I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
C
E)
Vo
l.
10
,
No
.
1
,
Feb
r
u
ar
y
2
0
2
0
,
p
p
.
5
3
0
~
5
3
7
I
SS
N:
2088
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v
10
i
1
.
pp
5
3
0
-
537
530
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ec
e.
ia
esco
r
e.
co
m/in
d
ex
.
p
h
p
/I
JE
C
E
An e
f
ficien
t
a
nd
s
ecure
d
a
ta
s
tora
g
e in
c
lo
ud
c
o
m
put
ing
using
m
o
difi
ed R
SA
p
u
blic
k
ey
c
ry
p
tos
y
ste
m
Y.
K
ira
n K
u
m
a
r
1
,
R.
M
a
ha
mm
a
d Sha
f
i
2
1
De
p
a
rtme
n
t
o
f
Co
m
p
u
ter S
c
ien
c
e
,
Bh
a
ra
th
ia
r
Un
iv
e
rsity
,
Co
im
b
a
t
o
re
,
I
n
d
ia
2
Bh
a
ra
th
ia
r
Un
iv
e
rsity
,
Co
im
b
a
to
re
,
I
n
d
ia
A
rt
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
A
p
r
16
,
2
0
1
9
R
ev
i
s
ed
A
u
g
17
,
20
19
A
cc
ep
ted
A
u
g
29
,
2
0
19
Clo
u
d
Co
m
p
u
ti
n
g
is
th
e
a
b
il
it
y
to
im
p
ro
v
e
th
e
u
t
il
it
y
o
r
train
n
e
w
h
u
m
a
n
re
so
u
rc
e
s
w
it
h
o
u
t
i
n
v
e
stin
g
in
n
e
w
in
f
ra
stru
c
tu
re
,
o
r
a
d
d
c
a
p
a
b
il
it
ies
t
o
ex
isten
c
e
w
it
h
o
u
t
th
e
late
st
so
f
twa
re
li
c
e
n
sin
g
.
It
e
x
p
a
n
d
e
d
t
h
e
c
a
p
a
b
il
it
ies
o
f
In
f
o
rm
a
ti
o
n
T
e
c
h
n
o
lo
g
y
(I
T
).
F
r
o
m
th
e
p
a
st
fe
w
y
e
a
r
s,
c
lo
u
d
c
o
m
p
u
ti
n
g
h
a
s
d
e
v
e
lo
p
e
d
f
ro
m
a
g
o
o
d
b
u
si
n
e
ss
c
o
n
c
e
p
t
i
n
t
h
e
b
e
st
risin
g
se
c
to
rs
o
f
th
e
IT
in
d
u
stry
.
Bu
t
m
o
re
in
f
o
r
m
a
t
io
n
o
n
in
d
iv
id
u
a
ls
a
n
d
c
o
m
p
a
n
ies
w
a
s
p
u
t
in
th
e
c
lo
u
d
,
a
n
d
c
o
n
c
e
rn
s
b
e
g
a
n
to
th
i
n
k
a
b
o
u
t
h
o
w
se
c
u
re
th
e
c
lo
u
d
e
n
v
iro
n
m
e
n
t
w
a
s.
D
e
sp
it
e
c
lo
u
d
su
rro
u
n
d
in
g
stru
c
tu
re
s,
e
n
terp
rise
u
se
rs
stil
l
d
o
n
o
t
w
a
n
t
to
e
x
p
a
n
d
th
e
ir
b
u
sin
e
ss
i
n
t
h
e
c
lo
u
d
.
S
e
c
u
r
it
y
re
d
u
c
e
s
th
e
g
ro
w
th
o
f
c
lo
u
d
c
o
m
p
u
ti
n
g
a
n
d
c
o
n
ti
n
u
e
s
to
s
p
re
a
d
th
e
m
a
rk
e
t
w
it
h
c
o
m
p
lex
it
y
w
it
h
d
a
ta
p
riv
a
c
y
a
n
d
d
a
ta
p
r
o
tec
ti
o
n
.
T
h
e
se
c
u
rit
y
o
f
c
lo
u
d
c
o
m
p
u
ti
n
g
h
a
s
c
o
n
sta
n
tl
y
b
e
e
n
a
n
sig
n
if
ica
n
t
a
sp
e
c
t
o
f
im
p
ro
v
e
d
q
u
a
li
ty
o
f
se
rv
ice
f
ro
m
c
lo
u
d
se
rv
ice
p
ro
v
id
e
rs.
Da
ta
sto
ra
g
e
in
th
e
c
lo
u
d
h
a
s
a
p
ro
b
lem
re
late
d
to
d
a
ta
se
c
u
rit
y
.
Ho
w
e
v
e
r,
c
lo
u
d
c
o
m
p
u
ti
n
g
c
o
n
stru
c
t
m
a
n
y
n
e
w
s
e
c
u
rit
y
c
h
a
ll
e
n
g
e
s
w
h
ich
h
a
v
e
n
o
t
b
e
e
n
w
e
ll
e
x
a
m
in
e
.
I
n
o
rd
e
r
to
e
n
su
re
th
a
t
th
e
u
se
r'
s
d
a
ta
i
n
t
h
e
c
lo
u
d
is
se
c
u
re
,
w
e
h
a
v
e
p
r
o
p
o
se
d
a
n
e
ffe
c
ti
v
e
m
e
c
h
a
n
is
m
w
it
h
a
d
isti
n
c
ti
v
e
f
e
a
tu
re
o
f
d
a
ta
in
teg
rit
y
a
n
d
p
riv
a
c
y
.
T
h
is
p
a
p
e
r
f
o
c
u
sin
g
o
n
p
ro
b
lem
s
re
latin
g
to
th
e
c
lo
u
d
d
a
ta sto
ra
g
e
tec
h
n
iq
u
e
s
a
n
d
se
c
u
rit
y
in
v
irt
u
a
l
e
n
v
iro
n
m
e
n
t.
W
e
re
c
o
m
m
e
n
d
a
m
e
th
o
d
f
o
r
p
ro
v
id
i
n
g
d
a
ta sto
ra
g
e
a
n
d
se
c
u
rit
y
in
c
lo
u
d
u
sin
g
p
u
b
li
c
k
e
y
Cr
y
p
to
s
y
ste
m
,
w
h
ich
u
se
s
th
e
c
o
n
c
e
p
t
o
f
th
e
m
o
d
if
ied
RS
A
a
l
g
o
rit
h
m
to
p
ro
v
id
e
b
e
tt
e
r
s
e
c
u
rit
y
f
o
r
th
e
d
a
ta sto
re
d
i
n
th
e
c
l
o
u
d
.
K
ey
w
o
r
d
s
:
C
lo
u
d
d
ata
s
to
r
ag
e
C
lo
u
d
s
er
v
ice
m
o
d
els
Data
s
ec
u
r
it
y
Mo
d
if
ied
R
S
A
P
u
b
lic
k
e
y
c
r
y
p
to
s
y
s
te
m
R
S
A
Co
p
y
rig
h
t
©
2
0
2
0
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts
re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
R
.
Ma
h
a
m
m
ad
Sh
a
f
i,
R
esear
ch
Sp
er
v
is
o
r
,
B
h
ar
ath
ia
r
Un
iv
er
s
it
y
,
C
o
i
m
b
ato
r
e,
I
n
d
ia
,
E
m
ail: r
m
d
s
h
a
f
i
@
g
m
a
il.c
o
m
1.
I
NT
RO
D
UCT
I
O
N
C
lo
u
d
C
o
m
p
u
t
in
g
h
as
m
a
n
y
u
n
iq
u
e
f
ea
tu
r
e
s
th
a
t
m
ak
e
i
t
v
er
y
v
al
u
ab
le.
Di
f
f
er
e
n
t
t
y
p
es
o
f
s
er
v
ice
s
ca
n
b
e
ea
s
il
y
ac
ce
s
s
ib
le
f
r
o
m
c
lo
u
d
co
m
p
u
t
in
g
.
C
lo
u
d
C
o
m
p
u
ti
n
g
s
er
v
ices
p
r
o
v
id
e
clien
t
-
s
p
ec
i
f
ic
ap
p
licatio
n
s
an
d
Data
s
to
r
ag
e
th
r
o
u
g
h
d
ed
icate
d
clo
u
d
s
er
v
e
r
s
.
T
h
at
m
ea
n
s
t
h
er
e
ar
e
n
o
d
a
ta
an
d
ap
p
licatio
n
s
o
n
th
e
co
m
p
u
ter
u
s
ed
b
y
t
h
e
clien
t.
O
n
l
y
t
h
e
o
p
er
atin
g
s
y
s
te
m
a
n
d
th
e
clo
u
d
co
m
p
u
t
i
n
g
s
er
v
ice
w
ill
b
e
th
e
o
n
l
y
ap
p
licatio
n
.
T
h
e
clien
t
w
ill
h
av
e
to
ac
ce
s
s
t
h
e
ap
p
licatio
n
s
an
d
d
ata
s
o
th
at
h
e
ca
n
d
ir
ec
tl
y
ac
ce
s
s
f
r
o
m
clo
u
d
s
er
v
er
.
T
h
is
w
h
o
le
p
r
o
ce
s
s
is
ca
lled
clo
u
d
co
m
p
u
ti
n
g
.
U
s
in
g
clo
u
d
co
m
p
u
tin
g
d
o
es
n
o
t
h
a
v
e
th
e
r
i
s
k
o
f
s
o
f
t
w
ar
e,
cr
as
h
,
an
d
d
ata
lo
s
s
.
Mo
r
eo
v
er
,
th
e
clie
n
t
-
u
t
i
lized
d
ev
ice
also
w
o
r
k
s
f
aster
.
W
ith
v
ir
tu
aliza
tio
n
tec
h
n
o
lo
g
ies,
clo
u
d
co
m
p
u
t
in
g
u
s
e
s
m
o
r
e
e
f
f
icie
n
t
r
eso
u
r
ce
s
[
1
]
.
C
lo
u
d
C
o
m
p
u
tin
g
s
er
v
ices
ar
e
g
r
o
w
in
g
a
n
d
ex
p
ec
ted
to
ex
p
an
d
in
th
e
f
u
t
u
r
e.
T
h
e
p
h
y
s
ica
l
s
er
v
er
r
u
n
s
m
a
n
y
v
ir
t
u
al
m
ac
h
in
e
s
an
d
o
p
er
atin
g
s
y
s
te
m
s
.
