
b
i
g
ge
r
s
c
al
e
wi
t
h
att
ac
k
i
n
g
pa
r
ti
es
an
d
hi
g
h
er
ma
gn
i
tu
de
s
s
afe
r
d
ata
.
F
o
l
l
owi
n
g
al
l
th
e
fi
gu
r
es
ba
s
e
d
on
the
pr
ev
i
ou
s
i
mp
l
e
me
nt
ati
o
n,
ou
r
p
l
ot
i
s
to
c
ate
g
oriz
e
u
l
t
i
ma
t
e
l
i
a
bi
l
i
t
i
es
an
d
r
em
ov
e
t
he
m.
T
he
ge
ne
r
at
ed
k
ey
s
ma
y
pe
r
ha
ps
be
us
e
d
by
op
en
pretty
go
o
d
pr
i
v
a
c
y
(
P
G
P
)
for
the
en
c
r
y
pt
i
o
n
an
d
de
c
r
y
pti
o
n
al
g
orit
hm
s
’
ex
ec
ut
i
on
s
.
F
urther,
i
t
ma
y
be
us
e
d
to
em
p
ha
s
i
z
e
A
d
d
4
prim
ary
k
ey
of
the
al
go
r
i
thm
.
A
dd
i
ti
on
al
l
y
,
i
t
c
an
ad
v
an
c
e
t
he
bi
t
en
c
r
y
pti
on
s
tan
da
r
d
(
12
8
bi
t
or
25
6
bi
t)
or
bl
oc
k
s
i
z
e
w
i
th
an
i
nf
l
ue
nti
a
l
e
nc
r
y
pti
o
n
RS
A
an
d DE
S
t
ec
hn
i
qu
es
.
Ref
er
en
ce
s
[1
]
Ab
d
u
l
s
h
a
h
e
e
d
HR
,
Bi
n
ti
SA,
Sa
d
i
q
II
.
A
Re
v
i
e
w
o
n
S
m
a
rt
So
l
u
ti
o
n
s
b
a
s
e
d
o
n
Clo
u
d
C
o
m
p
u
t
i
n
g
a
n
d
Wi
re
l
e
s
s
Se
n
s
i
n
g
.
In
te
rn
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
P
u
re
a
n
d
Ap
p
l
i
e
d
M
a
th
e
m
a
ti
c
s
.
2
0
1
8
;
1
1
9
(
1
8
):
4
6
1
–
4
8
6
.
[2
]
Dey
H,
Is
l
a
m
R,
Ar
i
f
H.
An
I
n
t
e
g
ra
te
d
M
o
d
e
l
t
o
M
a
k
e
C
l
o
u
d
Au
th
e
n
t
i
c
a
ti
o
n
and
M
u
l
ti
-
T
e
n
a
n
c
y
M
o
r
e
Se
c
u
re
.
In
2
0
1
9
I
n
te
rn
a
ti
o
n
a
l
Con
fe
re
n
c
e
o
n
Rob
o
t
i
c
s
,
E
l
e
c
tri
c
a
l
a
n
d
S
i
g
n
a
l
Pro
c
e
s
s
i
n
g
T
e
c
h
n
i
q
u
e
s
(ICREST).
2
0
1
9
:
5
0
2
-
5
0
6
.
[3
]
G
a
u
ta
m
P,
An
s
a
ri
M
D,
Sh
a
rm
a
SK.
En
h
a
n
c
e
d
Se
c
u
ri
t
y
fo
r
El
e
c
tr
o
n
i
c
Hea
l
t
h
Care
In
f
o
rm
a
ti
o
n
Us
i
n
g
O
b
fu
s
c
a
ti
o
n
a
n
d
RSA
Al
g
o
ri
t
h
m
i
n
Clo
u
d
Com
p
u
t
i
n
g
.
In
te
r
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
In
f
o
rm
a
ti
o
n
Se
c
u
ri
ty
a
n
d
Pri
v
a
c
y
(I
J
ISP).
2
0
1
9
;
1
3
(
1
)
:
5
9
-
69.
