I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
CE
)
Vo
l.
8
,
No
.
5
,
Octo
b
e
r
2
0
1
8
,
p
p
.
3
9
4
9
~
3
9
5
3
I
SS
N:
2088
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v
8
i
5
.
p
p
3
9
4
9
-
395
3
3949
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
co
r
e
.
co
m/
jo
u
r
n
a
ls
/in
d
ex
.
p
h
p
/
I
JE
C
E
Enha
nced RS
A C
ry
ptos
y
ste
m
b
a
sed o
n Multipli
city
o
f
Public
a
nd P
riv
a
te
K
ey
s
Ah
m
ed
E
s
k
a
nd
er
M
ez
her
De
p
a
rtme
n
t
o
f
I
n
f
o
rm
a
ti
c
s
S
y
ste
m
s
M
a
n
a
g
e
m
e
n
t,
Bu
sin
e
ss
e
s In
f
o
rm
a
ti
c
s Co
ll
e
g
e
,
Un
iv
e
rsit
y
o
f
In
f
o
r
m
a
ti
o
n
T
e
c
h
n
o
l
o
g
y
a
n
d
Co
m
m
u
n
ica
ti
o
n
s,
Ba
g
h
d
a
d
,
Ira
q
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Oct
20
,
2
0
1
7
R
ev
i
s
ed
J
an
2
0
,
2
0
1
8
A
cc
ep
ted
J
u
l
7
,
2
0
1
8
S
e
c
u
rit
y
is
o
n
e
o
f
th
e
m
o
st
im
p
o
rtan
t
c
o
n
c
e
rn
t
o
t
h
e
in
f
o
rm
a
ti
o
n
a
n
d
d
a
ta
sh
a
rin
g
f
o
r
c
o
m
p
a
n
ies
,
b
a
n
k
s,
o
r
g
a
n
iza
ti
o
n
s
a
n
d
g
o
v
e
rn
m
e
n
t
f
a
c
il
it
ies
.
RS
A
is
a
p
u
b
li
c
c
ry
p
to
g
ra
p
h
ic
a
lg
o
rit
h
m
th
a
t
is
d
e
sig
n
e
d
sp
e
c
i
f
ica
ll
y
f
o
r
a
u
th
e
n
ti
c
a
ti
o
n
a
n
d
d
a
ta
e
n
c
ry
p
ti
o
n
.
On
e
o
f
th
e
m
o
st
p
o
we
r
f
u
l
re
a
s
o
n
s
m
a
k
e
s
RS
A
m
o
r
e
se
c
u
re
is
th
a
t
th
e
a
v
o
i
d
a
n
c
e
o
f
k
e
y
e
x
c
h
a
n
g
e
in
th
e
e
n
c
r
y
p
ti
o
n
a
n
d
d
e
c
r
y
p
ti
o
n
p
r
o
c
e
ss
e
s.
S
tan
d
a
rd
RS
A
a
lg
o
rit
h
m
d
e
p
e
n
d
s
o
n
th
e
k
e
y
len
g
th
o
n
ly
to
p
ro
tec
t
sy
ste
m
s.
Ho
we
v
e
r,
RS
A
k
e
y
is
b
ro
k
e
n
f
ro
m
ti
m
e
to
a
n
o
th
e
r
d
u
e
to
t
h
e
d
e
v
e
lo
p
m
e
n
t
o
f
c
o
m
p
u
ters
h
a
rd
w
a
r
e
su
c
h
a
s h
ig
h
sp
e
e
d
p
ro
c
e
ss
o
rs
a
n
d
a
d
v
a
n
c
e
d
tec
h
n
o
lo
g
y
.
RS
A
d
e
v
e
lo
p
e
rs
h
a
v
e
in
c
re
a
se
d
a
k
e
y
len
g
th
o
r
siz
e
o
f
a
k
e
y
p
e
rio
d
ica
ll
y
to
m
a
i
n
tain
a
h
ig
h
se
c
u
rit
y
a
n
d
p
riv
a
c
y
to
sy
ste
m
s
th
a
t
a
re
p
ro
tec
ted
b
y
th
e
RS
A
.
In
th
is
p
a
p
e
r,
a
m
e
th
o
d
h
a
s
b
e
e
n
d
e
sig
n
e
d
a
n
d
im
p
le
m
e
n
ted
to
stre
n
g
th
e
n
th
e
R
S
A
a
lg
o
rit
h
m
b
y
u
sin
g
m
u
lt
ip
le
p
u
b
li
c
a
n
d
p
riv
a
te
k
e
y
s.
T
h
e
re
f
o
re
,
in
th
is
m
e
th
o
d
th
e
se
c
u
rit
y
o
f
RS
A
n
o
t
o
n
l
y
d
e
p
e
n
d
s
o
n
t
h
e
k
e
y
si
z
e
,
b
u
t
a
lso
re
li
e
s o
n
th
e
m
u
lt
ip
li
c
it
y
o
f
p
u
b
li
c
a
n
d
p
riv
a
te k
e
y
s.
K
ey
w
o
r
d
:
C
o
m
p
u
ter
s
cien
ce
C
o
m
p
u
ter
s
ec
u
r
it
y
Data
s
ec
u
r
it
y
P
u
b
lic
cr
y
p
to
g
r
ap
h
y
R
S
A
al
g
o
r
ith
m
Co
p
y
rig
h
t
©
2
0
1
8
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts
re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Ah
m
ed
E
s
k
a
n
d
er
Me
zh
er
,
Dep
ar
t
m
en
t
o
f
I
n
f
o
r
m
atic
s
S
y
s
te
m
s
M
an
a
g
e
m
e
n
t
,
B
u
s
i
n
ess
e
s
I
n
f
o
r
m
atic
s
C
o
lle
g
e,
Un
i
v
er
s
it
y
o
f
I
n
f
o
r
m
at
io
n
T
ec
h
n
o
lo
g
y
a
n
d
C
o
m
m
u
n
icatio
n
s
,
B
ag
h
d
ad
,
I
r
aq
.
E
m
ail:
a
h
m
ed
.
m
ez
h
er
@
u
o
itc.
ed
u
.
iq
1.
I
NT
RO
D
UCT
I
O
N
E
n
cr
y
p
tio
n
i
s
t
h
e
w
a
y
o
f
tr
an
s
f
o
r
m
in
g
a
m
es
s
ag
e
to
a
n
o
th
e
r
f
o
r
m
th
a
t
is
co
m
p
le
tel
y
d
i
f
f
er
en
t
f
r
o
m
its
o
r
ig
in
a
l
o
n
e
an
d
it
is
d
if
f
ic
u
lt
to
r
ea
d
b
y
an
in
tr
u
d
er
.
T
h
is
en
ab
les
p
eo
p
le
to
s
ec
u
r
e
s
en
s
itiv
e
i
n
f
o
r
m
atio
n
to
b
e
s
en
t
o
v
er
th
e
n
et
w
o
r
k
.
T
h
er
e
ar
e
tw
o
m
ai
n
k
i
n
d
s
o
f
cr
y
p
to
g
r
ap
h
y
w
h
ic
h
ar
e
s
y
m
m
etr
ic
a
n
d
as
y
m
m
etr
ic.