C
lo
u
d
C
o
m
p
u
t
in
g
h
a
s
a
f
ac
ilit
y
to
u
s
e
co
m
p
u
ti
n
g
r
eso
u
r
c
es
d
ir
ec
tl
y
th
r
o
u
g
h
th
e
I
n
ter
n
et.
C
o
m
p
u
t
in
g
s
o
u
r
ce
m
a
y
b
e
a
co
m
b
i
n
atio
n
o
f
s
o
f
t
w
ar
e
o
r
h
ar
d
w
ar
e,
o
r
b
o
th
,
an
d
co
m
p
u
ti
n
g
r
eso
u
r
ce
s
w
ill
b
e
r
elea
s
ed
in
t
h
e
f
o
r
m
o
f
I
n
ter
n
et
s
er
v
ices.
A
s
er
v
ice
allo
w
s
t
h
e
u
s
er
to
ac
ce
s
s
t
h
e
co
m
p
u
ti
n
g
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
ng
I
SS
N:
2088
-
8708
A
n
efficien
t a
n
d
s
ec
u
r
e
d
a
ta
s
t
o
r
a
g
e
in
clo
u
d
co
m
p
u
tin
g
u
s
in
g
mo
d
i
fied
R
S
A
p
u
b
lic
.
..
(
Y.
K
ir
a
n
K
u
ma
r
)
531
r
eso
u
r
ce
.
Ser
v
ice
s
o
p
er
ate
o
n
a
r
e
m
o
te
s
er
v
er
a
n
d
u
s
er
s
ac
c
ess
t
h
e
in
te
r
f
ac
e
a
s
a
b
r
o
w
s
er
.
C
lo
u
d
co
m
p
u
tin
g
s
to
r
es
d
ata
s
to
r
ed
o
n
a
u
s
er
's
r
e
m
o
te
clo
u
d
s
er
v
er
[
2
]
.
I
n
f
o
r
m
atio
n
tec
h
n
o
lo
g
ies
ta
k
e
n
e
w
w
av
e
s
in
o
r
d
er
to
ch
an
g
e
ci
v
ilizatio
n
s
.
C
o
m
p
u
t
i
n
g
s
ig
n
i
f
ica
n
tl
y
ex
p
a
n
d
ed
,
m
a
k
in
g
t
h
e
d
atab
ase
m
o
r
e
r
o
b
u
s
t.
C
lo
u
d
co
m
p
u
t
in
g
d
etec
ts
b
r
ief
l
y
th
a
t
clo
u
d
co
m
p
u
ti
n
g
s
er
v
i
ce
s
o
f
f
er
clie
n
t
-
s
p
ec
i
f
ic
ap
p
licatio
n
s
an
d
d
ata
s
to
r
ag
e
t
h
r
o
u
g
h
d
ed
icate
d
W
eb
s
er
v
er
s
.
I
n
C
lo
u
d
C
o
m
p
u
ti
n
g
a
ll d
ata
is
s
to
r
ed
o
n
a
w
e
b
s
er
v
er
.
T
h
er
e
ar
e
n
o
d
ata
an
d
ap
p
licatio
n
s
o
n
th
e
clie
n
t
-
u
t
ilized
co
m
p
u
ter
[
3
]
.
On
l
y
th
e
o
p
er
atin
g
s
y
s
te
m
a
n
d
th
e
clo
u
d
co
m
p
u
ti
n
g
s
er
v
ice
w
ill
b
e
t
h
e
o
n
l
y
ap
p
licatio
n
.
C
lie
n
t
Ap
p
licatio
n
s
an
d
d
ata
ar
e
ac
ce
s
s
ib
le
to
g
et
c
lo
u
d
s
er
v
er
s
d
ir
ec
tl
y
f
r
o
m
clo
u
d
s
e
r
v
er
s
.
T
h
er
e
is
n
o
r
is
k
o
f
s
o
f
t
w
ar
e,
cr
as
h
a
n
d
d
atab
ases
u
s
i
n
g
clo
u
d
co
m
p
u
ti
n
g
,
th
e
clie
nt
-
u
ti
lized
d
ev
ice
also
w
o
r
k
s
f
a
s
ter
.
2.
CL
O
UD
CO
M
P
UT
I
N
G
DE
P
L
O
YM
E
NT
M
O
DE
L
S
I
n
C
lo
u
d
C
o
m
p
u
ti
n
g
ea
c
h
m
o
d
el
h
as
a
u
n
iq
u
e
v
al
u
e
p
r
o
p
o
s
i
tio
n
,
w
h
ic
h
p
r
o
v
id
es
a
lin
e
i
m
p
r
o
v
e
m
en
t
p
r
o
v
id
er
f
o
r
th
e
b
u
s
i
n
ess
an
d
p
r
o
v
id
es
cu
s
to
m
er
s
er
v
ice
o
p
tio
n
.
T
h
e
f
o
llo
w
in
g
i
s
s
o
m
e
o
f
th
e
m
aj
o
r
o
r
p
o
p
u
lar
clo
u
d
o
p
e
r
atio
n
m
o
d
els.
a.
P
r
iv
ate
C
lo
u
d
:
P
r
iv
ate
C
lo
u
d
in
f
r
a
s
tr
u
ct
u
r
e
is
co
n
tr
o
lled
b
y
a
co
m
p
an
y
o
r
a
th
ir
d
p
ar
ty
an
d
o
n
ly
m
ai
n
tai
n
s
th
e
r
eq
u
ir
e
m
e
n
t
s
o
f
t
h
e
co
m
p
a
n
y
.
b.
P
u
b
lic
C
lo
u
d
:
P
u
b
lic
C
lo
u
d
in
f
r
astru
ct
u
r
e
i
s
a
v
ailab
le
to
a
lar
g
e
o
r
g
a
n
izatio
n
s
o
r
g
e
n
er
al
p
u
b
lic
an
d
o
w
n
ed
b
y
t
h
e
v
en
d
o
r
w
h
o
p
r
o
v
id
es c
lo
u
d
s
er
v
ices.
c.
C
o
m
m
u
n
i
t
y
C
lo
u
d
:
C
o
m
m
u
n
i
t
y
C
lo
u
d
i
n
f
r
astru
c
tu
r
e
i
s
a
s
h
ar
ed
co
m
m
u
n
i
t
y
th
a
t
h
a
s
o
p
er
ated
b
y
o
n
e
o
r
m
o
r
e
o
r
g
a
n
izatio
n
s
a
n
d
s
u
p
p
o
r
ts
th
e
s
a
m
e
s
er
v
ices.
d.
H
y
b
r
id
C
lo
u
d
: H
y
b
r
id
C
lo
u
d
i
n
f
r
a
s
tr
u
ct
u
r
e
is
a
co
m
b
in
at
io
n
o
f
t
w
o
o
r
m
o
r
e
d
i
f
f
er
e
n
t c
lo
u
d
in
f
r
astru
ct
u
r
e
s
lik
e
p
r
iv
a
te,
p
u
b
lic
o
r
co
m
m
u
n
i
t
y
clo
u
d
s
,
b
u
t
p
o
r
tab
ilit
y
o
f
d
ata
an
d
ap
p
licatio
n
s
p
r
o
v
id
ed
b
y
s
ta
n
d
ar
d
tech
n
o
lo
g
y
.
3.
CL
O
UD
CO
M
P
UT
I
N
G
SE
RVIC
E
S
T
h
e
w
id
e
r
an
g
e
o
f
s
er
v
ice
s
o
f
f
er
ed
b
y
clo
u
d
co
m
p
u
ti
n
g
o
r
g
an
izatio
n
s
ca
n
b
e
ca
teg
o
r
ized
in
to
th
r
e
e
b
asict
y
p
es:
3
.
1
.
So
f
t
wa
re
a
s
a
s
er
v
ice
(
Sa
a
S)
Ma
n
y
u
s
er
s
allo
w
ac
ce
s
s
to
th
e
ap
p
licatio
n
w
h
en
Saa
S
s
er
v
ices
p
r
o
v
id
e
b
etter
ac
ce
s
s
ib
ilit
y
an
d
ac
tiv
e
f
u
n
ctio
n
alit
y
.
Saa
S
s
er
v
ices
p
r
o
v
id
e
f
o
cu
s
ed
b
u
s
i
n
e
s
s
o
p
er
atio
n
s
.
T
h
e
clo
u
d
r
eso
u
r
ce
ad
m
i
n
is
tr
ato
r
cr
ea
tes co
n
tr
o
ls
r
eg
ar
d
in
g
u
s
er
s
'
ac
ce
s
s
to
ap
p
licatio
n
s
.
3
.
2
.
P
la
t
f
o
rm
a
s
a
s
er
v
ic
e
(
P
a
a
S)
User
co
n
f
i
g
u
r
atio
n
u
n
d
er
P
aa
S
d
o
es
n
o
t
u
s
e
th
e
ap
p
licatio
n
s
an
d
f
ac
il
ities
p
r
o
v
id
ed
b
y
th
e
clo
u
d
p
r
o
v
id
er
.
C
lo
u
d
s
to
r
ag
e
o
p
tio
n
s
ar
e
av
ailab
le
to
u
s
e
clo
u
d
n
ee
d
s
.
T
h
e
m
o
d
el
p
r
e
-
r
u
n
n
er
m
an
a
g
e
s
all
clo
u
d
co
m
p
u
ti
n
g
d
e
s
ig
n
s
.
I
t
p
r
o
v
id
e
s
s
u
p
p
o
r
t
f
o
r
ap
p
licatio
n
s
a
n
d
s
er
v
ices
a
n
d
p
r
o
v
id
es
co
m
p
u
tatio
n
al
r
eso
u
r
ce
s
th
r
o
u
g
h
t
h
e
h
o
s
t p
latf
o
r
m
.
3
.
3
.
I
nfr
a
s
t
ruct
ure
a
s
a
s
er
v
iv
e
(
I
a
a
S)
T
h
is
en
v
ir
o
n
m
en
t
ca
n
i
n
cl
u
d
e
h
ar
d
w
ar
e,
o
p
er
atin
g
s
y
s
te
m
s
,
n
et
w
o
r
k
co
n
n
ec
ti
v
it
y
a
n
d
o
th
er
I
T
r
eso
u
r
ce
s
.
T
h
e
I
T
r
eso
u
r
ce
s
p
r
o
v
id
ed
b
y
I
aa
S
ar
e
g
en
er
al
l
y
n
o
t
p
r
e
co
n
f
i
g
u
r
ed
,
p
lacin
g
th
e
ad
m
in
is
tr
ati
v
e
r
esp
o
n
s
ib
ilit
y
d
ir
ec
tl
y
u
p
o
n
t
h
e
clo
u
d
co
n
s
u
m
er
.