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KO
MNIK
A
IS
S
N: 1
69
3
-
6
93
0
◼
Mo
d
i
fi
ed
R
S
A
-
ba
s
ed
al
go
r
i
t
hm
: a
do
ub
l
e s
ec
ure
ap
pro
ac
h
(
Is
r
aa
A
l
_
B
araz
a
nc
hi
)
2825
[4
]
Sri
v
a
s
ta
v
a
S,
Sri
v
a
s
t
a
v
a
A.
I
n
t
e
g
ra
ti
o
n
o
f
RSA
a
n
d
Wa
te
rf
a
l
l
Fra
m
e
wor
k
:
Ag
g
r
a
n
d
i
z
e
S
e
c
u
r
i
ty
i
n
Clo
u
d
Com
p
u
t
i
n
g
u
s
i
n
g
I
n
te
g
r
a
ti
o
n
o
f
Riv
e
s
t
–
S
h
a
m
i
r
–
Ad
l
e
m
a
n
(En
c
ry
p
ti
o
n
Al
g
o
ri
th
m
)
a
n
d
Wa
te
rfa
l
l
M
o
d
e
l
.
J
o
u
rn
a
l
o
f
M
i
c
ro
c
o
n
tro
l
l
e
r En
g
i
n
e
e
r
i
n
g
a
n
d
A
p
p
l
i
c
a
t
i
o
n
s
.
2
0
1
8
;
4
(3
):
1
-
8.
[5
]
El
M
a
k
k
a
o
u
i
K,
Be
n
i
-
H
s
s
a
n
e
A,
Ez
z
a
t
i
A.
Sp
e
e
d
y
Clo
u
d
-
R
SA
h
o
m
o
m
o
rp
h
i
c
s
c
h
e
m
e
fo
r
p
re
s
e
r
v
i
n
g
d
a
ta
c
o
n
fi
d
e
n
t
i
a
l
i
ty
i
n
c
l
o
u
d
c
o
m
p
u
ti
n
g
.
J
o
u
rn
a
l
o
f
Am
b
i
e
n
t
In
te
l
l
i
g
e
n
c
e
a
n
d
Hum
a
n
i
z
e
d
Com
p
u
ti
n
.
2
0
1
8
:
1
-
1
2
.
[6
]
Ya
n
g
L
T,
Hu
a
n
g
G
,
Fe
n
g
J
,
X
u
L
.
P
a
ra
l
l
e
l
G
NFS
a
l
g
o
ri
t
h
m
i
n
te
g
ra
t
e
d
w
i
th
p
a
ra
l
l
e
l
b
l
o
c
k
Wi
e
d
e
m
a
n
n
a
l
g
o
r
i
th
m
f
o
r RSA
s
e
c
u
ri
t
y
i
n
c
l
o
u
d
c
o
m
p
u
t
i
n
g
.
In
f
o
rm
a
ti
o
n
S
c
i
e
n
c
e
s
.
2
0
1
7
;
3
8
7
:
2
5
4
-
2
6
5
.
[7
]
Bi
s
h
t
N,
Si
n
g
h
S.
A
c
o
m
p
a
ra
ti
v
e
s
t
u
d
y
o
f
s
o
m
e
s
y
m
m
e
tri
c
a
n
d
a
s
y
m
m
e
tr
i
c
k
e
y
c
r
y
p
to
g
ra
p
h
y
a
l
g
o
r
i
th
m
s
.
I
n
te
r
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
In
n
o
v
a
ti
v
e
Res
e
a
rc
h
i
n
Sc
i
e
n
c
e
,
En
g
i
n
e
e
r
i
n
g
a
n
d
Te
c
h
n
o
l
o
g
y
.
2
0
1
5
;
4
(
3
):
1
0
2
8
-
1031.
[8
]
Yu
Y,
Xu
e
L
,
Au
M
H,
Su
s
i
l
o
W,
Ni
J
,
Zh
a
n
g
Y
,
Sh
e
n
J
.
