##plugins.themes.bootstrap3.article.main##

To transmit sensitive information over the unsafe communication network like the internet network, the security is precarious tasks to protect this information. Always, we have much doubt that there are more chances to uncover the information that is being sent through network terminals or the internet by professional/amateur parasitical persons. To protect our information we may need a secure way to safeguard our transferred information. So, encryption/decryption, stenographic and vital cryptography may be adapted to care for the required important information. In system cryptography, the information transferred between both sides sender/receiver in the network must be scrambled using the encryption algorithm. The second side (receiver) should be outlook the original data using the decryption algorithms. Some encryption techniques applied the only one key in the cooperation of encryption and decryption algorithms. When the similar key used in both proceeds is called symmetric algorithm. Other techniques may use two different keys in encryption/decryption in transferring information which is known as the asymmetric key.  In general, the algorithms that implicated asymmetric keys are much more secure than others using one key.   RSA algorithm used asymmetric keys; one of them for encryption the message, and is known as a public key and another used to decrypt the encrypted message and is called a private key. The main disadvantage of the RSA algorithm is that extra time is taken to perform the encryption process. In this study, the MATLAB library functions are implemented to achieve the work. The software helps us to hold very big prime numbers to generate the required keys which enhanced the security of transmitted information and we expected to be difficult for a hacker to interfere with the private information. The algorithms are implemented successfully on different sizes of messages files.

Downloads

Download data is not yet available.

References

  1. Meneses F., Fuertes W., José Sancho, Salvador S., Flores D., Aules H., Castro F. Torres J., Miranda A., Nuela D., (2016), “RSA Encryption Algorithm Optimization to Improve Performance and Security Level of Network Messages”, IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.8.
     Google Scholar
  2. Jamgekar R. S., Joshi G.S., (2013), “File Encryption and Decryption Using Secure RSA,” International Journal of Emerging Science and Engineering (IJESE), ISSN: 2319–6378, Volume-1, Issue-4,
     Google Scholar
  3. Obaid T. A. S. Khami M. Shehab L. G. (2017), “Hiding Secured key in digital media”, Int. Jo. Eng. Res. App., ISSN: 2248-9622, Vol. 7, Issue 9, pp.58-63, www.ijera.com
     Google Scholar
  4. Nisha S., and Farik M., (2017), " RSA Public Key Cryptography Algorithm – A Review", International Journal of Scientific & Technology Research Volume 6, Issue 07, ISSN 2277-8616.
     Google Scholar
  5. Khyoon, A. I. (2005) “Modification on the Algorithm of RSA Cryptography System,” Al-Fatih Journal, ISSN: 87521996, Volume: 1 Issue: 24 Pages: 80-89.
     Google Scholar
  6. Al-Lehiebe A., (2015), " Ciphered Text Hiding in an Image using RSA algorithm", J. Of College of Education for Women vol. 26 (3).
     Google Scholar
  7. Cid C., (2019), " Cryptanalysis of RSA: A Survey", SANS Institute.Bonde S. Y.; Bhadade U.S., (2017) International Conference on Computing, Communication, Control and Automation (ICCUBEA)”, DOI: 10.1109/ICCUBEA .8463720, Publisher: IEEE.
     Google Scholar
  8. Patel S. R., Shah K., Patel G. R., (2013), “Study on Improvements in RSA Algorithm,” IJEDR, ISSN: 2321-9939.
     Google Scholar
  9. Milanov E., (2009), “The RSA Algorithm” https://sites.math. washington. edu/~morrow/336_09/ papers/Yevgeny.pdf.
     Google Scholar
  10. Kumar Y., Munjal R., Sharma H, (2011), “Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures,” Int. J. Comp. Sci. and Management Studies, Vol. 11, Issue 03, ISSN: 2231-5268, www.ijcsms.com.
     Google Scholar
  11. Choudhary V., Praveen N. “Enhanced Rsa Cryptosystem Based On Three Prime Numbers,” Int. J. Innov. Sc., Eng. & Tech., Vol. 1, Issue 10, 2014. www.ijiset.com.
     Google Scholar
  12. Intila C. Gerardo B. Medina R., (2019) “A study of public key ‘e’ in RSA algorithm,” The International Conference on Information Technology and Digital Applications, IOP Conf. Series: Materials Science and Engineering 482 012016, IOP Publishing, DOI:10.1088/1757-899X/482/1/012016.
     Google Scholar
  13. Kumar M. (2018), “Advanced RSA Cryptographic Algorithm for Improving Data Security” https://www.researchgate. net/publication/324812723, DOI: 10.1007/978-981-10-8536-9_2.
     Google Scholar
  14. Thaku P., Rana A., (2016), "A Symmetrical Key Cryptography Analysis using Blowfish Algorithm", International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol. 5 Issue 07.
     Google Scholar
  15. Choudhary V. and. Praveen N., (2014), "Enhanced RSA Cryptosystem Based On Three Prime Numbers", IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 10, www.ijiset.com.
     Google Scholar
  16. Abdeldaym R. S., Abd Elkader H. M., Hussein R., (2019), " Modified RSA Algorithm Using Two Public Key and Chinese Remainder Theorem", I.J. of Electronics and Information Engineering, Vol.10, No.1, PP.51-64, (DOI: 10.6636/IJEIE.201903 10(1).06) 51.
     Google Scholar
  17. Ch. J. L. Padmaja Ch. J. L., Bhagavan V. S., and Srinivas B., (2016), " RSA Encryption Using Three Mersenne Primes", Int. J. Chem. Sci.: 14(4), 2273-2278, ISSN 0972-768X, www.sad gurupublications.com.
     Google Scholar
  18. Nisha S., and Farik M., (2017), " RSA Public Key Cryptography Algorithm – A Review", International Journal of Scientific & Technology Research Volume 6, Issue 07, ISSN 2277-8616.
     Google Scholar
  19. Meneses F., Fuertes W, José S., Santiago Salvador, Daniela Flores, (2016), " RSA Encryption Algorithm Optimization to Improve Performance and Security Level of Network Messages", IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.8, 55.
     Google Scholar
  20. Thangav M., Varalakshmi P., Murral M., Nithya K., (2015), " An Enhanced and Secured RSA Key Generation Scheme (ESRKGS)", Journal of Information Security and Applications, Volume 20, Pages 3-10.
     Google Scholar
  21. Intila C., Gerardo B., Medina R., (2019), " A study of public key ‘e’ in RSA algorithm", The International Conference on Information Technology and Digital Applications, IOP Conf. Series: Materials Science and Engineering 482. 012016, IOP Publishing, DOI:10.1088/1757-899X/482/1/012016.
     Google Scholar
  22. Uthman S., (2017), " An Improved RSA based on Double Even Magic Square of order 32 ", Kirkuk University Journal /Scientific Studies (KUJSS), Volume 12, Issue 4, ISSN 1992 – 0849.
     Google Scholar