T
h
e
u
s
er
o
f
t
h
e
P
aa
S
d
ed
icate
d
A
P
I
m
ak
e
s
it
p
o
s
s
ib
le
to
o
r
g
an
ize
t
h
e
ac
tiv
ities
o
f
th
e
s
er
v
er
h
o
s
ti
n
g
e
n
g
in
e
to
r
u
n
a
n
d
r
ep
r
o
d
u
ce
th
e
e
n
v
ir
o
n
m
en
t
b
ased
o
n
u
s
er
r
eq
u
ests
.
E
ac
h
p
r
o
v
id
er
is
b
ased
o
n
its
A
P
I
r
elate
d
k
e
y
ca
p
ab
ilit
ies,
th
e
ap
p
d
ev
elo
p
ed
f
o
r
ea
ch
p
ar
ticu
lar
g
r
o
u
p
p
r
o
v
id
er
is
n
o
t
m
o
v
e
d
to
an
o
th
er
c
lo
u
d
h
o
s
t,
b
u
t
its
A
P
I
i
s
e
x
clu
d
ed
b
ased
o
n
its
r
elate
d
k
e
y
ca
p
ab
ilit
ies.
T
h
er
e
ar
e
attem
p
ts
to
ex
ten
d
s
i
m
p
le
p
r
o
g
r
a
m
m
in
g
d
e
s
i
g
n
s
w
it
h
clo
u
d
ca
p
ab
ilit
ies.
I
n
C
lo
u
d
en
v
ir
o
n
m
e
n
t
d
ata
i
s
n
o
t
s
to
r
ed
o
n
th
e
u
s
er
'
s
co
m
p
u
ter
b
u
t
s
t
o
r
ed
in
th
e
th
ir
d
p
ar
ties
clo
u
d
s
to
r
ag
e.
T
h
e
C
lo
u
d
C
o
m
p
u
tin
g
in
f
r
astr
u
ct
u
r
e
allo
w
s
it
s
r
eso
u
r
ce
s
to
b
e
ac
ce
s
s
ed
b
et
w
ee
n
u
s
er
s
,
s
er
v
er
s
an
d
ca
n
o
p
en
l
y
ac
ce
s
s
d
ata/f
ile
s
to
r
ed
in
th
e
clo
u
d
s
e
r
v
er
.
Du
e
to
th
is
o
p
en
ac
ce
s
s
f
ac
to
r
,
o
n
e
p
er
s
o
n
'
s
f
iles
o
r
d
a
ta
is
u
s
ed
b
y
o
th
er
u
s
er
s
o
f
t
h
e
c
lo
u
d
,
r
esu
lti
n
g
i
n
m
o
r
e
o
r
le
s
s
d
a
n
g
er
o
u
s
to
t
r
ea
t
d
ata
o
r
f
iles
.
On
ce
in
tr
u
d
er
s
h
a
v
e
ac
ce
s
s
to
d
ata,
its
ab
u
s
e
is
a
m
aj
o
r
th
r
ea
t.
I
n
tr
u
d
er
d
estro
y
s
t
h
e
ac
tu
al
d
ata
o
r
b
r
ea
k
o
f
f
th
e
co
m
m
u
n
icatio
n
.
C
lo
u
d
s
er
v
ice
p
r
o
v
id
er
s
p
r
o
v
id
e
cr
itical
s
ec
u
r
it
y
o
v
er
f
iles
a
n
d
d
ata
th
at
r
eq
u
ir
e
m
u
c
h
atte
n
tio
n
to
s
ec
u
r
it
y
.
On
e
o
f
th
e
m
o
s
t
co
m
m
o
n
p
r
o
b
le
m
s
i
n
th
e
c
lo
u
d
i
s
th
at
t
h
e
p
er
s
o
n
d
o
es
n
o
t
co
n
tr
o
l
th
e
d
ata
s
to
r
ag
e
s
p
ac
e.
C
lo
u
d
Ser
v
ice
P
r
o
v
id
er
p
r
o
v
id
es
a
cl
o
u
d
u
s
er
p
r
o
v
id
ed
r
eso
u
r
ce
allo
ca
tio
n
an
d
s
c
h
ed
u
li
n
g
f
ac
ili
t
y
,
w
h
e
n
p
r
o
ce
s
s
ed
w
h
e
n
r
eq
u
ir
ed
to
p
r
o
tect
f
iles
/d
ata.
T
o
d
ef
ea
t th
is
p
r
o
b
lem
,
s
ec
u
r
it
y
i
n
t
h
e
clo
u
d
s
er
v
er
s
h
o
u
ld
b
e
ef
f
ec
t
iv
e.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2088
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
1
,
Feb
r
u
ar
y
2
0
2
0
:
530
-
537
532
4.
DATA S
E
CUR
I
T
Y
USI
NG
E
NCRY
P
T
I
O
N
Secu
r
it
y
is
a
k
e
y
ele
m
e
n
t
i
n
w
id
e
r
an
g
e
o
f
ar
ea
s
lik
e
n
e
t
w
o
r
k
s
ec
u
r
it
y
,
d
ata
s
ec
u
r
it
y
an
d
u
s
er
ac
ce
s
s
m
ec
h
a
n
i
s
m
s
.
I
n
C
lo
u
d
C
o
m
p
u
ti
n
g
o
n
e
o
f
t
h
e
m
aj
o
r
ar
ea
is
d
ata
s
ec
u
r
it
y
,
e
n
c
r
y
p
tio
n
m
ec
h
a
n
is
m
s
,
d
ata
r
esil
ien
c
y
a
n
d
r
ep
licatio
n
,
d
ata
av
ailab
ili
t
y
an
d
i
n
te
g
r
it
y
ar
e
s
o
m
e
o
f
th
e
p
o
p
u
lar
m
et
h
o
d
s
to
p
r
o
v
id
e
d
ata
s
ec
u
r
it
y
in
clo
u
d
co
m
p
u
tin
g
.
I
n
th
e
s
e
m
et
h
o
d
s
w
e
h
av
e
u
s
ed
en
cr
y
p
tio
n
m
e
th
o
d
b
y
u
s
i
n
g
R
S
A
an
d
Mo
d
if
ied
R
S
A
al
g
o
r
ith
m
s
.
I
n
clo
u
d
-
b
a
s
ed
d
at
a
tr
an
s
m
i
s
s
io
n
s
m
o
s
t
co
m
m
o
n
l
y
u
s
ed
p
r
o
to
co
l
is
HT
T
P
S,
w
h
ich
u
s
es
SS
L
/T
L
S u
n
d
er
l
y
in
g
p
r
o
to
co
l.
Mo
s
t o
f
th
e
T
r
an
s
p
o
r
t L
a
y
er
Secu
r
it
y
i
m
p
le
m
e
n
tatio
n
s
u
s
e
d
b
y
R
S
A
alg
o
r
it
h
m
b
ec
au
s
e
it is
t
h
e
ch
ief
a
s
y
m
m
e
tr
ical
en
cr
y
p
tio
n
cip
h
er
.
Gen
er
all
y
C
lo
u
d
Ser
v
ice
s
h
a
s
m
o
r
e
h
ar
m
th
a
n
t
h
e
in
tr
a
n
et
wo
r
k
s
er
v
ices
a
n
d
also
ad
d
itio
n
al
s
ec
u
r
it
y
p
r
o
b
lem
s
ar
is
e
o
n
v
ir
tu
al
izati
o
n
an
d
o
u
t
s
o
u
r
ce
d
r
eso
u
r
ce
s
.
T
h
e
m
aj
o
r
C
lo
u
d
Sec
u
r
it
y
p
r
o
b
lem
s
ar
e
r
ai
s
ed
b
ased
o
n
th
e
s
elec
tio
n
o
f
C
l
o
u
d
Ser
v
ice
Mo
d
el
an
d
r
u
n
ti
m
e
o
f
t
h
e
ap
p
licatio
n
s
.
T
o
i
d
en
tify
t
h
e
s
ec
u
r
it
y
p
r
o
b
lem
s
o
n
t
h
e
clo
u
d
en
v
ir
o
n
m
en
t
w
e
h
a
v
e
to
an
al
y
ze
th
e
f
o
llo
w
i
n
g
s
tep
s
:
1.
I
d
en
tify
t
h
e
r
eso
u
r
ce
:
I
d
en
ti
f
y
w
h
ich
t
y
p
e
o
f
r
eso
u
r
ce
(
Data
/
A
p
p
lica
tio
n
s
o
r
Ser
v
ice
s
)
to
d
ep
lo
y
o
n
th
e
clo
u
d
en
v
ir
o
n
m
e
n
t.
2.
I
d
en
tify
t
h
e
ac
ce
s
s
le
v
el
o
f
t
h
e
r
eso
u
r
ce
:
I
d
en
t
if
y
th
e
r
is
k
s
t
h
at
t
h
at
ar
e
as
s
o
ciate
d
o
n
th
e
r
eso
u
r
ce
r
elate
d
to
av
ailab
ilit
y
,
p
r
iv
ac
y
,
u
n
a
u
t
h
o
r
ized
ac
ce
s
s
an
d
lo
s
s
o
f
d
ata
.
3.
I
d
en
tify
th
e
d
ep
lo
y
m
e
n
t
m
o
d
el:
C
lo
u
d
d
ep
lo
y
m
e
n
t
m
o
d
el
s
ar
e
p
r
iv
ate,
p
u
b
lic,
co
m
m
u
n
it
y
an
d
h
y
b
r
id
.
I
d
en
tify
w
h
ich
t
y
p
e
o
f
d
ep
lo
y
m
en
t
m
o
d
el
is
ap
p
r
o
p
r
iate
f
o
r
y
o
u
r
r
eso
u
r
ce
.
4.
Dete
r
m
i
n
e
th
e
d
eli
v
er
y
m
o
d
el:
Dif
f
er
en
t c
lo
u
d
d
eliv
er
y
m
o
d
els ar
e
av
ailab
le
s
u
ch
a
s
I
aa
S,
P
aa
S a
n
d
SaaS.
I
d
en
tify
w
h
ich
t
y
p
e
o
f
d
eliv
er
y
m
o
d
el
is
s
u
itab
le
f
o
r
y
o
u
r
I
T
r
eso
u
r
ce
.
5.
