Optimizing RSA cryptosystem using Hermite polynomials

Document Type : Research Paper


Department of Applied Sciences, University of Technology, Baghdad, Iraq


The Security is requested to relocate paramount information across the networks. To protect the confidential data from hacking, this paper describes a process to increase the security of the RSA algorithm by creating additional layer protection for it using Hermite polynomials which will be represented as a square matrix, its calculation is not complicated. In the RSA process, we need to choose very large numbers that lead to complex operations which require a long computation time, while in proposed encryption due to Hermite key we don't need that because two layers of encryption give robust safeness to the ciphertext from dangers of hackers due to the hard of breakable.


[1] N.N.H. Adenan, M.R. Kamel Ariffin, S.H. Sapar, A.H. Abd Ghafar and M.A. Asbullah, New Jochemsz–May cryptanalytic bound for RSA system utilizing common modulus N= p2q, Mathematics, 9 (4) 2021 340.
[2] N.A. Hassan and A.K. Farhan, Security improves in ZigBee protocol based on RSA public algorithm in WSN, Engin. Tech. J. 37(3B) (2019) 67–73.
[3] Y. He and F. Yang, Some recurrence formulas for the Hermite polynomials and their squares, Open Math. 16(1) (2018) 553–560.
[4] AJ. Kadhim, Expansion methods for solving linear integral equations with multiple time lags using B-spline and orthogonal functions, Engin. Tech. J. Signif. 29(9) (2011) 1651–1661.
[5] P. Patil, P. Narayankar, D.G. Narayan and S.M.A. Meena, comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish, Procedia Computer Sci. 78 (2016) 617–624.
[6] A. M. S. Rahma, A. M. J. A. Hossen and O. Dawood, Public key cipher with signature based on Diffie-Hellman and the magic square problem, Engin. Tech. J. Part (B) 34(1) (2016).
[7] Sh. A. Salman, Lattice Point and Its Application in RSA Cryptosystem, Energy Procedia 157 (2019) 39–42.
[8] R.K. Salih and M. S. Yousif, Hybrid encryption using playfair and RSA cryptosystems, Int. J. Nonlinear Anal. Appl. 12(2) (2021) 2345–2350.
[9] R.K. Salih and M.S. Yousif, Playfair with multi strata encryption, Iraqi J. Sci. 62 (9) 2021 3237–3242.
[10] M. Thangavel, P. Varalakshmi, M. Murrali and K. Nithya, An enhanced and secured RSA key generation scheme (ESRKGS), J. Inf. Secur. Appl. 20 (2014) 1–10.
Volume 13, Issue 1
March 2022
Pages 955-961
  • Receive Date: 05 May 2021
  • Revise Date: 01 September 2021
  • Accept Date: 20 October 2021