Clo
u
d
d
a
ta
i
n
te
g
r
i
ty
c
h
e
c
k
i
n
g
wit
h
a
n
i
d
e
n
t
i
ty
-
b
a
s
e
d
a
u
d
i
ti
n
g
m
e
c
h
a
n
i
s
m
fro
m
RSA.
F
u
tu
re
G
e
n
e
ra
ti
o
n
Com
p
u
te
r
Sy
s
te
m
s
.
2
0
1
6
;
6
2
:
85
-
91.
[9
]
Th
i
ru
m
a
l
a
i
C,
Ka
r
H.
M
e
m
o
r
y
E
ff
i
c
i
e
n
t
M
u
l
ti
Ke
y
(M
EM
K)
g
e
n
e
ra
ti
o
n
s
c
h
e
m
e
fo
r
s
e
c
u
re
tra
n
s
p
o
r
ta
ti
o
n
o
f
s
e
n
s
i
t
i
v
e
d
a
t
a
o
v
e
r
Clo
u
d
a
n
d
Io
T
d
e
v
i
c
e
s
.
In
2
0
1
7
In
n
o
v
a
ti
o
n
s
i
n
Po
wer
a
n
d
Ad
v
a
n
c
e
d
Com
p
u
t
i
n
g
Te
c
h
n
o
l
o
g
i
e
s
(i
-
PACT)
.
2
0
1
7
:
1
-
6.
[1
0
]
Pa
n
c
h
o
l
i
VR,
Pa
te
l
BP.
En
h
a
n
c
e
m
e
n
t
o
f
c
l
o
u
d
c
o
m
p
u
ti
n
g
s
e
c
u
ri
t
y
wit
h
s
e
c
u
re
d
a
ta
s
t
o
r
a
g
e
u
s
i
n
g
AES.
In
te
rn
a
ti
o
n
a
l
J
o
u
rn
a
l
f
o
r
In
n
o
v
a
ti
v
e
R
e
s
e
a
rc
h
i
n
Sc
i
e
n
c
e
a
n
d
Te
c
h
n
o
l
o
g
y
.
2
0
1
6
;
2
(
9
):
18
-
21.
[1
1
]
El
M
a
k
k
a
o
u
i
K,
Be
n
i
-
H
s
s
a
n
e
A,
Ez
z
a
ti
A,
El
-
A
n
s
a
r
i
A.
Fa
s
t
c
l
o
u
d
-
RSA
s
c
h
e
m
e
fo
r
p
ro
m
o
ti
n
g
d
a
t
a
c
o
n
f
i
d
e
n
ti
a
l
i
t
y
i
n
th
e
c
l
o
u
d
c
o
m
p
u
ti
n
g
.
Pro
c
e
d
i
a
Co
m
p
u
t
e
r Sc
i
e
n
c
e
.
2
0
1
7
;
1
1
3
:
3
3
-
4
0
.
[1
2
]
Pre
m
a
G
,
Nat
a
ra
j
a
n
S.
An
e
n
h
a
n
c
e
d
s
e
c
u
ri
t
y
a
l
g
o
ri
t
h
m
fo
r
wir
e
l
e
s
s
a
p
p
l
i
c
a
ti
o
n
u
s
i
n
g
RSA
a
n
d
g
e
n
e
ti
c
a
p
p
ro
a
c
h
.
In
2
0
1
3
Fo
u
rth
In
te
rn
a
ti
o
n
a
l
Con
fe
r
e
n
c
e
o
n
Co
m
p
u
ti
n
g
,
Co
m
m
u
n
i
c
a
ti
o
n
s
a
n
d
Net
work
i
n
g
Te
c
h
n
o
l
o
g
i
e
s
(I
CC
CN
T).
2
0
1
3
:
1
-
5.
[1
3
]
El
M
a
k
k
a
o
u
i
K,
Be
n
i
-
Hs
s
a
n
e
A,
Ez
z
a
ti
A.
C
l
o
u
d
-
E
l
G
a
m
a
l
a
n
d
Fa
s
t
Cl
o
u
d
-
RSA
Ho
m
o
m
o
rp
h
i
c
Sc
h
e
m
e
s
fo
r
Pro
t
e
c
t
i
n
g
Dat
a
Con
fi
d
e
n
t
i
a
l
i
t
y
i
n
Clo
u
d
Co
m
p
u
ti
n
g
.