E
v
alu
a
tio
n
o
f
C
lo
u
d
P
r
o
v
id
er
:
User
s
n
ee
d
to
as
s
es
s
th
e
s
y
s
te
m
to
k
n
o
w
w
h
er
e
d
ata
is
s
to
r
e
d
an
d
h
o
w
d
ata
is
tr
an
s
f
er
r
ed
in
an
d
o
u
t o
f
th
e
clo
u
d
en
v
ir
o
n
m
e
n
t a
f
ter
id
en
t
if
y
r
e
s
o
u
r
ce
s
o
f
f
er
ed
b
y
a
clo
u
d
p
r
o
v
id
er
.
I
n
f
r
as
tr
u
ct
u
r
e
is
p
r
o
v
id
ed
b
y
I
aa
S,
Fra
m
e
w
o
r
k
s
f
o
r
ap
p
licatio
n
d
ev
elo
p
m
en
t,
m
an
a
g
e
s
tr
u
ctu
r
es
an
d
tr
an
s
ac
tio
n
s
p
r
o
v
id
ed
b
y
P
aa
S
an
d
an
Op
er
atin
g
E
n
v
ir
o
n
m
e
n
t
w
it
h
ap
p
licatio
n
s
,
e
f
f
ec
ti
v
e
u
s
er
in
ter
f
ac
e
a
n
d
m
an
a
g
e
m
e
n
t
p
r
o
v
id
ed
b
y
Saa
S.
Fro
m
t
h
e
ex
i
s
ti
n
g
s
er
v
ice
m
o
d
el
s
I
aa
S
h
as
t
h
e
least
i
n
te
g
r
ated
f
u
n
ctio
n
alit
y
s
o
it r
eq
u
ir
es
m
i
n
i
m
u
m
s
ec
u
r
it
y
b
u
t Saa
S h
as
m
o
r
e
in
te
g
r
ate
d
f
u
n
ctio
n
al
it
y
s
o
w
e
r
eq
u
ir
e
m
o
r
e
s
ec
u
r
it
y
[
4
].
SaaS
is
d
eli
v
er
y
m
o
d
el
f
o
r
s
h
ar
ed
clo
u
d
s
er
v
ices
t
h
at
ca
n
b
e
lo
ca
ted
as
co
m
m
er
cia
lize
d
p
r
o
d
u
cts
h
o
s
ted
b
y
clo
u
d
s
.
I
n
t
h
i
s
m
o
d
el
clo
u
d
co
n
s
u
m
er
is
g
iv
e
n
ac
ce
s
s
t
h
e
c
lo
u
d
s
er
v
ice
c
o
n
tact,
b
u
t
n
o
t
a
n
y
u
n
d
er
l
y
in
g
I
T
r
eso
u
r
ce
s
o
r
i
m
p
lan
tatio
n
d
etails.
T
h
e
P
aa
S
c
lo
u
d
d
eliv
er
y
m
o
d
el
en
ab
le
s
a
clo
u
d
p
r
o
v
id
er
to
o
f
f
er
a
p
r
ec
o
n
f
i
g
u
r
ed
en
v
ir
o
n
m
e
n
t
t
h
at
clo
u
d
co
n
s
u
m
er
s
ca
n
u
s
e
to
b
u
ild
an
d
d
ep
lo
y
clo
u
d
s
er
v
ices
a
n
d
s
o
lu
tio
n
s
,
e
v
en
t
h
o
u
g
h
w
it
h
d
ec
r
ea
s
ed
ad
m
in
is
tr
ati
v
e
co
n
tr
o
l.
A
C
lo
u
d
C
o
n
s
u
m
er
is
ac
ce
s
s
i
n
g
a
r
ea
d
y
-
m
ad
e
P
aa
S e
n
v
ir
o
n
m
e
n
t.
I
aa
S c
lo
u
d
d
eliv
er
y
m
o
d
el
o
f
f
er
s
clo
u
d
c
o
n
s
u
m
er
s
a
h
i
g
h
le
v
el
ad
m
i
n
i
s
tr
ativ
e
co
n
tr
o
l o
v
er
“
r
a
w
”
i
n
f
r
astr
u
ctu
r
e
-
b
ased
I
T
r
eso
u
r
ce
s
.
A
c
lo
u
d
co
n
s
u
m
e
r
is
u
s
i
n
g
a
v
ir
tu
al
s
er
v
e
r
w
i
th
in
an
I
aa
S
en
v
ir
o
n
m
e
n
t.
C
lo
u
d
co
n
s
u
m
e
r
s
ar
e
p
r
o
v
id
ed
w
i
th
r
an
g
e
o
f
co
n
tr
ac
tu
al
g
u
ar
an
tee
s
b
y
t
h
e
clo
u
d
p
r
o
v
id
er
,
p
er
tain
in
g
to
ch
ar
ac
ter
is
t
ics s
u
ch
as c
ap
ac
it
y
p
er
f
o
r
m
an
ce
a
n
d
av
ailab
ilit
y
.
5.
RSA
AL
G
O
R
I
T
H
M
R
S
A
a
u
t
h
en
t
icati
o
n
a
n
d
t
h
e
id
en
tit
y
o
f
s
er
v
ice
p
r
o
v
id
er
o
v
er
in
s
ec
u
r
e
co
m
m
u
n
icatio
n
m
ed
iu
m
.
C
r
ac
k
i
n
g
t
h
e
R
S
A
en
cr
y
p
t
io
n
is
at
m
o
s
t
as
d
if
f
ic
u
lt
as
f
ac
t
o
r
in
g
h
u
g
e
n
u
m
b
er
s
[5
,
6]
.
T
h
e
R
S
A
al
g
o
r
ith
m
in
v
o
l
v
es t
h
r
ee
s
tep
s
[7
,
8]
:
1.
Gen
er
atio
n
o
f
Ke
y
2.
E
n
cr
y
p
tio
n
b
y
u
s
in
g
P
u
b
lic
K
e
y
an
d
3.
Dec
r
y
p
tio
n
b
y
u
s
i
n
g
P
r
iv
ate
Ke
y
.
Select
t
w
o
d
i
f
f
er
en
t p
r
i
m
e
n
u
m
b
er
s
p
an
d
q
.
T
h
e
in
teg
er
’
s
p
an
d
q
s
h
o
u
ld
b
e
g
en
er
ated
at
r
an
d
o
m
l
y
b
ec
au
s
e
o
f
s
ec
u
r
it
y
.
co
m
p
u
te
n
=
p
*
q
;
co
m
p
u
te
f
(
n
)
=
(
p
-
1
)
(
q
-
1)
ch
o
o
s
e
e
s
u
c
h
t
h
at
e
is
r
elati
v
e
l
y
p
r
i
m
e
to
f
(
n
)
an
d
le
s
s
t
h
a
n
f
(
n
)
.
f
i
n
d
o
u
t d
s
u
c
h
th
at
d
e
co
n
g
r
u
en
t
m
o
d
u
lo
1
(
m
o
d
f
(
n
)
)
an
d
d
<f
(
n
)
.
P
u
b
lic
k
e
y
=
{e
,
n
},
P
r
iv
ate
k
e
y
=
{d
,
n
}
C
ip
h
er
tex
t c
=
m
es
s
ag
e
e
m
o
d
n
P
lain
tex
t p
=
cip
h
er
tex
t d
m
o
d
n
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
ng
I
SS
N:
2088
-
8708
A
n
efficien
t a
n
d
s
ec
u
r
e
d
a
ta
s
t
o
r
a
g
e
in
clo
u
d
co
m
p
u
tin
g
u
s
in
g
mo
d
i
fied
R
S
A
p
u
b
lic
.
..
(
Y.
K
ir
a
n
K
u
ma
r
)
533
6.
M
O
DIFIE
D
R
SA M
O
DE
L
Fig
u
r
e
1
s
h
o
w
t
h
e
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
u
s
in
g
MD
R
S
A.
Fig
u
r
e
1
.
E
n
cr
y
p
tio
n
a
n
d
d
ec
r
y
p
t
io
n
u
s
i
n
g
M
DR
S
A
W
e
d
iv
id
e
th
e
p
r
o
g
r
a
m
in
to
3
p
ar
ts
1.
p
lain
tex
t
+
p
u
b
lick
e
y
1
--
>
c
ip
h
er
tex
t1
2.
cip
h
er
tex
t1
+
p
u
b
lic
k
e
y
2
--
>
c
ip
h
er
tex
t 2
3.
c
ip
h
er
tex
t
1
+
p
r
iv
ate
k
e
y
--
>
p
lain
te
x
t
I
n
t
h
e
m
aj
o
r
ity
ca
s
e
s
t
h
e
p
r
o
b
le
m
o
f
R
S
A
is
b
r
ea
k
ab
le
as
o
f
s
i
m
p
l
y
ca
lcu
latio
n
o
f
k
e
y
s
b
ased
o
n
N
,
b
ec
au
s
e
it
i
s
th
e
o
n
l
y
p
r
o
d
u
ct
o
f
t
w
o
p
r
i
m
e
n
u
m
b
er
s
,
N
c
an
b
e
ea
s
il
y
n
o
ticea
b
le.
O
n
ce
th
e
v
a
lu
e
o
f
N
is
r
ec
o
g
n
ized
,
an
i
n
tr
u
d
er
ca
n
r
e
co
v
er
th
e
k
e
y
s
an
d
cr
ac
k
t
h
e
s
y
s
te
m
.
T
h
e
m
o
s
t
i
m
p
o
r
tan
t
m
o
d
i
f
icat
io
n
s
w
h
ich
b
u
ild
th
e
s
y
s
te
m
i
s
ca
p
ab
le
an
d
s
ec
u
r
e
ar
e
co
n
s
i
d
er
ed
in
th
e
m
o
d
i
f
ied
R
S
A
Mo
d
el
[
9
,
10
]
.
Mo
d
if
ied
R
S
A
al
g
o
r
ith
m
is
p
e
r
f
o
r
m
ed
b
y
f
o
llo
w
i
n
g
w
a
y
:
1.
n
1
=
p
x
q
2.
n
2
=
r
x
s
3.
N
=
n
1
*
n
2
4.
p
h
=
(
p
-
1
)
(
q
-
1
)
(
r
-
1
)
(
s
-
1)
5.
e
=
e1
*
e2
6.
C
alcu
late
e1
an
d
e2
an
d
m
u
lti
p
ly
t
w
o
v
al
u
es (
e1
*
e2
)
o
r
ca
lcu
late
e
an
d
d
iv
id
e
e
in
to
e1
an
d
e2
th
en
w
e
g
et
t
w
o
e
n
cr
y
p
tio
n
d
an
o
n
e
d
ec
r
y
p
tio
n
.