I
n
s
y
m
m
etr
ic
cr
y
p
to
g
r
ap
h
y
,
th
e
k
e
y
u
s
ed
f
o
r
en
cr
y
p
tio
n
is
t
h
e
s
a
m
e
k
e
y
u
s
ed
f
o
r
d
ec
r
y
p
ti
o
n
p
r
o
ce
s
s
[
1
]
,
[
2
]
.
T
h
er
e
ar
e
m
a
n
y
w
ell
-
k
n
o
w
n
a
lg
o
r
ith
m
s
o
f
t
h
is
k
i
n
d
o
f
cr
y
p
t
o
g
r
ap
h
y
s
u
ch
as
DE
S,
A
E
S,
e
tc.
W
h
ile
th
e
o
th
er
k
in
d
o
f
cr
y
p
to
g
r
ap
h
y
i
s
as
y
m
m
etr
ic.
I
n
as
y
m
m
e
tr
ic
cr
y
p
to
g
r
ap
h
y
,
t
h
er
e
ar
e
t
w
o
k
e
y
s
wh
ich
ar
e
p
u
b
lic
k
e
y
an
d
p
r
iv
ate
k
e
y
,
o
n
e
f
o
r
en
cr
y
p
t
io
n
a
n
d
th
e
o
th
er
u
s
ed
f
o
r
d
ec
r
y
p
tio
n
[
3
]
.
T
h
e
last
t
y
p
e
o
f
cr
y
p
to
g
r
ap
h
y
i
s
co
n
s
id
er
ed
th
e
m
o
s
t
r
ev
o
l
u
tio
n
ar
y
c
h
a
n
g
e
i
n
t
h
e
cr
y
p
to
g
r
ap
h
y
s
cie
n
ce
[
4
]
,
[
5
]
.
R
S
A
is
co
n
s
id
er
ed
o
n
e
o
f
t
h
e
m
o
s
t e
f
f
ec
ti
v
e
al
g
o
r
ith
m
t
h
at
ca
n
b
e
u
s
ed
f
o
r
b
o
th
e
n
cr
y
p
tio
n
an
d
d
i
g
ital
s
i
g
n
at
u
r
e
[
6
]
-
[
8
]
.
T
h
e
s
tr
en
g
th
o
f
t
h
e
alg
o
r
ith
m
d
ep
en
d
s
o
n
t
h
e
f
ac
to
r
izatio
n
p
r
o
b
lem
.
T
h
e
f
ac
to
r
izatio
n
is
co
n
s
id
er
ed
a
s
c
h
all
en
g
i
n
g
p
r
o
b
le
m
to
m
at
h
e
m
a
ticia
n
s
f
o
r
m
a
n
y
d
ec
ad
es
b
ec
au
s
e
it
is
NP
co
m
p
le
te
p
r
o
b
lem
[
9
]
.
T
h
er
ef
o
r
e,
R
S
A
s
tr
en
g
t
h
co
m
e
s
f
r
o
m
th
e
p
r
ev
io
u
s
p
o
in
t.
I
n
ad
d
itio
n
,
th
e
alg
o
r
ith
m
is
w
ell
-
k
n
o
w
n
cr
y
p
to
g
r
ap
h
ic
alg
o
r
ith
m
th
at
is
in
v
en
ted
b
y
Sh
a
m
ir
a
n
d
A
d
el
m
a
n
i
n
1
9
7
7
[
1
0
]
.
I
n
th
e
R
S
A
al
g
o
r
it
h
m
,
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
ca
n
b
e
p
er
f
o
r
m
ed
b
y
u
s
i
n
g
t
w
o
k
e
y
s
,
o
n
e
o
f
t
h
e
m
i
s
p
u
b
lic
w
h
ile
th
e
o
t
h
er
o
n
e
i
s
p
r
iv
ate.
T
o
en
cr
y
p
t
a
m
e
s
s
a
g
e,
th
e
p
u
b
lic
k
e
y
i
s
u
s
ed
,
t
h
en
t
h
e
cip
h
er
tex
t
an
d
th
e
p
u
b
lic
k
e
y
ar
e
s
e
n
t
to
a
r
e
ce
iv
er
.
T
h
e
r
e
ce
iv
er
u
s
e
th
e
ir
o
w
n
p
r
iv
ate
k
e
y
to
d
ec
r
y
p
t
t
h
e
c
ip
h
er
te
x
t.
T
h
e
p
r
iv
ate
k
e
y
w
ill
n
o
t
s
e
n
d
o
v
er
a
n
et
w
o
r
k
d
u
r
i
n
g
t
h
e
s
e
n
d
i
n
g
p
r
o
ce
s
s
,
an
d
t
h
is
is
h
o
w
p
u
b
lic
cr
y
p
to
g
r
ap
h
y
w
o
r
k
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
8
,
No
.
5
,
Octo
b
er
2
0
1
8
:
394
9
–
3
9
5
3
3950
1
.
1
.
E
ncry
ptio
n o
f
s
t
a
nd
a
rd
RSA
a.
T
h
e
alg
o
r
ith
m
u
s
e
s
t
w
o
p
r
i
m
e
n
u
m
b
er
s
X
a
n
d
Y.
b.
N=
X
*
Y.
c.
Fin
d
Ø
(
N)
,
w
h
ic
h
is
(
X
-
1
)
(
Y
-
1
)
.
d.
Fin
d
K,
w
h
ich
i
s
GC
D
(
K,
Ø
(
N)
=1
.
(
K
is
th
e
p
u
b
lic
k
e
y
)
e.
C
=M
K
m
o
d
N
1
.
2
.
Dec
ry
ptio
n o
f
s
t
a
nd
a
rd
RSA
a.
Fin
d
D,
w
h
ich
i
s
D
*
K
m
o
d
Ø
(
N)
=1
.
b.
M= C
D
m
o
d
N.
W
h
er
e:
M
is
th
e
p
lai
n
tex
t o
r
th
e
o
r
ig
i
n
al
m
e
s
s
a
g
e.
C
is
t
h
e
cip
h
er
tex
t o
r
s
ec
r
et
m
ess
a
g
e.
Stan
d
ar
d
R
S
A
al
g
o
r
ith
m
was
d
esi
g
n
ed
b
y
A
d
le
m
a
n
a
n
d
S
h
a
m
ir
i
n
1
9
7
7
.
T
h
e
alg
o
r
ith
m
i
s
co
n
s
id
er
ed
th
e
f
ir
s
t
p
u
b
lic
cr
y
p
to
g
r
ap
h
ic
s
y
s
te
m
[
1
1
]
.
R
iv
ek
an
d
Pra
v
ee
n
p
r
o
p
o
s
ed
a
m
et
h
o
d
to
en
h
an
ce
th
e
s
ec
u
r
it
y
o
f
R
S
A
.
T
h
e
m
et
h
o
d
s
tated
th
at
u
s
in
g
t
h
r
ee
p
r
im
e
n
u
m
b
er
s
in
s
tead
o
f
t
w
o
w
o
u
ld
in
cr
ea
s
e
t
h
e
s
ec
u
r
it
y
o
f
R
S
A
.
T
h
er
ef
o
r
e,
N
is
th
e
co
m
p
o
s
ite
n
u
m
b
er
o
f
m
u
ltip
le
th
r
ee
p
r
i
m
e
n
u
m
b
er
s
P
,
Q
an
d
R
.