In
t
e
rn
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
Dig
i
ta
l
Cri
m
e
a
n
d
Fo
re
n
s
i
c
s
(I
J
DC
F)
.
2
0
1
9
;
1
1
(3
):
9
0
-
1
0
2
.
[1
4
]
Ste
rg
i
o
u
C,
P
s
a
n
n
i
s
KE,
K
i
m
BG
,
G
u
p
ta
B.
Se
c
u
re
i
n
t
e
g
ra
t
i
o
n
o
f
I
o
T
a
n
d
c
l
o
u
d
c
o
m
p
u
t
i
n
g
.
Fu
tu
r
e
G
e
n
e
ra
ti
o
n
Co
m
p
u
t
e
r Sy
s
te
m
s
.
2
0
1
8
;
7
8
:
9
6
4
-
9
7
5
.
[1
5
]
Ab
d
u
l
s
h
a
h
e
e
d
HR
,
Bi
n
ti
SA,
Sa
d
i
q
II
.
Pro
p
o
s
e
d
a
Sm
a
r
t
So
l
u
ti
o
n
s
B
a
s
e
d
-
o
n
Cl
o
u
d
Co
m
p
u
ti
n
g
a
n
d
Wi
re
l
e
s
s
Se
n
s
i
n
g
.
In
te
rn
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
P
u
re
a
n
d
Ap
p
l
i
e
d
M
a
th
e
m
a
ti
c
s
.
2
0
1
8
;
1
1
9
(
1
8
):
4
2
7
–
4
4
9
.
[1
6
]
Dah
i
y
a
N
,
Ran
i
,
S
.
Cl
o
u
d
Co
m
p
u
ti
n
g
Se
c
u
ri
t
y
:
A Re
v
i
e
w.
IJ
E
DR
.
2017;
5
(3
)
:
11
–
16.
[1
7
]
Dub
e
y
A.
Clo
u
d
Com
p
u
ti
n
g
a
n
d
It
s
Se
c
u
ri
t
y
Is
s
u
e
s
.
In
t
e
rn
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Ad
v
a
n
c
e
Res
e
a
r
c
h
i
n
Com
p
u
te
r Sc
i
e
n
c
e
a
n
d
M
a
n
a
g
e
m
e
n
t
Stu
d
i
e
s
.
2
0
1
6
;
4
(7
)
:
29
–
33.
[1
8
]
Bh
a
v
a
n
i
SD.
In
te
rn
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Ad
v
a
n
c
e
d
Re
s
e
a
r
c
h
i
n
Dat
a
Sto
ra
g
e
Se
c
u
ri
t
y
i
n
Clo
u
d
Com
p
u
t
i
n
g
:
A
Su
r
v
e
y
.
In
te
r
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Ad
v
a
n
c
e
d
Re
s
e
a
rc
h
i
n
Com
p
u
te
r
Sc
i
e
n
c
e
a
n
d
So
ft
war
e
En
g
i
n
e
e
ri
n
g
.
2
0
1
7
;
7
(1
)
:
52
–
5
7
.
[1
9
]
El
h
o
s
e
n
y
M
,
Ra
m
íre
z
-
G
o
n
z
á
l
e
z
G
,
Ab
u
-
El
n
a
s
r
O
M
,
S
h
a
wk
a
t
SA,
Ar
u
n
k
u
m
a
r
N,
Fa
ro
u
k
A
.
Se
c
u
re
m
e
d
i
c
a
l
d
a
t
a
tr
a
n
s
m
i
s
s
i
o
n
m
o
d
e
l
fo
r
Io
T
-
b
a
s
e
d
h
e
a
l
th
c
a
r
e
s
y
s
te
m
s
.
IEEE
Ac
c
e
s
s
.
2
0
1
8
;
6
:
20596
-
2
0
6
0
8
.
[2
0
]
Cha
i
T
,
Drax
l
e
r
R.
