Study A Public Key in RSA Algorithm
##plugins.themes.bootstrap3.article.main##
To transmit sensitive information over the unsafe communication network like the internet network, the security is precarious tasks to protect this information. Always, we have much doubt that there are more chances to uncover the information that is being sent through network terminals or the internet by professional/amateur parasitical persons. To protect our information we may need a secure way to safeguard our transferred information. So, encryption/decryption, stenographic and vital cryptography may be adapted to care for the required important information. In system cryptography, the information transferred between both sides sender/receiver in the network must be scrambled using the encryption algorithm. The second side (receiver) should be outlook the original data using the decryption algorithms. Some encryption techniques applied the only one key in the cooperation of encryption and decryption algorithms. When the similar key used in both proceeds is called symmetric algorithm. Other techniques may use two different keys in encryption/decryption in transferring information which is known as the asymmetric key. In general, the algorithms that implicated asymmetric keys are much more secure than others using one key. RSA algorithm used asymmetric keys; one of them for encryption the message, and is known as a public key and another used to decrypt the encrypted message and is called a private key. The main disadvantage of the RSA algorithm is that extra time is taken to perform the encryption process. In this study, the MATLAB library functions are implemented to achieve the work. The software helps us to hold very big prime numbers to generate the required keys which enhanced the security of transmitted information and we expected to be difficult for a hacker to interfere with the private information. The algorithms are implemented successfully on different sizes of messages files.
Downloads
References
-
Meneses F., Fuertes W., José Sancho, Salvador S., Flores D., Aules H., Castro F. Torres J., Miranda A., Nuela D., (2016), “RSA Encryption Algorithm Optimization to Improve Performance and Security Level of Network Messages”, IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.8.
Google Scholar
1
-
Jamgekar R. S., Joshi G.S., (2013), “File Encryption and Decryption Using Secure RSA,” International Journal of Emerging Science and Engineering (IJESE), ISSN: 2319–6378, Volume-1, Issue-4,
Google Scholar
2
-
Obaid T. A. S. Khami M. Shehab L. G. (2017), “Hiding Secured key in digital media”, Int. Jo. Eng. Res. App., ISSN: 2248-9622, Vol. 7, Issue 9, pp.58-63, www.ijera.com
Google Scholar
3
-
Nisha S., and Farik M., (2017), " RSA Public Key Cryptography Algorithm – A Review", International Journal of Scientific & Technology Research Volume 6, Issue 07, ISSN 2277-8616.
Google Scholar
4
-
Khyoon, A. I. (2005) “Modification on the Algorithm of RSA Cryptography System,” Al-Fatih Journal, ISSN: 87521996, Volume: 1 Issue: 24 Pages: 80-89.
Google Scholar
5
-
Al-Lehiebe A., (2015), " Ciphered Text Hiding in an Image using RSA algorithm", J. Of College of Education for Women vol. 26 (3).
Google Scholar
6
-
Cid C., (2019), " Cryptanalysis of RSA: A Survey", SANS Institute.Bonde S. Y.; Bhadade U.S., (2017) International Conference on Computing, Communication, Control and Automation (ICCUBEA)”, DOI: 10.1109/ICCUBEA .8463720, Publisher: IEEE.
Google Scholar
7
-
Patel S. R., Shah K., Patel G. R., (2013), “Study on Improvements in RSA Algorithm,” IJEDR, ISSN: 2321-9939.
Google Scholar
8
-
Milanov E., (2009), “The RSA Algorithm” https://sites.math. washington. edu/~morrow/336_09/ papers/Yevgeny.pdf.
Google Scholar
9
-
Kumar Y., Munjal R., Sharma H, (2011), “Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures,” Int. J. Comp. Sci. and Management Studies, Vol. 11, Issue 03, ISSN: 2231-5268, www.ijcsms.com.
Google Scholar
10
-
Choudhary V., Praveen N. “Enhanced Rsa Cryptosystem Based On Three Prime Numbers,” Int. J. Innov. Sc., Eng. & Tech., Vol. 1, Issue 10, 2014. www.ijiset.com.
Google Scholar
11
-
Intila C. Gerardo B. Medina R., (2019) “A study of public key ‘e’ in RSA algorithm,” The International Conference on Information Technology and Digital Applications, IOP Conf. Series: Materials Science and Engineering 482 012016, IOP Publishing, DOI:10.1088/1757-899X/482/1/012016.
Google Scholar
12
-
Kumar M. (2018), “Advanced RSA Cryptographic Algorithm for Improving Data Security” https://www.researchgate. net/publication/324812723, DOI: 10.1007/978-981-10-8536-9_2.
Google Scholar
13
-
Thaku P., Rana A., (2016), "A Symmetrical Key Cryptography Analysis using Blowfish Algorithm", International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol. 5 Issue 07.
Google Scholar
14
-
Choudhary V. and. Praveen N., (2014), "Enhanced RSA Cryptosystem Based On Three Prime Numbers", IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 10, www.ijiset.com.
Google Scholar
15
-
Abdeldaym R. S., Abd Elkader H. M., Hussein R., (2019), " Modified RSA Algorithm Using Two Public Key and Chinese Remainder Theorem", I.J. of Electronics and Information Engineering, Vol.10, No.1, PP.51-64, (DOI: 10.6636/IJEIE.201903 10(1).06) 51.
Google Scholar
16
-
Ch. J. L. Padmaja Ch. J. L., Bhagavan V. S., and Srinivas B., (2016), " RSA Encryption Using Three Mersenne Primes", Int. J. Chem. Sci.: 14(4), 2273-2278, ISSN 0972-768X, www.sad gurupublications.com.
Google Scholar
17
-
Nisha S., and Farik M., (2017), " RSA Public Key Cryptography Algorithm – A Review", International Journal of Scientific & Technology Research Volume 6, Issue 07, ISSN 2277-8616.
Google Scholar
18
-
Meneses F., Fuertes W, José S., Santiago Salvador, Daniela Flores, (2016), " RSA Encryption Algorithm Optimization to Improve Performance and Security Level of Network Messages", IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.8, 55.
Google Scholar
19
-
Thangav M., Varalakshmi P., Murral M., Nithya K., (2015), " An Enhanced and Secured RSA Key Generation Scheme (ESRKGS)", Journal of Information Security and Applications, Volume 20, Pages 3-10.
Google Scholar
20
-
Intila C., Gerardo B., Medina R., (2019), " A study of public key ‘e’ in RSA algorithm", The International Conference on Information Technology and Digital Applications, IOP Conf. Series: Materials Science and Engineering 482. 012016, IOP Publishing, DOI:10.1088/1757-899X/482/1/012016.
Google Scholar
21
-
Uthman S., (2017), " An Improved RSA based on Double Even Magic Square of order 32 ", Kirkuk University Journal /Scientific Studies (KUJSS), Volume 12, Issue 4, ISSN 1992 – 0849.
Google Scholar
22
Similar Articles
- M. R. Umor, A. Hussin, N. Muda, The Physical Properties and Geochemical of Clay from the Bestari Jaya, Kuala Selangor, Selangor, Malaysia for Potential Usage , European Journal of Engineering and Technology Research: Vol. 5 No. 10: OCTOBER 2020
You may also start an advanced similarity search for this article.