T
h
e
y
in
cr
ea
s
ed
t
h
e
s
tr
en
g
t
h
o
f
R
S
A
b
y
u
s
i
n
g
t
h
ir
d
p
r
i
m
e
n
u
m
b
er
[
1
2
]
.
P
atid
ar
an
d
B
ah
r
it
y
a
p
r
o
p
o
s
ed
a
m
et
h
o
d
to
in
cr
ea
s
e
t
h
e
s
p
ee
d
o
f
R
S
A
e
n
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
b
ec
au
s
e
m
at
h
e
m
atica
l
o
p
er
atio
n
s
i
n
th
e
R
S
A
alg
o
r
it
h
m
tak
e
to
o
m
u
c
h
s
i
g
n
if
ican
t
ti
m
e.
T
h
eir
m
et
h
o
d
d
ep
en
d
s
o
n
o
f
f
li
n
e
s
to
r
ag
e
an
d
th
r
ee
p
r
i
m
e
n
u
m
b
er
s
.
A
ll
p
ar
am
eter
s
o
f
R
S
A
s
u
c
h
a
s
N
,
Ø
(
N)
,
P
u
b
lic
k
e
y
(
E
)
,
an
d
p
r
iv
ate
k
e
y
(
D)
ar
e
s
to
r
ed
in
a
tab
le.
All
p
r
ev
io
u
s
v
alu
e
s
o
f
R
S
A
ar
e
s
to
r
ed
in
a
b
ig
d
atab
ase
b
ef
o
r
e
th
e
estab
lis
h
m
e
n
t
o
f
R
S
A
p
r
o
ce
s
s
[
1
3
]
.
Mila
B
ah
ad
o
r
i,
Mo
h
a
m
m
ed
R
ez
a,
O
m
id
Sar
b
is
h
ei,
Mo
j
tab
a
A
tar
o
d
i
an
d
Mo
h
a
m
m
ed
S
h
ar
i
f
i
m
p
le
m
en
ted
a
m
e
th
o
d
to
in
cr
ea
s
e
t
h
e
s
p
ee
d
o
f
p
u
b
lic
k
e
y
a
n
d
p
r
iv
ate
k
e
y
g
e
n
er
ati
o
n
.
A
m
e
th
o
d
w
as
b
ased
o
n
u
s
i
n
g
a
s
m
ar
t
ca
r
d
w
h
ic
h
co
n
tain
ed
m
i
n
i
p
r
o
ce
s
s
o
r
an
d
r
an
d
o
m
n
u
m
b
er
g
e
n
er
ato
r
.
T
h
e
s
m
ar
t
ca
r
d
ca
lc
u
lated
p
u
b
lic
a
n
d
p
r
iv
ate
k
e
y
s
b
ef
o
r
e
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
e
s
estab
lis
h
m
e
n
t
[
1
4
]
.
Yi
-
S
h
i
u
n
g
Ye
h
an
d
C
h
ia
-
Yao
ch
e
n
i
m
p
le
m
en
ted
a
m
et
h
o
d
to
r
e
d
u
ce
ti
m
e
co
n
s
u
m
p
tio
n
o
f
R
S
A
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
s
in
ce
t
h
e
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
tak
es
m
o
r
e
co
m
p
u
tatio
n
s
t
h
an
t
h
e
en
cr
y
p
tio
n
p
r
o
ce
s
s
.
T
h
e
m
eth
o
d
i
n
cr
ea
s
ed
t
h
e
s
p
ee
d
o
f
tr
ad
iti
o
n
al
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
t
h
r
ee
ti
m
e
s
f
as
ter
th
a
n
th
e
tr
ad
itio
n
al
d
e
cr
y
p
tio
n
alg
o
r
it
h
m
b
ased
o
n
C
h
i
n
e
s
e
R
e
m
ain
d
er
T
h
eo
r
em
o
n
l
y
[
1
5
]
.
2.
NE
W
P
RO
P
O
S
E
D
AL
G
O
R
I
T
H
M
I
n
t
h
is
p
ap
er
,
w
e
h
a
v
e
p
r
o
p
o
s
ed
n
e
w
R
S
A
al
g
o
r
ith
m
u
s
in
g
m
u
ltip
le
p
u
b
lic
k
e
y
s
a
n
d
m
u
lt
ip
le
p
r
iv
ate
k
e
y
s
.
T
h
e
alg
o
r
ith
m
is
s
u
m
m
a
r
ized
as f
o
llo
w
s
:
a.
C
h
o
o
s
e
t
w
o
p
r
i
m
e
n
u
m
b
er
s
R
1
an
d
R
2
.
b.
N=
R
1
*
R
2
.
c.
Fin
d
Ø
(
N)
=Ø
(
R
1
)
*
Ø
(
R
2
)
.
Sin
ce
R
1
a
n
d
R
2
ar
e
p
r
i
m
e
n
u
m
b
er
s
,
s
o
Ø
(
R
1
)
=
(
R1
-
1
)
a
n
d
Ø
(
R
2
)
=
(
R2
-
1
)
.
d.
C
h
o
o
s
e
a
s
er
ie
s
o
f
p
u
b
lic
k
e
y
s
,
n
o
t
j
u
s
t
o
n
e
p
u
b
lic
k
e
y
as
i
n
t
h
e
s
ta
n
d
ar
d
R
S
A
s
u
c
h
as
E
1
,
E
2
,
an
d
E
3
…
E
m
.
W
h
er
e
E
is
a
p
u
b
lic
k
e
y
an
d
m
is
t
h
e
n
u
m
b
er
o
f
p
u
b
li
c
k
e
y
s
th
at
i
s
u
s
ed
to
en
cr
y
p
t
a
m
e
s
s
a
g
e.
A
ll
p
u
b
lic
k
e
y
s
E
1
,
E
2
,
E
3
…
E
m
ar
e
r
elativ
el
y
p
r
i
m
e
to
Ø
(
N)
.
T
h
at
m
ea
n
s
th
er
e
ar
e
n
o
f
ac
t
o
r
s
b
etw
ee
n
t
h
e
ab
o
v
e
p
u
b
l
ic
k
e
y
s
an
d
Ø
(
N)
.
T
h
is
s
tep
is
s
o
i
m
p
o
r
tan
t
in
o
r
d
er
to
m
ak
e
s
u
r
e
ea
ch
p
u
b
lic
k
e
y
h
a
s
a
n
in
v
er
s
e
n
u
m
b
er
(
i.e
.
P
r
iv
ate
Ke
y
)
w
h
ic
h
w
il
l
b
e
u
s
ed
lat
er
in
t
h
e
d
ec
r
y
p
t
io
n
p
r
o
ce
s
s
to
d
ec
r
y
p
t
t
h
e
m
es
s
ag
e.
e.
C
alcu
lates
m
u
ltip
le
s
ec
r
et
k
e
y
s
D1
,
D2
,
D3
…D
m
.
W
h
er
e
D
is
an
in
v
er
s
e
o
f
E
an
d
m
i
s
th
e
n
u
m
b
er
o
f
p
r
iv
ate
k
e
y
s
.
W
e
d
em
o
n
s
tr
ated
th
e
ab
o
v
e
s
tep
s
as
a
f
lo
w
c
h
ar
t
in
Fig
u
r
e
1
.
I
n
th
e
en
cr
y
p
tio
n
p
r
o
ce
s
s
,
a
m
es
s
ag
e
w
o
u
ld
b
e
en
cr
y
p
ted
s
ev
er
al
t
i
m
es
u
s
in
g
m
u
ltip
le
d
i
f
f
er
en
t
p
u
b
lic
k
e
y
s
in
o
u
r
s
u
g
g
e
s
ted
i
m
p
r
o
v
e
m
en
t
to
th
e
R
S
A
al
g
o
r
it
h
m
.
Ho
w
m
a
n
y
ti
m
e
s
t
h
e
m
ess
a
g
e
s
h
o
u
ld
b
e
en
cr
y
p
ted
p
r
ec
is
el
y
?
T
h
e
m
es
s
ag
e
w
o
u
ld
b
e
en
cr
y
p
ted
b
y
u
s
i
n
g
all
p
o
s
s
ib
le
p
u
b
lic
k
e
y
s
o
r
s
o
m
e
o
f
th
e
m
.
W
e
k
n
o
w
t
h
at
t
h
e
p
u
b
lic
k
e
y
E
is
an
y
n
u
m
b
er
th
at
h
as
n
o
f
ac
to
r
s
w
it
h
Ø
(
N)
.
T
h
u
s
,
in
o
u
r
s
u
g
g
e
s
ted
alg
o
r
ith
m
w
e
s
elec
ted
all
n
u
m
b
er
s
th
at
h
as
n
o
f
ac
to
r
s
w
it
h
Ø
(
N)
to
b
e
o
u
r
lis
t
o
f
p
u
b
lic
k
e
y
s
,
an
d
w
e
en
cr
y
p
ted
th
e
m
e
s
s
a
g
e
u
s
in
g
all
th
e
p
r
ev
io
u
s
p
u
b
lic
k
e
y
s
o
r
s
o
m
e
o
f
th
e
m
.
W
e
h
av
e
in
tr
o
d
u
ce
d
a
m
at
h
e
m
atica
l
f
o
r
m
u
la
to
co
u
n
t
th
e
n
u
m
b
er
o
f
en
cr
y
p
t
io
n
s
th
at
i
s
u
s
ed
i
n
o
u
r
s
u
g
g
ested
i
m
p
r
o
v
e
m
en
t
t
o
th
e
R
S
A
al
g
o
r
ith
m
.
(
Ø
(
Ø
(
N)
-
1
)
is
t
h
e
n
u
m
b
er
o
f
n
u
m
b
er
s
t
h
at
h
av
e
n
o
f
ac
to
r
s
w
i
th
Ø
(
N)
.
T
h
er
ef
o
r
e
,
(
Ø
(
Ø
(
N)
-
1
)
i
s
t
h
e
n
u
m
b
er
o
f
p
u
b
lic
k
e
y
s
t
h
at
w
o
u
ld
b
e
u
s
ed
to
e
n
cr
y
p
t
t
h
e
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8708
E
n
h
a
n
ce
d
R
S
A
C
r
yp
to
s
ystem
b
a
s
ed
o
n
Mu
ltip
licity
o
f P
u
b
li
c
a
n
d
P
r
iva
te
K
ey
s
(
A
h
med
E
s
ka
n
d
er Mezh
er)
3951
m
es
s
ag
e.
T
h
e
cr
y
p
to
g
r
ap
h
er
h
as
th
e
c
h
o
ice
to
ch
o
o
s
e
s
o
m
e
p
u
b
lic
k
e
y
s
f
r
o
m
th
e
ab
o
v
e
f
o
r
m
u
la
to
b
e
u
s
ed
i
n
th
e
en
cr
y
p
tio
n
p
r
o
ce
s
s
.
Fo
r
E
x
a
m
p
le:
N=
1
3
,
Ø
(
N)
=1
2
,
Ø
(
Ø
(
N)
-
1
)
=3
.
No
w
,
th
r
ee
n
u
m
b
er
s
o
n
l
y
i
n
a
s
et
o
f
1
2
q
u
alif
ied
to
b
e
th
e
p
u
b
lic
k
e
y
E
w
h
ic
h
ar
e
5
,
7
,
an
d
1
1
.
T
h
er
ef
o
r
e,
w
e
w
o
u
ld
u
s
e
th
o
s
e
n
u
m
b
er
s
to
en
cr
y
p
t
th
e
m
es
s
ag
e
th
r
ee
ti
m
e
s
u
s
i
n
g
th
r
ee
p
u
b
lic
k
e
y
s
5
,
7
,
an
d
1
1
.
I
n
th
e
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
,
w
e
s
h
o
u
ld
f
in
d
h
o
w
m
an
y
ti
m
e
s
to
en
cr
y
p
t
t
h
e
m
e
s
s
a
g
es
i
n
o
r
d
er
to
g
en
er
ate
p
r
i
v
ate
k
e
y
s
,
w
h
ic
h
is
eq
u
al
to
t
h
e
n
u
m
b
er
o
f
p
u
b
lic
k
e
y
s
t
h
at
is
u
s
ed
to
en
cr
y
p
t
t
h
e
m
e
s
s
a
g
e.
I
n
th
e
s
a
m
e
p
r
ev
io
u
s
e
x
a
m
p
le,
i
f
N=
1
3
t
h
e
n
(
Ø
(
Ø
(
N)
-
1
)
=
3
.
T
h
en
w
e
s
h
o
u
ld
f
i
n
d
th
r
ee
p
r
iv
ate
k
e
y
s
w
h
ic
h
ar
e
d
1
,
d
2
an
d
d
3
.
A
f
ter
th
at,
w
e
w
o
u
ld
u
s
e
th
e
p
r
iv
ate
k
e
y
s
to
d
ec
r
y
p
t t
h
e
m
es
s
ag
e
in
a
r
ev
er
s
e
o
r
d
er
.
T
h
er
ef
o
r
e,
o
u
r
i
m
p
r
o
v
e
m
e
n
t
to
th
e
a
lg
o
r
it
h
m
m
a
k
e
s
R
S
A
d
ep
en
d
s
n
o
t
o
n
l
y
o
n
t
h
e
k
e
y
le
n
g
t
h
to
d
ec
r
y
p
t
th
e
m
e
s
s
a
g
e,
b
u
t
also
d
ep
en
d
s
o
n
th
e
s
ev
er
al
p
u
b
lic
k
e
y
s
an
d
p
r
iv
ate
k
e
y
s
.
Fo
r
ex
a
m
p
le,
if
t
h
e
attac
k
er
b
y
s
o
m
e
w
a
y
k
n
e
w
th
e
t
w
o
p
r
im
e
n
u
m
b
er
s
o
f
th
e
co
m
p
o
s
ite
n
u
m
b
er
N,
th
e
n
h
e
co
u
ld
n
‟
t
d
ec
r
y
p
t
t
h
e
m
es
s
a
g
e
b
ec
au
s
e
th
e
m
ess
a
g
e
is
en
cr
y
p
ted
s
ev
er
al
ti
m
es
u
s
i
n
g
m
u
lti
p
le
p
u
b
lic
k
e
y
s
.
T
o
d
ec
r
y
p
t
t
h
e
m
e
s
s
a
g
e,
th
e
at
ta
ck
er
n
ee
d
s
to
f
in
d
all
p
r
iv
ate
k
e
y
s
n
o
t
j
u
s
t
o
n
e
p
r
iv
ate
k
e
y
as
i
n
th
e
s
ta
n
d
a
r
d
alg
o
r
ith
m
.
(
a
)
(
b
)
Fig
u
r
e
1
.
T
h
e
n
e
w
p
r
o
p
o
s
ed
R
S
A
alg
o
r
it
h
m
f
o
r
E
n
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
es
3.
RE
S
E
ARCH
AND
M
E
T
H
O
D
I
n
o
r
d
er
to
s
ee
th
e
ef
f
ec
ti
v
e
n
es
s
o
f
th
e
n
e
w
e
n
h
a
n
ce
d
al
g
o
r
ith
m
,
w
e
test
ed
t
h
e
p
o
w
e
r
f
u
l
o
f
th
e
alg
o
r
ith
m
ag
a
in
s
t
b
r
u
te
f
o
r
ce
attac
k
.
T
h
e
b
r
u
te
f
o
r
ce
is
co
n
s
id
er
ed
o
n
e
o
f
th
e
m
o
s
t
w
ell
-
k
n
o
w
n
attac
k
s
th
a
t
u
s
ed
b
y
h
ac
k
er
s
to
b
r
ea
k
s
ec
u
r
it
y
s
y
s
te
m
s
.
W
e
d
id
t
h
e
i
m
p
le
m
en
ta
tio
n
to
s
ee
w
h
ich
al
g
o
r
ith
m
ta
k
e
s
m
u
c
h
ti
m
e
to
b
r
ea
k
t
h
an
th
e
o
t
h
er
.
W
e
i
m
p
le
m
e
n
ted
t
h
e
b
r
u
te
f
o
r
ce
attac
k
in
C
++
to
at
tack
o
u
r
n
e
w
al
g
o
r
ith
m
an
d
th
e
s
ta
n
d
ar
d
R
S
A
alg
o
r
it
h
m
.
T
h
e
b
r
u
te
f
o
r
ce
attac
k
w
r
itte
n
in
C
++
to
f
ac
to
r
th
e
co
m
p
o
s
i
t
e
n
u
m
b
er
N
f
o
r
t
w
o
p
r
im
e
n
u
m
b
er
s
an
d
f
i
n
d
in
g
t
h
e
p
r
iv
ate
k
e
y
.
I
n
th
e
s
ta
n
d
ar
d
alg
o
r
ith
m
,
t
h
e
b
r
u
te
f
o
r
ce
atta
ck
w
ill
f
ac
to
r
N
an
d
o
n
e
p
r
iv
ate
k
e
y
o
n
l
y
t
h
en
e
v
en
tu
a
ll
y
ter
m
i
n
ated
.
W
h
ile
i
n
th
e
n
e
w
a
lg
o
r
it
h
m
,
t
h
e
b
r
u
te
f
o
r
ce
w
il
l
f
ac
to
r
N
an
d
f
i
n
d
i
n
g
s
e
v
er
al
p
r
iv
ate
k
e
y
s
.
B
ec
au
s
e
o
f
d
ata
is
en
cr
y
p
t
ed
s
ev
er
al
ti
m
e
s
u
s
i
n
g
s
e
v
er
al
p
u
b
lic
k
e
y
s
i
n
t
h
e
alg
o
r
ith
m
,
t
h
e
b
r
u
te
f
o
r
ce
atta
ck
w
ill d
ec
r
y
p
t t
h
e
m
e
s
s
a
g
e
s
e
v
er
al
ti
m
es i
n
o
r
d
er
to
g
et
th
e
o
r
ig
in
al
d
ata.
N
=
R
1
*
R
2
Ø
(
N
)
=
(
R
1
-
1
)
*
(
R
2
-
1)
C
h
o
o
se
a
se
r
i
e
s o
f
p
u
b
l
i
c
k
e
y
s (E)
:
g
e
n
e
r
a
t
e
E1
,
E
2
...
R2
R1
En
c
r
y
p
t
t
h
e
me
ssag
e
mu
l
t
i
p
l
e
t
i
me
s
C
i
p
h
e
r
T
e
x
t
C
1
=
M
e1
mo
d
N
C
2
=
M
e
2
mo
d
N
C
3
=
M
e3
mo
d
N
C
=
M
ek
mo
d
N
N
=
R
1
*
R
2
Ø
(
N
)
=
(
R
1
-
1
)
*
(
R
2
-
1)
F
i
n
d
a
se
r
i
e
s o
f
D
.
D
1
,
D
2
,
D
3
.
.
.
D
k
R2
R1
D
e
c
r
y
p
t
t
h
e
me
ssag
e
mu
l
t
i
p
l
e
t
i
me
s
P
l
a
i
n
T
e
x
t
M
1
=
C
dk
mo
d
N
M
2
=
C
dk
-
1
mo
d
N
M
3
=
C
dk
-
2
mo
d
N
M
=
C
d1
mo
d
N
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
8
,
No
.
5
,
Octo
b
er
2
0
1
8
:
394
9
–
3
9
5
3
3952
4.
RE
SU
L
T
S AN
D
D
I
SCU
SS
I
O
N
I
n
th
is
p
ap
er
,
w
e
in
ten
tio
n
all
y
attac
k
R
S
A
to
s
ee
t
h
e
p
o
w
er
f
u
l
o
f
o
u
r
al
g
o
r
ith
m
.
W
e
u
s
ed
b
r
u
te
f
o
r
ce
attac
k
to
attac
k
s
ta
n
d
ar
d
R
S
A
an
d
o
u
r
i
m
p
r
o
v
ed
R
S
A
u
s
in
g
d
if
f
er
en
t
k
e
y
s
ize
an
d
s
ize
o
f
N
to
s
ee
w
h
ic
h
i
s
s
tr
o
n
g
er
th
a
n
th
e
o
th
er
.
T
h
e
s
tr
en
g
t
h
o
f
R
S
A
d
ep
e
n
d
s
o
n
th
e
p
r
iv
ate
k
e
y
.
T
o
attac
k
R
S
A
,
w
e
n
ee
d
s
to
attac
k
th
e
p
r
iv
ate
k
e
y
.
T
h
er
ef
o
r
e,
in
o
u
r
r
esear
ch
,
w
e
attac
k
ed
a
tex
t
t
h
at
e
n
cr
y
p
ted
u
s
in
g
s
tan
d
ar
d
R
SA
a
n
d
th
e
i
m
p
r
o
v
ed
R
S
A
al
g
o
r
ith
m
.
T
h
e
r
esu
lt
s
o
f
attac
k
i
n
g
s
ta
n
d
ar
d
an
d
i
m
p
r
o
v
ed
R
S
A
alg
o
r
it
h
m
s
ar
e
s
h
o
w
ed
i
n
T
ab
le
1
,
T
a
b
le
2
an
d
Fi
g
u
r
e
2
r
esp
ec
tiv
el
y
.
Fro
m
t
h
e
r
es
u
lt
s
in
T
ab
le
1
an
d
T
ab
le
2
,
it
is
c
lear
l
y
o
b
v
io
u
s
t
h
at
o
u
r
i
m
p
r
o
v
ed
tech
n
iq
u
e
m
ak
e
s
R
S
A
s
tr
o
n
g
er
t
h
an
t
h
e
s
ta
n
d
ar
d
o
n
e.
W
h
en
th
e
s
ize
o
f
N
i
s
1
2
in
T
a
b
le
1
an
d
T
ab
le
2
th
at
m
ea
n
s
N
i
s
a
co
m
p
o
s
ite
n
u
m
b
er
co
n
s
is
t
s
o
f
1
2
d
ig
its
i
n
le
n
g
th
,
th
i
s
n
u
m
b
er
is
a
p
r
o
d
u
ct
o
f
o
n
l
y
t
w
o
p
r
i
m
e
n
u
m
b
er
s
.
I
n
th
e
s
ta
n
d
ar
d
R
S
A
al
g
o
r
ith
m
,
it
ta
k
es
ap
p
r
o
x
i
m
atel
y
3
9
m
illi
s
ec
o
n
d
s
to
b
r
ea
k
t
h
e
m
es
s
ag
e
w
h
il
e
th
e
i
m
p
r
o
v
ed
alg
o
r
it
h
m
tak
e
s
ap
p
r
o
x
im
a
tel
y
3
4
7
m
illi
s
ec
o
n
d
s
t
o
b
r
ea
k
th
e
m
e
s
s
a
g
e.
I
n
al
l
d
if
f
er
en
t
s
izes
o
f
N
(
N
is
t
h
e
le
n
g
th
o
f
p
r
i
v
ate
k
e
y
)
7
,
8
,
9
,
1
0
,
1
1
,
an
d
1
2
,
th
e
i
m
p
r
o
v
ed
R
S
A
is
s
lo
w
er
ap
p
r
o
x
i
m
atel
y
9
ti
m
es
th
an
th
e
s
tan
d
ar
d
R
S
A
w
h
e
n
b
r
u
te
f
o
r
ce
attac
k
i
s
u
s
ed
.
T
h
er
ef
o
r
e,
an
attac
k
er
n
ee
d
s
m
u
ch
ti
m
e
to
b
r
e
ak
a
s
y
s
te
m
w
h
en
th
e
n
e
w
al
g
o
r
ith
m
i
s
u
s
ed
.
I
n
th
e
s
ta
n
d
ar
d
R
S
A
a
lg
o
r
it
h
m
,
en
cr
y
p
t
io
n
a
n
d
d
ec
r
y
p
tio
n
i
s
d
o
n
e
b
y
u
s
i
n
g
o
n
e
p
u
b
lic
k
e
y
a
n
d
o
n
e
p
r
iv
ate
k
e
y
.
I
f
t
h
e
attac
k
er
b
y
s
o
m
e
w
a
y
o
r
u
s
i
n
g
a
p
r
o
g
r
a
m
w
i
th
h
i
g
h
s
p
ee
d
co
m
p
u
ter
f
ig
u
r
e
o
u
t
t
h
e
p
r
iv
at
e
k
e
y
,
t
h
e
s
y
s
te
m
w
o
u
ld
b
e
b
r
o
k
en
.
W
h
ile
in
o
u
r
n
e
w
al
g
o
r
ith
m
,
th
e
e
n
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
i
s
d
o
n
e
u
s
i
n
g
m
u
lt
i
p
u
b
lic
an
d
p
r
iv
ate
k
e
y
s
.
T
h
er
ef
o
r
e,
th
e
attac
k
er
n
ee
d
s
to
k
n
o
w
all
t
h
e
p
r
iv
ate
n
u
m
b
er
s
to
b
r
ea
k
t
h
e
s
y
s
te
m
.
T
h
e
r
es
u
lts
i
n
T
ab
le
2
ar
e
s
h
o
w
i
n
g
s
lo
w
n
es
s
to
b
r
ea
k
R
S
A
alg
o
r
it
h
m
w
h
ile
t
h
e
r
esu
l
ts
i
n
T
ab
le
1
a
r
e
s
h
o
w
in
g
s
p
ee
d
u
p
in
attac
k
in
g
t
h
e
s
ta
n
d
ar
d
R
S
A
alg
o
r
it
h
m
.
T
h
er
ef
o
r
e,
th
e
n
e
w
alg
o
r
it
h
m
h
ar
d
er
to
b
r
ea
k
th
a
n
th
e
s
tan
d
ar
d
alg
o
r
ith
m
.
V.
C
h
o
u
d
h
ar
y
a
n
d
N.
P
r
av
ee
n
i
m
p
r
o
v
ed
R
S
A
alg
o
r
ith
m
b
y
u
s
i
n
g
t
h
r
ee
p
r
i
m
e
n
u
m
b
er
s
w
h
ile
t
h
e
i
m
p
r
o
v
e
m
e
n
t
in
o
u
r
al
g
o
r
it
h
m
is
u
s
in
g
m
u
lti
p
u
b
lic
a
n
d
p
r
iv
ate
n
u
m
b
er
s
(
u
n
li
m
i
ted
n
u
m
b
er
)
i
n
o
r
d
er
to
b
e
h
ar
d
to
b
r
ea
k
[
1
2
]
.
T
ab
le
1
.
A
ttack
i
n
g
S
ta
n
d
ar
d
R
S
A
u
s
in
g
B
r
u
te
Fo
r
ce
S
i
z
e
o
f
N
T
i
me
t
o
b
r
e
a
k
R
S
A
i
n
mi
l
l
i
se
c
o
n
d
s
7
0
.
0
0
2
8
0
.
0
0
2
9
0
.
5
6
1
10
4
.
2
0
6
11
1
2
.
1
1
0
12
3
8
.
5
6
1
T
ab
le
2
.
A
ttack
i
n
g
th
e
I
m
p
r
o
v
ed
R
S
A
u
s
in
g
B
r
u
te
Fo
r
ce
S
i
z
e
o
f
N
T
i
me
t
o
b
r
e
a
k
R
S
A
i
n
mi
l
l
i
se
c
o
n
d
s
7
0
.
0
1
8
8
0
.
0
2
9
6
.
1
7
1
10
3
7
.
8
5
4
11
1
3
3
.
2
1
12
3
4
7
.
0
4
9
Fig
u
r
e
2
.
C
o
m
p
ar
is
o
n
b
et
w
ee
n
Sta
n
d
ar
d
R
S
A
an
d
i
m
p
r
o
v
ed
R
S
A
5.
CO
NCLU
SI
O
N
E
n
cr
y
p
tio
n
is
th
e
w
a
y
o
f
m
a
k
in
g
d
ata
s
ec
u
r
e
a
g
ain
s
t
d
i
f
f
er
en
t
k
i
n
d
s
o
f
attac
k
s
a
n
d
h
ac
k
er
s
.
On
e
o
f
th
e
m
o
s
t
e
f
f
ec
ti
v
e
p
u
b
lic
cr
y
p
to
g
r
ap
h
ic
alg
o
r
it
h
m
s
is
R
S
A
.
Si
n
ce
R
S
A
d
esi
g
n
ed
,
th
er
e
ar
e
m
a
n
y
d
ev
elo
p
m
en
t
s
to
th
e
al
g
o
r
ith
m
b
ec
au
s
e
o
f
t
h
e
ad
v
an
ce
s
i
n
th
e
co
m
p
u
ter
s
an
d
tec
h
n
o
lo
g
y
.
T
h
e
alg
o
r
ith
m
is
b
r
o
k
en
s
e
v
er
al
ti
m
e
s
.