T
h
e
m
o
d
i
f
ied
R
S
A
Mo
d
el
g
e
n
er
ates
r
an
d
o
m
l
y
f
o
u
r
lar
g
e
p
r
im
e
n
u
m
b
er
s
p
,
q
,
r
an
d
s
.
T
h
er
e
ar
e
th
r
ee
co
m
p
o
n
e
n
ts
co
n
s
is
ti
n
g
i
n
p
u
b
lic
k
e
y
g
en
er
atio
n
e,
f
,
N
w
h
er
e
e
a
n
d
f
ar
e
at
r
an
d
o
m
g
en
er
ated
a
n
d
also
th
r
ee
co
m
p
o
n
e
n
t
s
co
n
s
is
tin
g
i
n
p
r
iv
ate
k
e
y
g
e
n
er
atio
n
d
,
g
,
N
w
h
er
e
d
an
d
g
ar
e
r
an
d
o
m
l
y
g
e
n
er
ated
[
1
1
,
12]
.
I
n
cu
s
to
m
ized
R
S
A
m
o
d
el
m
o
r
e
co
m
p
le
x
it
y
n
u
m
b
er
is
N.
I
n
p
u
b
lic
an
d
p
r
iv
ate
k
e
y
g
e
n
er
a
tio
n
N
i
s
th
e
s
a
m
e
v
alu
e,
a
n
in
tr
u
d
er
w
ith
t
h
e
i
n
f
o
r
m
atio
n
o
f
N
ca
n
n
o
t
f
in
d
o
u
t
th
e
v
al
u
es
o
f
f
o
u
r
p
r
i
m
e
n
u
m
b
er
s
w
h
ic
h
ar
e
ess
e
n
tial
f
o
r
f
in
d
i
n
g
th
e
v
al
u
e
o
f
N
an
d
co
n
s
eq
u
e
n
t
l
y
e
an
d
f
[
13
,
14
]
.
7.
RE
SU
L
T
S AN
D
D
I
SCU
SS
I
O
NS
Ke
y
Size:
[
1
0
2
4
]
Gen
er
ated
p
r
i
m
e
n
u
m
b
er
s
p
,
q
,
r
an
d
s
p
:
[
DB
B
0
B
0
4
8
5
D3
3
5
DF0
4
4
F4
E
DD1
8
4
1
5
D5
A
4
3
B
A
F2
C
9
FB
8
A
9
9
B
E
5
3
4
7
E
9
1
0
1
3
8
D
1
9
A
F2
4
7
8
8
A
F7
7
8
0
1
DE
6
8
E
4
7
B
B
B
8
5
A
A
8
3
9
DC
3
7
4
A5
3
9
B
3
A
E
6
F8
4
4
9
3
8
9
B
DC
5
F
C
E
F3
F6
2
9
8
C
0
6
C
1
7
2
6
4
B
A
8
0
9
FD7
E
C
5
0
FE0
D9
A
7
7
5
3
E
F8
F2
C
3
0
2
1
6
0
4
6
-
-
-
-
-
-
]
q
:
[
9
6
D0
A
F0
6
0
D3
1
1
6
D4
6
8
6
A
5
1
5
6
C
D4
4
FF
5
3
B
6
4
7
3
7
6
8
1
6
B
3
F3
4
D0
0
B
B
7
A
0
DA
F0
4
8
6
2
7
A
4
9
4
9
4
7
1
6
E
4
1
DA
8
2
2
D5
7
3
4
9
7
6
DA
6
FB
5
E
B
A
0
6
2
C
C
9
1
3
7
5
8
E
6
2
0
8
E
9
3
D6
D7
E
4
3
2
0
3
3
1
C
E
8
5
C
8
4
1
E
0
3
1
0
9
5
B
0
FDB
A
7
7
3
0
B
D8
5
F3
C
FD8
FB
9
B
1
C
A
D1
5
C
-
-
-
-
-
-
]
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2088
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
1
,
Feb
r
u
ar
y
2
0
2
0
:
530
-
537
534
r
:
[
8
DD2
1
B
8
0
7
6
1
B
B
F6
C
8
C
0
DB
4
2
F7
0
C
B
B
9
DE
0
9
6
2
DC
0
C
1
9
DE
3
2
D7
7
8
3
0
B
6
8
5
6
B
E
0
9
E
5
1
5
8
C
3
0
2
C
9
4
F9
8
2
1
2
9
8
2
0
8
6
B
B
0
9
DF8
0
9
8
0
6
4
F8
4
8
B
8
D
4
4
0
1
D5
4
4
E
3
7
C
7
6
D0
B
1
C
7
0
3
3
B
4
3
1
0
3
7
FEA
D1
5
5
7
2
9
6
6
2
6
1
8
8
B
2
0
DF1
7
5
6
E
2
B
7
A
7
1
9
1
B
2
C
7
2
D4
FB
7
A
-
-
-
-
]
s
:
[
9
FEB
E
C
A
1
5
0
E
B
7
E
8
7
E
6
F6
3
C
8
E
2
0
E
1
9
F8
1
1
2
3
7
9
C
A
8
B
F0
F
A
7
F4
7
4
E
B
0
B
C
6
6
6
2
B
E
2
9
C
2
C
D5
0
B
2
2
3
3
0
E
B
0
C
A
0
D6
B
C
9
FE3
2
8
8
A
2
7
5
A
7
0
6
8
4
5
C
C
5
1
8
C
9
8
9
F2
FB
C
1
FD3
0
0
1
C
1
8
FB
A
E
3
B
FA
3
5
0
5
9
1
2
B
7
2
D4
1
1
A
5
DC
D
C
A
1
8
A
9
4
1
2
5
5
6
9
9
4
3
2
4
9
4
C
1
D2
1
6
2
-
-
-
-
-
]
P
u
b
lic
Ke
y
p
air
n
an
d
E
Gen
er
ated
Valu
e
o
f
N
:
[
2
C
C
A
4
7
C
6
6
7
2
AA
8
8
9
B
2
FB
B
6
7
F1
D7
1
B
6
C
4
8
8
4
A
8
C
B
7
B
0
E
B
B
D5
FF
E
B
5
2
5
0
7
C
8
3
DA
9
1
8
A
5
0
9
C
8
5
8
A
3
8
9
3
7
C
DC
6
8
DDB
5
5
C
2
0
FE7
F4
4
C
9
1
9
5
0
4
8
F5
E
0
0
4
4
7
C
6
6
7
3
4
D9
0
9
4
B
DC
1
6
4
F0
6
7
C
6
8
A
D7
4
7
0
FF
7
8
4
2
8
2
FB
D3
2
E
1
2
3
3
0
9
C
4
6
9
E
3
6
0
E
DF9
-
-
-
-
-
]
Gen
er
ated
Valu
e
o
f
E
:
[
D1
2
E
2
5
3
C
6
B
9
A
2
D1
C
4
DA
F
5
8
9
0
FB
3
D5
A
C
B
B
8
C
B
E
7
7
3
6
E
3
7
A
C
7
0
B
3
A
E
FEE
C
5
A
E
F2
B
2
A
C
2
4
8
4
C
9
E
7
6
9
AF1
D4
4
8
3
1
A
9
DDE
0
E
F2
E
7
6
7
2
6
9
FF
D0
7
F9
9
8
5
4
B
4
A
0
5
8
3
E
A
F4
4
5
7
B
7
9
0
7
B
2
F5
0
E
B
C
5
5
C
4
A
3
4
6
5
6
E
4
AA
6
2
1
9
0
4
7
7
E
C
E
F5
B
A
8
FF
8
C
D0
D0
1
DB
-
-
-
-
-
]
P
r
iv
ate
Ke
y
p
air
n
an
d
D
Gen
er
ated
Valu
e
o
f
N
:
[
2
C
C
A
4
7
C
6
6
7
2
AA
8
8
9
B
2
FB
B
6
7
F1
D7
1
B
6
C
4
8
8
4
A
8
C
B
7
B
0
E
B
B
D5
FF
E
B
5
2
5
0
7
C
8
3
DA
9
1
8
A
5
0
9
C
8
5
8
A
3
8
9
3
7
C
DC
6
8
DDB
5
5
C
2
0
FE7
F4
4
C
9
1
9
5
0
4
8
F5
E
0
0
4
4
7
DA
6
4
6
7
7
C
2
8
F2
4
FD8
0
6
9
3
8
9
D8
B
6
C
FC
6
6
7
3
4
D9
0
9
4
B
DC
1
6
4
F0
6
7
C
6
8
A
D7
4
7
0
FF
7
8
4
-
-
-
-
-
-
-
-
-
]
Gen
er
ated
Valu
e
o
f
D
:
[
1
A
9
A
8
F6
3
9
F9
7
7
6
D5
5
E
9
C
0
C
7
9
E
0
0
7
2
8
B
DE
8
0
4
E
7
A
9
C
5
1
3
6
1
3
E
1
C
5
1
9
7
FD5
1
9
E
7
8
A
0
3
0
7
1
9
A
6
7
0
5
4
3
9
2
3
5
9
7
D6
0
2
D
5
F1
A
9
F8
D
A
1
1
9
2
D4
9
1
A
7
3
B
6
8
D9
4
F4
7
F2
7
3
9
6
FD9
5
1
3
5
B
FD8
8
E
A
9
E
B
1
A
1
7
A1
1
D7
7
6
A
3
D4
7
1
D
5
F6
3
9
4
6
3
2
FA
1
0
0
B
A
7
D4
A
FE
8
8
3
A
3
-
-
-
-
-
]
P
lease
en
ter
m
es
s
ag
e
(
p
lai
n
te
x
t)
:
T
h
is
is
s
ec
r
et
in
f
o
r
m
a
tio
n
Gen
er
ated
C
ip
h
er
te
x
t:
[
5
3
2
0
7
6
F9
0
4
6
8
DA
0
3
C
7
6
9
6
D3
5
7
2
1
0
A
2
DDB
3
5
4
4
4
D2
5
D7
6
4
A
1
D7
0
5
5
3
5
B
3
2
0
F2
5
0
2
9
DB
7
8
6
E
7
DF8
1
1
4
C
4
C
4
D8
7
7
A
2
7
1
3
1
8
D4
1
8
2
3
AA
1
B
7
6
4
7
DA
C
B
1
E
2
A
9
B
9
A
8
6
6
F
9
5
1
F7
4
0
0
5
6
7
3
2
D7
5
8
DF1
7
7
F
A
4
1
B
2
8
0
D3
7
6
4
B
F6
D5
B
3
2
0
2
2
4
2
2
1
0
A
9
B
F1
E
6
6
7
-
-
-
-
-
-
-
]
E
x
ec
u
t
io
n
ti
m
e
f
o
r
en
cr
y
p
tio
n
in
m
illi
s
ec
o
n
d
s
: 3
0
8
7
.