Roo
t
m
e
a
n
s
q
u
a
r
e
e
rr
o
r
(RM
SE)
o
r
m
e
a
n
a
b
s
o
l
u
te
e
rro
r
(M
AE
)
?
Arg
u
m
e
n
ts
a
g
a
i
n
s
t
a
v
o
i
d
i
n
g
RM
SE
i
n
t
h
e
l
i
te
ra
t
u
r
e
.
G
e
o
s
c
i
e
n
ti
f
i
c
M
o
d
e
l
De
v
e
l
o
p
m
e
n
t
.
2
0
1
4
;
7
(3
):
1247
-
1
2
5
0
.
[2
1
]
Is
l
a
m
M
,
I
s
l
a
m
M
,
Is
l
a
m
N
,
Sh
a
b
n
a
m
B.
A
M
o
d
i
fi
e
d
a
n
d
Se
c
u
r
e
d
RSA
Pu
b
l
i
c
Ke
y
Cr
y
p
to
s
y
s
t
e
m
Ba
s
e
d
o
n
“n
” Pr
i
m
e
Nu
m
b
e
rs
.
J
o
u
rn
a
l
o
f
Com
p
u
t
e
r a
n
d
Co
m
m
u
n
i
c
a
ti
o
n
s
.
2
0
1
8
;
6
(3
):
7
8
-
9
0
.
[2
2
]
Ka
m
a
rd
a
n
M
,
A
m
i
n
u
d
i
n
N,
C
h
e
-
Him
N,
Su
f
a
h
a
n
i
S,
Kh
a
l
i
d
K
,
Ros
l
a
n
R.
M
o
d
i
f
i
e
d
M
u
l
t
i
Pri
m
e
RS
A
Cry
p
to
s
y
s
te
m
.
J
o
u
rn
a
l
o
f
Ph
y
s
i
c
s
:
Co
n
f
e
re
n
c
e
Se
r
i
e
s
.
2
0
1
8
;
9
9
5
:
0
1
2
0
3
0
.
[2
3
]
Sa
x
e
n
a
S,
K
a
p
o
o
r
B.
Sta
te
o
f
th
e
a
r
t
p
a
ra
l
l
e
l
a
p
p
ro
a
c
h
e
s
fo
r
RSA
p
u
b
l
i
c
k
e
y
-
b
a
s
e
d
c
ry
p
t
o
s
y
s
t
e
m
.
a
rXi
v
p
re
p
ri
n
t
a
r
Xi
v
.
2
0
1
5
;
1
5
0
3
:
0
3
5
9
3
.
[2
4
]
L
o
n
e
AH,
K
h
a
l
i
q
u
e
A.
Gen
e
r
a
l
i
z
e
d
RSA u
s
i
n
g
2
k
p
r
i
m
e
n
u
m
b
e
rs
w
i
th
s
e
c
u
r
e
k
e
y
g
e
n
e
r
a
ti
o
n
.
Se
c
u
r
i
t
y
a
n
d
Co
m
m
u
n
i
c
a
ti
o
n
Ne
two
rk
s
.
2
0
1
6
;
9
(1
7
):
4
4
4
3
-
4
4
5
0
.
[2
5
]
Zh
a
o
T,
Ra
n
Q
,
Y
u
a
n
L
,
C
h
i
Y,
M
a
J
.
Ke
y
Di
s
tri
b
u
ti
o
n
a
n
d
Cha
n
g
i
n
g
Ke
y
Cry
p
to
s
y
s
te
m
Ba
s
e
d
o
n
Ph
a
s
e
Ret
ri
e
v
a
l
A
l
g
o
r
i
th
m
a
n
d
R
SA
Pu
b
l
i
c
-
Ke
y
Al
g
o
ri
t
h
m
.
M
a
th
e
m
a
ti
c
a
l
Pr
o
b
l
e
m
s
i
n
E
n
g
i
n
e
e
r
i
n
g
.
2015
;
2
0
1
5
(7
)
:
12.
Evaluation Warning : The document was created with Spire.PDF for Python.