R
S
A
l
ab
o
r
ato
r
ies
in
cr
ea
s
e
t
h
e
s
ec
u
r
it
y
s
tr
en
g
t
h
o
f
R
S
A
b
y
c
h
a
n
g
i
n
g
t
h
e
len
g
t
h
o
f
p
r
iv
ate
k
e
y
f
r
o
m
ti
m
e
to
an
o
t
h
er
.
R
iv
e
k
an
d
P
r
av
e
en
en
h
a
n
ce
d
th
e
alg
o
r
ith
m
b
y
u
s
i
n
g
th
r
ee
p
r
im
e
n
u
m
b
er
s
in
s
tead
o
f
t
w
o
a
s
i
n
t
h
e
o
r
ig
i
n
al
alg
o
r
ith
m
.
P
atid
ar
an
d
B
ah
r
it
y
a
i
m
p
r
o
v
ed
th
e
s
p
ee
d
o
f
th
e
alg
o
r
ith
m
b
y
u
s
in
g
o
f
f
li
n
e
s
to
r
ag
e.
I
n
t
h
e
s
ta
n
d
a
r
d
R
S
A
,
o
n
e
p
u
b
lic
k
e
y
,
o
n
e
p
r
iv
ate
k
e
y
a
n
d
N
(
C
o
m
p
o
s
ite
n
u
m
b
er
o
f
t
w
o
p
r
im
e
s
)
ar
e
th
e
b
asic
ele
m
en
t
s
th
at
ar
e
u
s
ed
in
t
h
e
en
cr
y
p
t
io
n
an
d
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
es.
I
n
th
is
p
ap
er
,
w
e
s
u
g
g
e
s
ted
a
n
i
m
p
r
o
v
e
m
e
n
t
to
th
e
o
r
ig
i
n
al
a
lg
o
r
it
h
m
to
m
a
k
e
it
h
ar
d
er
to
b
r
ea
k
b
y
u
s
in
g
s
ev
er
al
p
u
b
lic
k
e
y
s
an
d
s
e
v
er
al
p
r
iv
ate
k
e
y
s
f
o
r
en
cr
y
p
tio
n
a
n
d
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
es.
T
h
e
b
r
u
te
f
o
r
ce
attac
k
is
u
s
ed
to
attac
k
b
o
th
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2088
-
8708
E
n
h
a
n
ce
d
R
S
A
C
r
yp
to
s
ystem
b
a
s
ed
o
n
Mu
ltip
licity
o
f P
u
b
li
c
a
n
d
P
r
iva
te
K
ey
s
(
A
h
med
E
s
ka
n
d
er Mezh
er)
3953
alg
o
r
ith
m
s
(
i.e
.
th
e
s
ta
n
d
ar
d
an
d
o
u
r
i
m
p
r
o
v
ed
alg
o
r
it
h
m
s
)
.
Ou
r
i
m
p
r
o
v
ed
al
g
o
r
it
h
m
i
s
m
o
r
e
s
tab
le
an
d
s
tr
o
n
g
er
th
a
n
s
ta
n
d
ar
d
alg
o
r
ith
m
a
g
ain
s
t
b
r
u
te
f
o
r
ce
attac
k
.
I
n
ad
d
itio
n
,
th
e
im
p
r
o
v
ed
alg
o
r
ith
m
is
al
m
o
s
t
9
ti
m
e
s
s
lo
w
er
to
b
r
ea
k
th
an
s
ta
n
d
ar
d
alg
o
r
ith
m
w
h
e
n
d
if
f
er
e
n
t sizes o
f
k
e
y
s
ar
e
u
s
ed
.
RE
F
E
R
E
NC
E
S
[1
]
G
.
S
i
m
m
o
n
s,
“
S
y
m
m
e
tri
c
a
n
d
A
s
y
m
m
e
tri
c
En
c
r
y
p
ti
o
n
”
,
ACM
Co
mp
u
ti
n
g
S
u
rv
e
y
s
(
CS
UR)
,
v
o
l
.
1
1
,
n
o
.
4
,
pp.
3
0
5
-
3
3
0
,
1
9
7
9
.
[2
]
P
G
P
Co
r
p
o
ra
ti
o
n
,
“
A
n
in
tro
d
u
c
ti
o
n
t
o
C
ry
p
to
g
ra
p
h
y
”
,
S
a
n
ta Cl
a
ra
,
CA
,
USA
,
p
p
.
3
3
,
4
5
,
6
0
,
2
0
0
2
.
[3
]
N.
Ba
b
u
,
e
t
a
l
.
,
“
Im
p
le
m
e
n
tatio
n
o
f
Hig
h
S
e
c
u
rit
y
Cr
y
p
to
g
ra
p
h
ic
S
y
ste
m
w
it
h
I
m
p
ro
v
e
d
Err
o
r
Co
rre
c
ti
o
n
a
n
d
De
tec
ti
o
n
Ra
te
u
sin
g
F
P
G
A
”
,
In
ter
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
El
e
c
trica
l
a
n
d
C
o
mp
u
ter
En
g
in
e
e
rin
g
,
v
o
l
.
6
,
n
o
.
2
,
p.
6
0
2
.
[4
]
Y.
Ku
m
a
r,
e
t
a
l
.
,
“
Co
m
p
a
riso
n
o
f
Sy
m
m
e
tri
c
a
n
d
A
s
y
m
m
e
tri
c
Cr
y
p
to
g
ra
p
h
y
w
it
h
Ex
isti
n
g
Vu
l
n
e
ra
b
il
it
ies
a
n
d
Co
u
n
term
e
a
su
re
s
”
,
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Co
m
p
u
ter
S
c
ien
c
e
a
n
d
M
a
n
a
g
e
me
n
t
S
tu
d
ies
,
v
o
l
.
1
1
,
n
o
.
3
,
2
0
1
1
.
[5
]
D.
Be
n
n
e
,
“
Cry
p
tan
a
l
y
sis
o
f
RS
A
w
it
h
sm
a
ll
p
rim
e
d
iffere
n
c
e
”
,
Ap
p
li
c
a
b
le
Al
g
e
b
ra
i
n
En
g
in
e
e
rin
g
,
Co
mm
u
n
ica
ti
o
n
a
n
d
Co
m
p
u
ti
n
g
,
v
o
l
.
13
,
n
o
.
1
,
p
p
.
17
-
2
8
,
2
0
0
2
.
[6
]
P
.
S
i
n
g
h
a
n
d
R.
K.
C
h
a
u
h
a
n
,
“
A
S
u
rv
e
y
o
n
Co
m
p
a
riso
n
s
o
f
Cry
p
to
g
ra
p
h
ic
A
lg
o
rit
h
m
s
u
sin
g
Ce
rtain
P
a
ra
m
e
ters
in
W
S
N
”
,
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
El
e
c
trica
l
a
n
d
C
o
mp
u
ter
En
g
in
e
e
rin
g
,
vol
.
7
,
n
o
.
4
,
p
p
.
2
2
3
2
,
2
0
1
7
.
[7
]
J.
Esp
a
lm
a
d
o
a
n
d
E.
A
rb
o
led
a
,
„
DA
RE
A
l
g
o
rit
h
m
:
A
Ne
w
S
e
c
u
r
it
y
P
ro
to
c
o
l
b
y
In
teg
ra
ti
o
n
o
f
d
iff
e
re
n
t
Cr
y
p
to
g
ra
p
h
ic
T
e
c
h
n
iq
u
e
s
”
,
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
El
e
c
trica
l
a
n
d
Co
mp
u
ter
En
g
i
n
e
e
rin
g
(
IJ
ECE
)
,
v
o
l
.
