Full Paper View Go Back

Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number

V. Kapoor1

Section:Research Paper, Product Type: Journal
Vol.1 , Issue.2 , pp.35-38, Jun-2013

Online published on Jun 30, 2013


Copyright V. Kapoor . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: V. Kapoor, Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number, International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.35-38, 2013.

MLA Style Citation: V. Kapoor "Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number." International Journal of Scientific Research in Network Security and Communication 1.2 (2013): 35-38.

APA Style Citation: V. Kapoor, (2013). Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number. International Journal of Scientific Research in Network Security and Communication, 1(2), 35-38.

BibTex Style Citation:
@article{Kapoor_2013,
author = {V. Kapoor},
title = {Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {6 2013},
volume = {1},
Issue = {2},
month = {6},
year = {2013},
issn = {2347-2693},
pages = {35-38},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=179},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=179
TI - Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number
T2 - International Journal of Scientific Research in Network Security and Communication
AU - V. Kapoor
PY - 2013
DA - 2013/06/30
PB - IJCSE, Indore, INDIA
SP - 35-38
IS - 2
VL - 1
SN - 2347-2693
ER -

7011 Views    4525 Downloads    4358 Downloads
  
  

Abstract :
Now a days, have a great dependence on computer and network and the security of computer related to the whole world and everybody. Cryptography is the art and science of achieving security by encoding message to make them non-readable [1] to secure data or information transmits over the network. In this paper introduced modified RSA approach based on multiple public keys and n prime number.RSA algorithm is mostly used in the popular implementation of public key cryptography. In public key cryptography two different keys are generated in RSA one keys is used in encryption data and other corresponding key used for decryption. No other key decrypt the data. Even if it is efficient algorithm it is vulnerable to other person. With the help of all brute force attacks can obtain private keys. In this research paper new approach we used n prime number and multiple public keys. Which is not easily crack able .In here implementation RSA algorithm .using some mathematical logic integer factorization and discrete logarithm problem.

Key-Words / Index Term :
Cryptography, RSA algorithm, Triple DES, Asymmetric key Cryptography, ’n’ Prime Number

References :
[1]. AAtul Kahate, Cryptography and Network Security, Tata McGraw-Hill Publication Company Limited page no. 32 2003.
[2] Xiaowen Kang; Inst. of Electron. Technol., PLA Inf. Eng. Univ., Beijing; Yingjie Yang; Xin Du,” A Disaster-Oriented Strong Secure File System” Innovative Computing Information and Control, 2008. ICICIC '08. Pages 557.
[3] Xin Zhou, Xiaofei Tang,”Reasearch and Implementation of RSA algorithm for Encryption and Decryption “IEEE 6th International Forum on strategic Technology pp 1118-1121, 2011.
[4] Rajan.s.jamgekar, Geeta shantanu joshi “File Encryption and Decryption using secure RSA” International Journal of Emerging Science and Engineering (IJESE) ISSN: 2319–6378, Volume-1, Issue-4, February 2013.
[5] P.Saveetha & S.Arumugam “Study on Improvement in RSA Algorithm and its Implementation” International Journal of Computer & Communication Technology ISSN (PRINT): 0975 - 7449, Volume-3, Issue-6, 7, 8, 2012
[6] en.wikipedia.org/wiki/Euclidean algorithm
[7] B.Persis Urbana Ivy, Purshotam Mandiwa. Mukesh Kumar “A modified RSA cryptosystem based on ‘n’ prime numbers” International Journal of Engineering and Computer Science ISSN: 2319-7242 Volume1 Issue 2 Nov 2012 Page No. 63-66
[8] en.wikipedia.org/wiki/Random_number_generation
[9] Avinash kak, Purdue University Lecture Notes on “Computer and Network Security”June 20, 2003
[10] Milad Bahadori1, Mohammad Reza Mali, Omid Sarbishei, Mojtaba Atarodi, Mohammad Sharifkhani,”Novel Approach witch is the Secure and Fast Generation of RSA Public and Private Keys on Smart-Card”, 978-1-4244-6805-8/10/$26.00 2010 IEEE.
[11] Maryam Ahmed, Baharan Sanjabi, Difo Aldiaz, Amirhossein Rezaei, Habeeb “Diffie-Hellman and Its Application in Security Protocols” International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 1, Issue 2, November 2012
[12] P. Golle, J. Staddon, M. Gagne, and P. Rasmussen, “A Content-Driven Access Control System,” Proc. Symp. Identity and Trust on the Internet, pp. 26-35, 2008.
[13] Rangarajan A. Vasudevan, Sugata Sanyal” Jigsaw-based Secure Data Transfer over Computer Networks” Information Technology: Coding and Computing,. Proceedings. ITCC 2004. International Conference on (Volume:1 ) 2004.
[14] Wuling Ren, Zhiqian Miao, College of Computer and Information Engineering, Zhejiang Gongshang University, “A Hybrid Encryption Algorithm Based on DES and RSA” in Bluetooth Communication Second International Conference on Modeling, Simulation and Visualization Methods 2010.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation