Abstract
Data security is ensured by the use of cryptography. Data security refers to the protection of data and privacy to prevent hackers from gaining unauthorized access to applications, computers, and data servers. Cryptography is a process of encrypting data and storing it in databases in a manner that anyone who gains access to it by accident is rendered useless. To encrypt and decrypt data, the RSA algorithm, the ECC algorithm, and other encryption methods are routinely employed. Game Theory—Rivest–Shamir–Adleman (GT-RSA) is a new hybrid algorithm that combines Game Theory and RSA to improve the efficiency of the RSA algorithm by altering the function. By improving the speed, throughput, avalanche effect, and power consumption performance of the GT-RSA algorithm, it is proposed. The performance of the GT-RSA algorithm has been enhanced, and experimental results have been shown.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Dhivya, N. (2020). Network security with cryptography and steganography. IJERT Journal, 8, 1–4. ISSN 2278-0181
Jayashree, R. (2019). Analysis of aadhaar card dataset using big data analytics. Emerging Trends in Computing and Expert Technology, LNDECT, 35, 1208–1225
Al-Shabi, M. A. (2019). A survey on symmetric and asymmetric cryptography algorithms in information security IJSRP, 9, 576–589. ISSN 2250–3153
Casey, W., Morales, J. A., Wright, E., Zhu, Q., & Mishra, B. (2016). Compliance signaling games: Toward modeling the deterrence of insider threats. Computational and Mathematical Organization Theory, 3, 318–349.
Chen, J., Touati, C., & Zhu, Q. (2017). A dynamic game analysis and design of infrastructure network protection and recovery. ACM SIGMETRICS Performance Evaluation Review, 2, 128.
Cui, L., et al. (2019). Improving data utility through game theory in personalized differential privacy. Journal of Computer Science and Technology, 34, 272–286.
Panda, M. (2014). Security in wireless sensor networks using cryptographic techniques. American Journal of Engineering Research, 3, 50–56.
Shankar, M., & Akshaya, P. (2014). Hybrid cryptographic technique using RSA algorithm and scheduling concepts. International Journal of Network Security & Its Applications, 6, 39–48.
Shahryar, T., Fathi, M. H., & Sekhavat, Y. A. (2017). An image encryption scheme based on elliptic curve pseudo-random and advanced encryption system. Signal Processing, 141, 217–227.
Joseph Raj, V., & Felista Sugirtha Lizy, R. (2020). Performance enhancement of RSA using runge-kutta technique. Test Engineering and Management 11850–11857.
Felista Sugirtha Lizy, R., & Joseph Raj, V. (2021). Image encryption using RK-RSA algorithm in aadhaar card. Turkish Journal of Computer and Mathematics Education, 4683–4693.
Felista Sugirtha Lizy, R., & Joseph Raj, V. (2021). Improvement of RSA algorithm using euclidean technique. Turkish Journal of Computer and Mathematics Education, 4694–4700.
Josephraj, V., & Shamina Ross, B. (2016). Security evaluation of blowfish and its modified version using GT’s one-shot category of nash equilibrium. International Journal of Control Theory and Applications, pp. 4771–4777.
Josephraj, V., & Shamina Ross, B. (2015). Enhancing the performance of blowfish encryption algorithm in terms of speed and security by modifying its function. International Journal of Applied Engineering Research, 10(79), 621–624.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Felista Sugirtha Lizy, R., Joseph Raj, V. (2023). Performance of RSA Algorithm Using Game Theory for Aadhaar Card. In: Shakya, S., Du, KL., Ntalianis, K. (eds) Sentiment Analysis and Deep Learning. Advances in Intelligent Systems and Computing, vol 1432. Springer, Singapore. https://doi.org/10.1007/978-981-19-5443-6_7
Download citation
DOI: https://doi.org/10.1007/978-981-19-5443-6_7
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-5442-9
Online ISBN: 978-981-19-5443-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)