0
0
7
8
Gen
er
ated
C
ip
h
er
te
x
t1
:
[
1
FAA
5
2
C
C
6
4
E
4
A
8
5
AA
9
C
D0
8
3
C
1
1
1
6
B
C
9
B
F0
7
D
9
0
A
8
FD1
9
A
7
C
1
2
C
8
C
7
FB
E
A
0
E
9
7
6
F7
8
8
D5
B
A
5
3
2
F2
0
4
6
D6
D8
7
3
E
8
0
3
1
6
7
2
A
8
A
1
A
8
B
0
2
7
7
2
A
B
7
F1
2
6
7
9
A
6
4
7
E
1
2
8
8
4
1
7
C
F4
5
B
9
E
4
A
E
6
A
E
6
5
D
8
DB
4
9
B
6
A
6
E
3
A
3
C
7
7
E
2
B
0
7
B
7
1
4
E
8
B
E
2
C
5
6
C
7
A
F5
-
-
-
-
-
]
E
x
ec
u
t
io
n
ti
m
e
f
o
r
d
ec
r
y
p
tio
n
in
m
illi
s
ec
o
n
d
s
: 3
0
8
7
.
0
0
7
8
R
ec
o
v
er
ed
p
lain
te
x
t: [
T
h
is
is
s
ec
r
et
in
f
o
r
m
atio
n
]
Fig
u
r
e
2
s
h
o
w
ti
m
e
c
o
n
s
u
m
p
t
io
n
f
o
r
d
if
f
er
en
t
k
e
y
s
izes
b
y
k
e
y
g
en
er
atio
n
u
s
in
g
R
S
A
an
d
MD
R
S
A
A
l
g
o
r
ith
m
.
Fig
u
r
e
2
.
T
im
e
c
o
n
s
u
m
p
tio
n
f
o
r
d
if
f
er
en
t
k
e
y
s
izes b
y
k
e
y
g
en
er
atio
n
u
s
i
n
g
R
S
A
a
n
d
MD
R
S
A
A
l
g
o
r
ith
m
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
ng
I
SS
N:
2088
-
8708
A
n
efficien
t a
n
d
s
ec
u
r
e
d
a
ta
s
t
o
r
a
g
e
in
clo
u
d
co
m
p
u
tin
g
u
s
in
g
mo
d
i
fied
R
S
A
p
u
b
lic
.
..
(
Y.
K
ir
a
n
K
u
ma
r
)
535
T
h
e
R
S
A
a
n
d
Mo
d
if
ied
R
S
A
m
o
d
els
r
ep
r
esen
t
t
h
e
e
n
cr
y
p
t
io
n
an
d
d
ec
r
y
p
tio
n
ti
m
e
i
n
m
illi
s
ec
o
n
d
s
b
ased
o
n
k
e
y
s
izes
f
r
o
m
1
2
8
b
its
to
2
0
4
8
b
its
.
W
e
r
ec
o
m
m
en
d
ed
th
at
Mo
d
if
ied
R
S
A
w
i
t
h
k
e
y
s
ize
1
0
2
4
b
its
w
il
l
b
e
a
o
p
ti
m
ize
s
o
l
u
tio
n
w
h
ic
h
m
ak
e
b
alan
c
e
b
et
w
ee
n
s
p
ee
d
a
n
d
s
ec
u
r
it
y
f
r
o
m
t
h
e
r
ea
m
in
g
k
e
y
s
ize
v
alu
e
s
[1
5
,
1
6]
.
8.
P
E
RF
O
RM
ANCE E
VA
L
U
AT
I
O
N
T
h
e
p
r
o
p
o
s
ed
Mo
d
if
ied
R
S
A
(
MD
S
A
)
al
g
o
r
it
h
m
i
s
ex
a
m
i
n
ed
o
n
v
ar
y
in
g
b
it
s
ize
s
o
f
in
p
u
t.
P
er
f
o
r
m
a
n
ce
o
f
o
r
ig
in
a
l
R
S
A
alg
o
r
ith
m
b
y
R
i
v
est,
S
h
a
m
ir
,
an
d
A
d
le
m
a
n
[
17
,
18
]
a
r
e
s
h
o
w
n
i
n
T
ab
le
1
.
A
l
s
o
th
e
p
er
f
o
r
m
a
n
ce
o
f
Mo
d
if
ied
R
S
A
(
MD
S
A
)
s
ch
e
m
e
in
ter
m
s
o
f
en
cr
y
p
tio
n
ti
m
e
an
d
d
ec
r
y
p
tio
n
i
s
s
h
o
w
n
i
n
T
ab
le
2
.
C
o
m
p
ar
in
g
t
h
e
ab
o
v
e
tab
les,
it
ca
n
b
e
co
n
clu
d
ed
th
a
t
th
e
ti
m
e
o
f
k
e
y
g
e
n
er
atio
n
o
f
Mo
d
if
ied
R
S
A
(
MD
S
A
)
i
s
h
ig
h
er
t
h
an
t
h
at
o
f
R
S
A
.
T
h
e
h
i
g
h
er
k
e
y
g
e
n
er
atio
n
ti
m
e
o
f
Mo
d
if
ied
R
S
A
(
MD
S
A
)
ca
n
b
e
s
ee
n
as
an
ad
v
an
ta
g
e
b
y
th
e
f
ac
t
th
at
th
e
ti
m
e
to
b
r
ea
k
t
h
e
s
y
s
te
m
is
h
i
g
h
b
ec
au
s
e
o
f
th
e
e
x
tr
a
co
m
p
le
x
it
y
ad
d
ed
.
Fig
u
r
e
3
s
h
o
w
n
th
e
en
cr
y
p
t
io
n
ti
m
e
co
m
p
ar
i
s
o
n
b
et
w
ee
n
R
S
A
an
d
p
r
o
p
o
s
ed
Mo
d
if
ied
R
S
A
(
M
DS
A
)
s
ch
e
m
e
[
1
9
,
20
]
.
I
t
illu
s
tr
ates
t
h
at,
f
o
r
t
h
e
l
o
w
er
b
it
le
n
g
t
h
o
f
p
r
i
m
e
n
u
m
b
er
s
,
t
w
o
a
lg
o
r
it
h
m
s
co
n
s
u
m
e
t
h
e
al
m
o
s
t
id
en
tica
l
a
m
o
u
n
t
o
f
ti
m
e.
B
u
t
w
i
th
th
e
in
cr
ea
s
e
o
f
b
it
le
n
g
th
,
t
h
e
d
if
f
er
e
n
ce
b
et
w
ee
n
cu
r
v
e
s
r
is
es
r
ap
id
l
y
[
2
1
,
22]
.
T
ab
le
1
.
E
n
cr
y
p
tio
n
ti
m
e
co
m
p
ar
is
o
n
u
s
i
n
g
R
S
A
an
d
MD
R
S
A
Alg
o
r
it
h
m
s
T
ab
le
2
.
Dec
r
y
p
tio
n
ti
m
e
co
m
p
ar
is
o
n
u
s
i
n
g
R
S
A
an
d
MD
R
S
A
Alg
o
r
it
h
m
s
K
e
y
S
i
z
e
(
i
n
b
i
t
s)
En
c
r
y
p
t
i
o
n
t
i
me
i
n
ms (
R
S
A
)
En
c
r
y
p
t
i
o
n
t
i
me
i
n
ms (
M
D
R
S
A
)
1
2
8
0
.
1
9
0
.
6
8
2
5
6
0
.
3
6
1
.
4
8
5
1
2
0.
57
3
.
2
1
0
2
4
1
.
7
2
7
.
8
2
0
4
8
3
.
3
3
2
1
.
9
2
4
0
9
6
1
1
.
1
8
5
6
.
8
8
K
e
y
S
i
z
e
(
i
n
b
i
t
s)
De
c
r
y
p
t
i
o
n
t
i
me
i
n
ms (
R
S
A
)
De
c
r
y
p
t
i
o
n
t
i
me
i
n
ms (
M
D
R
S
A
)
1
2
8
0.
2
9
2
.
9
2
5
6
0.
98
1
4
.
2
8
5
1
2
5
.
3
8
7
.
9
6
1
0
2
4
2
6
.
1
9
4
4
6
.
3
4
2
0
4
8
1
3
0
.
8
4
2
4
7
2
.
7
2
4
0
9
6
1
1
1
6
.
2
6
19
9
8
3
.
3
8
Fig
u
r
e
3
.
E
n
cr
y
p
tio
n
a
n
d
d
ec
r
y
p
t
io
n
ti
m
e
co
m
p
ar
is
o
n
u
s
in
g
R
S
A
a
n
d
MD
R
S
A
Alg
o
r
it
h
m
s
b
ased
o
n
k
e
y
s
ize
Fig
u
r
e
3
illu
s
tr
ate
th
e
e
n
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
ti
m
e
c
o
m
p
ar
is
o
n
b
et
w
ee
n
R
S
A
a
n
d
p
r
o
p
o
s
ed
Mo
d
if
ied
R
S
A
(
MD
S
A
)
s
c
h
e
m
e.
W
e
r
ec
o
m
m
e
n
d
ed
th
at
Mo
d
if
ied
R
S
A
w
it
h
k
e
y
s
ize
1
0
2
4
b
its
w
il
l
b
e
a
o
p
ti
m
ize
s
o
lu
tio
n
w
h
ic
h
m
a
k
e
b
ala
n
ce
b
et
w
ee
n
s
p
ee
d
an
d
s
ec
u
r
it
y
f
r
o
m
t
h
e
r
ea
m
i
n
g
k
e
y
s
ize
v
alu
e
s
[
2
3
,
24]
.
W
ith
th
e
in
c
r
ea
s
e
o
f
b
it
len
g
t
h
,
th
e
d
i
f
f
er
en
ce
b
et
w
ee
n
c
u
r
v
e
s
elev
ate
s
r
ap
id
ly
at
k
e
y
s
ize
2
0
4
8
an
d
4
0
9
6
,
it
ca
n
b
e
ea
s
i
l
y
s
ee
n
th
a
t
e
n
cr
y
p
tio
n
a
n
d
d
ec
r
y
p
tio
n
ti
m
e
s
ar
e
h
i
g
h
er
t
h
an
R
S
A
.