7
,
n
o
.
2
,
pp.
1
0
3
2
-
1
0
4
1
,
2
0
1
7
.
[8
]
S
.
Be
rg
m
a
n
n
,
“
De
g
e
n
e
ra
te k
e
y
s
fo
r
RS
A
e
n
c
ry
p
ti
o
n
”
,
ACM
S
IGCS
E
Bu
ll
e
ti
n
,
vol
.
41
,
n
o
.
2
,
p
p
.
95
-
9
8
,
2
0
0
9
.
[9
]
U.
S
o
m
a
n
i,
e
t
a
l
.
,
“
Im
p
le
m
e
n
ti
n
g
Dig
it
a
l
S
ig
n
a
tu
re
w
it
h
R
S
A
En
c
ry
p
ti
o
n
A
lg
o
rit
h
m
to
E
n
h
a
n
c
e
th
e
Da
ta
S
e
c
u
rit
y
o
f
Cl
o
u
d
in
Cl
o
u
d
Co
m
p
u
ti
n
g
”
,
2010
F
irst
In
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
Pa
ra
ll
e
l,
Distri
b
u
te
d
a
n
d
G
rid
Co
mp
u
ti
n
g
,
2
0
1
0
.
[1
0
]
R.
Riv
e
st,
e
t
a
l
.,
“
A
Me
th
o
d
f
o
r
Ob
tain
i
n
g
Dig
it
a
l
S
ig
n
a
tu
re
s
a
n
d
P
u
b
li
c
-
k
e
y
C
r
y
p
to
s
y
ste
m
s
”
,
Co
mm
u
n
ica
ti
o
n
s
o
f
th
e
ACM
,
v
o
l
.
2
1
,
n
o
.
2
,
p
p
.
1
2
0
-
1
2
6
,
1
9
7
8
.
[1
1
]
A
.
A
l
-
Ha
m
a
m
i
a
n
d
I.
A
ld
a
rise
h
,
“
En
h
a
n
c
e
d
M
e
th
o
d
f
o
r
RS
A
Cr
y
p
to
sy
ste
m
A
lg
o
rit
h
m
”
,
2
0
1
2
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
Ad
v
a
n
c
e
d
Co
mp
u
t
e
r
S
c
ien
c
e
Ap
p
li
c
a
ti
o
n
s
a
n
d
T
e
c
h
n
o
l
o
g
ies
(
ACS
AT
),
Ku
a
la
L
u
mp
u
r
,
p
p
.
4
0
2
-
4
0
8
,
2
0
1
2
.
[1
2
]
V
.
Ch
o
u
d
h
a
ry
a
n
d
N.
P
ra
v
e
e
n
,
“
En
h
a
n
c
e
d
R
S
A
Cry
p
to
s
y
ste
m
b
a
se
d
o
n
T
h
re
e
P
rim
e
Nu
m
b
e
rs
”
,
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
In
n
o
v
a
ti
v
e
S
c
ien
c
e
,
E
n
g
in
e
e
rin
g
&
T
e
c
h
n
o
l
o
g
y
,
v
o
l
.
1
,
n
o
.
1
0
,
2
0
1
4
.
[1
3
]
R.
P
a
ti
d
a
r,
e
t
a
l
.
,
“
M
o
d
if
ied
RS
A
Cr
y
p
to
s
y
ste
m
b
a
se
d
o
n
Of
f
li
n
e
S
to
ra
g
e
a
n
d
P
rim
e
Nu
m
b
e
r
”
,
Co
mp
u
ta
ti
o
n
a
l
In
telli
g
e
n
c
e
a
n
d
Co
m
p
u
t
in
g
Res
e
a
rc
h
(
ICCIC),
2
0
1
3
IEE
E
I
n
ter
n
a
ti
o
n
a
l
C
o
n
fer
e
n
c
e
o
n
,
IE
EE
,
2
0
1
3
.
[1
4
]
M
.
Ba
h
a
d
o
ri
,
e
t
a
l
.,
“
A
n
o
v
e
l
a
p
p
ro
a
c
h
f
o
r
se
c
u
re
a
n
d
fa
st
g
e
n
e
ra
ti
o
n
o
f
RS
A
p
u
b
li
c
a
n
d
p
riv
a
te
k
e
y
s
o
n
S
m
a
rtCard
”
,
Pro
c
e
e
d
in
g
s
o
f
th
e
8
th
IEE
E
In
ter
n
a
ti
o
n
a
l
NEW
CAS
Co
n
fer
e
n
c
e
2
0
1
0
,
M
o
n
tre
a
l,
Q
C
,
p
p
.
2
6
5
-
2
6
8
,
2
0
1
0
.
[1
5
]
R.
Hw
a
n
g
,
“
A
n
Eff
icie
n
t
De
c
r
y
p
ti
o
n
M
e
t
h
o
d
f
o
r
RS
A
C
ry
p
to
sy
ste
m
,
”
Ad
v
a
n
c
e
d
In
f
o
rm
a
ti
o
n
Ne
two
rk
in
g
a
n
d
Ap
p
li
c
a
ti
o
n
s,
2
0
0
5
.
AINA
2
0
0
5
.
1
9
th
I
n
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
,
IEE
E,
v
o
l.
1
,
p
p
.
5
8
5
-
5
9
0
,
2
0
0
5
.
B
I
O
G
RAP
H
Y
O
F
AUTHO
R
Ahm
e
d
Es
k
a
n
d
e
r
M
e
z
h
e
r
re
c
e
i
v
e
d
th
e
Ba
c
h
e
lo
r‟s
d
e
g
re
e
in
Co
m
p
u
ter
sc
ien
c
e
f
ro
m
Un
iv
e
rsit
y
o
f
T
e
c
h
n
o
lo
g
y
,
Ba
g
h
d
a
d
-
Ira
q
,
i
n
2
0
0
9
,
a
n
d
th
e
M
a
ste
r
d
e
g
re
e
f
ro
m
Un
iv
e
rsit
y
o
f
Co
lo
ra
d
o
De
n
v
e
r
-
Un
it
e
d
S
tate
s
o
f
Am
e
rica
in
2
0
1
3
.
He
is
c
u
rre
n
tl
y
te
a
c
h
e
r
a
ss
ist
a
n
t
a
t
th
e
Un
iv
e
rsity
o
f
In
f
o
rm
a
ti
o
n
tec
h
n
o
l
o
g
y
a
n
d
Co
m
m
u
n
ica
ti
o
n
s,
Co
ll
e
g
e
o
f
Bu
sin
e
ss
in
f
o
r
m
a
ti
c
s,
Ba
g
h
d
a
d
-
Ira
q
.
His
re
se
a
rc
h
in
tere
st
in
c
lu
d
e
Co
m
p
u
ter
se
c
u
rit
y
,
N
e
t
w
o
rk
s
e
c
u
rit
y
,
Ne
t
w
o
rk
s
,
A
l
g
o
rit
h
m
s
f
o
r
c
o
m
m
u
n
ica
ti
o
n
n
e
tw
o
rk
s.
Evaluation Warning : The document was created with Spire.PDF for Python.