T
h
e
i
n
cr
ea
s
e
in
t
i
m
e
is
ad
ap
tab
le
b
ec
au
s
e
it
in
cr
ea
s
e
s
t
h
e
s
ec
u
r
i
t
y
to
a
g
r
e
at
ex
te
n
t
in
t
h
e
p
r
o
p
o
s
ed
Mo
d
i
f
ied
R
S
A
(
M
R
S
A
)
m
et
h
o
d
[
2
5
]
.
9.
CO
NCLU
SI
O
N
T
h
is
m
a
n
u
s
cr
ip
t
h
as
p
r
o
p
o
s
ed
a
s
tr
u
c
tu
r
e
to
p
r
o
v
id
e
co
n
f
id
en
tialit
y
p
r
o
tectio
n
to
th
e
d
at
a
s
to
r
ed
in
clo
u
d
en
v
ir
o
n
m
e
n
t.
T
h
e
m
o
d
if
ied
R
S
A
s
ch
e
m
e
u
s
ed
to
p
r
o
t
ec
t
th
e
d
ata
in
s
u
ch
a
w
a
y
th
a
t
n
o
r
ev
ea
l
o
f
d
ata
o
n
clo
u
d
.
T
h
u
s
,
i
n
o
u
r
p
r
o
j
ec
ted
w
o
r
k
,
o
n
l
y
th
e
ap
p
r
o
v
ed
u
s
er
ca
n
ac
ce
s
s
t
h
e
d
ata
u
s
i
n
g
t
h
e
p
r
iv
a
te
k
e
y
ca
n
b
e
co
r
r
ec
tly
d
ec
r
y
p
ted
.
I
f
s
o
m
e
u
n
a
u
th
o
r
ized
u
s
er
s
g
et
s
th
e
d
ata
b
y
ch
a
n
ce
o
r
in
ten
tio
n
all
y
i
f
h
e/s
h
e
ca
p
tu
r
es
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2088
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
10
,
No
.
1
,
Feb
r
u
ar
y
2
0
2
0
:
530
-
537
536
th
e
d
ata
also
,
h
e/s
h
e
ca
n
’
t
d
ec
r
y
p
t
it
a
n
d
g
et
b
ac
k
t
h
e
o
r
ig
in
al
d
ata
f
r
o
m
i
t.
W
ith
th
e
h
elp
o
f
th
i
s
n
e
w
s
ec
u
r
it
y
m
o
d
el
w
h
ich
is
m
o
d
if
ied
R
S
A
P
u
b
lic
Ke
y
C
r
y
p
to
s
y
s
te
m
,
w
e
ca
n
i
m
p
r
o
v
e
t
h
e
s
ec
u
r
it
y
f
la
w
o
f
e
x
is
tin
g
d
ata
s
ec
u
r
it
y
m
o
d
el
i
n
clo
u
d
e
n
v
ir
o
n
m
en
t
a
n
d
th
er
eb
y
g
u
ar
an
tee
t
h
e
d
ata
s
ec
u
r
it
y
in
clo
u
d
en
v
ir
o
n
m
e
n
t.
I
n
th
i
s
m
o
d
i
f
ied
R
S
A
al
g
o
r
ith
m
v
er
i
f
icatio
n
is
m
o
r
e
s
ec
u
r
e
t
h
an
R
S
A
al
g
o
r
ith
m
.
RE
F
E
R
E
NC
E
S
[1
]
S
o
sin
sk
y
,
“
Un
d
e
rsta
n
d
in
g
Cl
o
u
d
S
e
c
u
rit
y
,
”
Clo
u
d
C
o
m
p
u
ti
n
g
Bib
l
e
S
o
sin
sk
y
/Cl
o
u
d
,
2
0
1
1
.
[2
]
B.
A
.
F
o
ro
u
z
a
n
,
“
Cry
p
to
g
ra
p
h
y
a
n
d
Ne
tw
o
rk
S
e
c
u
rit
y
,”
Tata
M
c
Gra
w
Hill
Ed
u
c
a
ti
o
n
P
riv
a
te
L
i
m
it
e
d
,
Ne
w
Yo
rk
,
2
0
1
0
.
[3
]
M
.
B
.
M
o
ll
a
h
,
e
t
a
l
.,
“
Ne
x
t
g
e
n
e
ra
ti
o
n
o
f
c
o
m
p
u
ti
n
g
th
ro
u
g
h
c
lo
u
d
c
o
m
p
u
ti
n
g
tec
h
n
o
lo
g
y
,
”
2012
25
t
h
IEE
E
Ca
n
a
d
i
a
n
C
o
n
fer
e
n
c
e
o
n
El
e
c
tric
a
l
a
n
d
Co
mp
u
ter
E
n
g
i
n
e
e
rin
g
(
CCECE
)
,
2
0
1
2
.
[4
]
T
h
o
m
a
s E
.
,
“
Clo
u
d
C
o
m
p
u
ti
n
g
,
C
o
n
c
e
p
ts,
T
e
c
h
n
o
lo
g
y
&
A
r
c
h
it
e
c
t
u
re
,
”
P
e
a
rso
n
P
u
b
li
c
a
ti
o
n
,
2
0
1
4
.
[5
]
M
.
A
.
Isla
m
,
e
t
a
l
.,
“
A
M
o
d
if
ied
a
n
d
S
e
c
u
re
d
RS
A
P
u
b
l
ic
Ke
y
Cr
y
p
to
s
y
s
te
m
Ba
s
e
d
o
n
“
n
”
P
rim
e
Nu
m
b
e
rs,”
J
o
u
rn
a
l
o
f
Co
m
p
u
ter
a
n
d
C
o
mm
u
n
ica
ti
o
n
s
,
2
0
1
8
.
[6
]
I.
G
.
Am
a
lare
th
in
a
m
a
n
d
H.
M
.
L
e
e
n
a
,
“
En
h
a
n
c
e
d
RS
A
A
lg
o
rit
h
m
w
it
h
V
a
ry
in
g
Ke
y
S
ize
s
f
o
r
Da
ta
S
e
c
u
rit
y
in
Clo
u
d
,
”
2
0
1
7
W
o
rld
Co
n
g
re
ss
o
n
Co
mp
u
ti
n
g
a
n
d
Co
m
m
u
n
ic
a
ti
o
n
T
e
c
h
n
o
lo
g
ies
(
W
CCCT
),
T
iru
c
h
irap
p
a
ll
i,
p
p
.
1
7
2
-
1
7
5
,
2
0
1
7
.
[7
]
Y
.
P
a
c
h
i
p
a
la,
e
t
a
l
.,
“
Da
ta
S
e
c
u
rit
y
in
Clo
u
d
u
si
n
g
RS
A
,
”
2
0
1
3
Fo
u
rt
h
I
n
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
Co
m
p
u
ti
ng
Co
mm
u
n
ica
ti
o
n
s a
n
d
Ne
two
rk
in
g
T
e
c
h
n
o
lo
g
ies
(
ICCCNT)
,
2
0
1
3
.
[8
]
P
.
G
a
r
g
a
n
d
V
.
S
h
a
rm
a
.
“
A
n
e
ff
i
c
ien
t
a
n
d
se
c
u
re
d
a
ta
sto
ra
g
e
in
M
o
b
i
le
Clo
u
d
Co
m
p
u
ti
n
g
th
ro
u
g
h
RS
A
a
n
d
Ha
sh
f
u
n
c
ti
o
n
,
”
I
n
ter
n
a
t
io
n
a
l
C
o
n
fer
e
n
c
e
o
n
Iss
u
e
s a
n
d
Ch
a
ll
e
n
g
e
s in
I
n
telli
g
e
n
t
C
o
mp
u
ti
n
g
T
e
c
h
n
i
q
u
e
s
(
ICICT
),
2
0
1
4
.
[9
]
A
.
V
.
N
.
Krish
n
a
,
“
Ch
a
p
ter
1
6
A
Ra
n
d
a
m
ize
d
Clo
u
d
L
ib
ra
ry
S
e
c
u
rit
y
En
v
iro
n
m
e
n
t,
”
IG
I
G
lo
b
a
l,
2
0
1
4
.
[1
0
]
R
.
Bisw
a
s,
e
t
a
l
., “
A
fa
st i
m
p
le
m
e
n
tatio
n
o
f
th
e
RS
A
a
lg
o
rit
h
m
u
sin
g
th
e
G
NU
M
P
li
b
ra
ry
,
”
IIIT
–
Ca
lcu
tt
a
.
[1
1
]
S
.
S
h
a
rm
a
,
“
RS
A
a
lg
o
rit
h
m
u
si
n
g
m
o
d
if
ied
su
b
se
t
su
m
c
r
y
p
to
s
y
st
e
m
,
”
Co
mp
u
ter
a
n
d
Co
mm
u
n
ica
ti
o
n
T
e
c
h
n
o
l
o
g
y
(
ICCCT
)
,
p
p
.
4
5
7
-
4
6
1
,
2
0
1
1
.
[1
2
]
A
.
M
o
u
sa
,
“
S
e
n
siti
v
it
y
o
f
C
h
a
n
g
in
g
th
e
RS
A
P
a
ra
m
e
t
e
rs
o
n
th
e
Co
m
p
lex
it
y
a
n
d
P
e
rf
o
r
m
a
n
c
e
o
f
th
e
A
lg
o
rit
h
m
,”
J
o
u
rn
a
l
o
f
A
p
p
li
e
d
S
c
ien
c
e
,
Asi
a
n
Ne
tw
o
rk
fo
r
S
c
ien
ti
fi
c
I
n
fo
rm
a
ti
o
n
,
v
o
l.
5
,
p
p
.
60
-
6
3
,
2
0
0
5
.
[1
3
]
M
.
A
.
Isla
m
,
e
t
a
l
.
,
“
A
M
o
d
if
ied
a
n
d
S
e
c
u
re
d
RS
A
P
u
b
l
ic
Ke
y
Cr
y
p
to
s
y
ste
m
Ba
s
e
d
o
n
“
n
”
P
rim
e
Nu
m
b
e
rs
,”
J
o
u
rn
a
l
o
f
Co
m
p
u
ter
a
n
d
C
o
mm
u
n
ica
ti
o
n
s,
v
o
l.
6,
pp.
78
-
90
,
2
0
1
8
.
[1
4
]
M.
T
h
a
n
g
a
v
e
l,
e
t
a
l
.
,
“
A
n
En
h
a
n
c
e
d
a
n
d
S
e
c
u
re
d
RS
A
Ke
y
G
e
n
e
ra
ti
o
n
S
c
h
e
m
e
(ES
RKG
S
),
”
J
o
u
rn
a
l
o
f
In
fo
rm
a
t
io
n
S
e
c
u
rity
a
n
d
A
p
p
l
ica
ti
o
n
s
,
2
0
1
5
.
[1
5
]
R.
S
.
Dh
a
k
a
r,
e
t
a
l
.,“
M
o
d
if
ied
RS
A
En
c
r
y
p
ti
o
n
A
lg
o
rit
h
m
(M
R
EA
),
”
2
0
1
2
S
e
c
o
n
d
I
n
ter
n
a
t
io
n
a
l
Co
n
fer
e
n
c
e
o
n
Ad
v
a
n
c
e
d
Co
mp
u
ti
n
g
C
o
mm
u
n
ica
ti
o
n
T
e
c
h
n
o
l
o
g
ies
,
Ro
h
t
a
k
,
p
p
.
4
2
6
-
4
2
9
,
2
0
1
2
.
[1
6
]
H.
M
.
S
u
n
,
e
t
a
l
.
,
“
Du
a
l
RS
A
a
n
d
Its
S
e
c
u
rit
y
A
n
a
l
y
sis
,”
IEE
E
T
ra
n
sa
c
ti
o
n
s
o
n
In
f
o
rm
a
ti
o
n
T
h
e
o
ry
,
v
o
l.
53,
pp.
2
9
2
2
-
2
9
3
3
,
2
0
0
7
.
[1
7
]
T
.
C.
S
e
g
a
r
a
n
d
R.
V
ij
a
y
a
ra
g
a
v
a
n
,
“
P
e
ll
’s
RS
A
Ke
y
Ge
n
e
r
a
ti
o
n
a
n
d
Its
S
e
c
u
rit
y
A
n
a
l
y
si
s,”
2
0
1
3
Fo
u
r
t
h
In
ter
n
a
t
io
n
a
l
C
o
n
fer
e
n
c
e
o
n
Co
mp
u
ti
n
g
,
Co
mm
u
n
ic
a
ti
o
n
s
a
n
d
Ne
two
rk
in
g
T
e
c
h
n
o
l
o
g
ies
(
ICCCNT)
,
T
iru
c
h
e
n
g
o
d
e
,
p
p
.
1
-
5
,
2
0
1
3
.
[1
8
]
M
.
J.
W
ien
e
r,
“
Cry
p
tan
a
l
y
sis
o
f
S
h
o
rt
RS
A
S
e
c
re
t
Ex
p
o
n
e
n
ts
,”
IE
EE
T
ra
n
sa
c
ti
o
n
s
o
n
In
fo
rm
a
t
io
n
T
h
e
o
ry
,
v
o
l
.
36
,
p
p
.
5
5
3
-
558
,
1
9
9
0
.
[1
9
]
A
.
H.
Al
-
Ha
m
a
m
i
a
n
d
I.
A
.
A
ld
a
rise
h
,
“
En
h
a
n
c
e
d
M
e
th
o
d
f
o
r
RS
A
Cr
y
p
to
s
y
st
e
m
A
lg
o
rit
h
m
,
”
2012
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
Ad
v
a
n
c
e
d
C
o
mp
u
t
e
r S
c
ien
c
e
Ap
p
l
ica
ti
o
n
s
a
n
d
T
e
c
h
n
o
l
o
g
ies
(
ACS
AT
),
p
p
.
4
0
2
-
4
0
8
,
2
0
1
2
.
[2
0
]
Y.
L
i,
e
t
a
l
.,“
De
sig
n
a
n
d
Im
p
le
m
e
n
tati
o
n
o
f
a
n
I
m
p
ro
v
e
d
RS
A
A
l
g
o
rit
h
m
,
”
201
0
I
n
ter
n
a
t
io
n
a
l
Co
n
fer
e
n
c
e
o
n
E
-
He
a
lt
h
Ne
two
rk
i
n
g
Di
g
it
a
l
Eco
sy
ste
ms
a
n
d
T
e
c
h
n
o
lo
g
ies
(
EDT
),
S
h
e
n
z
h
e
n
,
v
o
l.
1,
p
p
.
3
9
0
-
3
9
3
,
2
0
1
0
.
[2
1
]
A
.
Ch
h
a
b
ra
a
n
d
S
.
M
a
t
h
u
r,
“
M
o
d
if
ied
RS
A
A
lg
o
rit
h
m
:
A
S
e
c
u
re
A
p
p
ro
a
c
h
,”
2
0
1
1
I
n
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
Co
mp
u
t
a
ti
o
n
a
l
I
n
t
e
ll
i
g
e
n
c
e
a
n
d
C
o
mm
u
n
ic
a
ti
o
n
Ne
two
rk
s
,
G
w
a
li
o
r
,
p
p
.
5
4
5
-
5
4
8
,
2
0
1
1
.
[2
2
]
B.
S
w
a
m
i,
e
t
a
l
.,“
Du
a
l
M
o
d
u
l
u
s
RS
A
Ba
se
d
o
n
J
o
rd
a
n
-
to
t
ien
t
Fu
n
c
ti
o
n
,
Pro
c
e
d
i
a
T
e
c
h
n
o
lo
g
y
,
v
o
l.
24,
p
p
.
1
5
8
1
-
1
5
8
6
,
2
0
1
6
.
[2
3
]
R.
P
a
ti
d
a
r
a
n
d
R.
Bh
a
rti
y
a
,
“
M
o
d
if
ied
RS
A
Cr
y
p
to
s
y
ste
m
Ba
se
d
o
n
O
f
f
li
n
e
S
to
ra
g
e
a
n
d
P
rim
e
Nu
m
b
e
r,
”
2
0
1
3
IEE
E
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
Co
m
p
u
t
a
ti
o
n
a
l
In
te
ll
ig
e
n
c
e
a
n
d
Co
mp
u
ti
n
g
Res
e
a
rc
h
,
En
a
t
h
i,
pp.
1
-
6
,
2
0
1
3
.
[2
4
]
R.
L
.
Riv
e
st,
e
t
a
l
.
,
“
A
M
e
th
o
d
f
o
r
Ob
tai
n
in
g
Dig
it
a
l
S
ig
n
a
tu
re
s
a
n
d
P
u
b
li
c
-
k
e
y
Cr
y
p
to
sy
ste
m
s,”
C
o
mm
u
n
ic
a
ti
o
n
s
o
f
t
h
e
ACM
,
v
o
l.
2
1
,
p
p
.
1
2
0
-
1
2
6
,
1
9
7
8
.
[2
5
]
K.
G
o
v
in
d
a
,
e
t
a
l
.
,
“
Da
ta
S
e
c
u
rit
y
in
Clo
u
d
u
si
n
g
Blo
w
f
ish
A
l
g
o
rit
h
m
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
fo
r
S
c
ien
t
if
ic
Res
e
a
rc
h
&
De
v
e
lo
p
me
n
t
,
v
o
l.
2
,
2
0
1
4
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
ng
I
SS
N:
2088
-
8708
A
n
efficien
t a
n
d
s
ec
u
r
e
d
a
ta
s
t
o
r
a
g
e
in
clo
u
d
co
m
p
u
tin
g
u
s
in
g
mo
d
i
fied
R
S
A
p
u
b
lic
.
..
(
Y.
K
ir
a
n
K
u
ma
r
)
537
B
I
O
G
RAP
H
I
E
S
O
F
AUTH
O
RS
M
r
.
Y.K
ira
n
K
u
m
a
r
,
M
.
C.A,
(Ph
.
D
)
,
h
e
re
c
e
iv
e
d
h
is
M
a
st
e
r
o
f
Co
m
p
u
ter
A
p
p
li
c
a
ti
o
n
s
f
ro
m
S
ri
V
e
n
k
a
tes
ra
Un
iv
e
rsit
y
,
T
iru
p
a
ti
.
He
is
P
u
rsu
i
n
g
P
h
.
D
f
ro
m
Bh
a
ra
th
iar
Un
iv
e
rsit
y
,
Co
im
b
a
to
re
.
He
is
h
a
v
in
g
m
o
re
t
h
a
n
1
0
y
e
a
rs
o
f
te
a
c
h
in
g
e
x
p
e
rie
n
c
e
,
Cu
rre
n
tl
y
h
e
is
w
o
rk
in
g
a
s
a
A
ss
istan
t
P
ro
f
e
ss
o
r
in
th
e
d
e
p
a
rtm
e
n
t
o
f
M
.
C.
A
in
S
re
e
V
id
y
a
n
ik
e
th
a
n
En
g
in
e
e
rin
g
Co
ll
e
g
e
,
Aff
il
iate
d
b
y
JN
T
U
A
,
A
n
a
n
th
a
p
u
ra
m
u
,
In
d
ia.
His
a
re
a
s
o
f
re
se
a
rc
h
in
tere
sts
in
c
lu
d
e
W
e
b
T
e
c
h
n
o
lo
g
ies
,
S
e
rv
ice
Orie
n
ted
A
rc
h
it
e
c
tu
re
a
n
d
Cl
o
u
d
Co
m
p
u
ti
n
g
.
Dr
.
R.
M
a
h
a
m
m
a
d
S
h
a
fi,
M
.
C.
A,
M.
Te
c
h
,
Ph
.
D
He
re
c
e
iv
e
d
h
is
P
h
.
D
f
ro
m
Un
iv
e
rsit
y
o
f
A
ll
a
h
a
b
a
d
,
A
ll
a
h
a
b
a
d
.
He
is
h
a
v
in
g
m
o
re
th
a
n
2
0
y
e
a
r
s
o
f
tea
c
h
in
g
e
x
p
e
rien
c
e
.
His
a
re
a
s
o
f
re
se
a
rc
h
in
tere
sts
in
c
lu
d
e
S
o
f
twa
re
En
g
in
e
e
rin
g
,
S
o
f
twa
re
T
e
sti
n
g
a
n
d
Qu
a
li
ty
A
ss
u
ra
n
c
e
.
He
h
a
s
p
u
b
li
s
h
e
d
p
a
p
e
rs
in
re
fe
re
e
d
jo
u
rn
a
ls
a
n
d
c
o
n
f
e
re
n
c
e
p
ro
c
e
e
d
in
g
s
in
t
h
e
se
a
re
a
s.
He
h
a
s
b
e
e
n
in
v
o
lv
e
d
in
c
o
n
f
e
re
n
c
e
s
a
n
d
w
o
rk
sh
o
p
s
a
s
a
Co
m
m
i
tt
e
e
m
e
m
b
e
r,
o
rg
a
n
ize
r
a
n
d
S
e
ss
io
n
Ch
a
ir
.
Evaluation Warning : The document was created with Spire.PDF for Python.