Development of “RSA” Encryption Algorithm for Secure Communication
Abhishek Guru1 , Asha Ambhaikar2
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-6 , Page no. 581-585, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.581585
Online published on Jun 30, 2019
Copyright © Abhishek Guru, Asha Ambhaikar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Abhishek Guru, Asha Ambhaikar, “Development of “RSA” Encryption Algorithm for Secure Communication,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.581-585, 2019.
MLA Style Citation: Abhishek Guru, Asha Ambhaikar "Development of “RSA” Encryption Algorithm for Secure Communication." International Journal of Computer Sciences and Engineering 7.6 (2019): 581-585.
APA Style Citation: Abhishek Guru, Asha Ambhaikar, (2019). Development of “RSA” Encryption Algorithm for Secure Communication. International Journal of Computer Sciences and Engineering, 7(6), 581-585.
BibTex Style Citation:
@article{Guru_2019,
author = {Abhishek Guru, Asha Ambhaikar},
title = {Development of “RSA” Encryption Algorithm for Secure Communication},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2019},
volume = {7},
Issue = {6},
month = {6},
year = {2019},
issn = {2347-2693},
pages = {581-585},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4595},
doi = {https://doi.org/10.26438/ijcse/v7i6.581585}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.581585}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4595
TI - Development of “RSA” Encryption Algorithm for Secure Communication
T2 - International Journal of Computer Sciences and Engineering
AU - Abhishek Guru, Asha Ambhaikar
PY - 2019
DA - 2019/06/30
PB - IJCSE, Indore, INDIA
SP - 581-585
IS - 6
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
378 | 250 downloads | 129 downloads |
Abstract
In this paper there are modifications in the RSA algorithm by using more than four prime numbers in the combination of public and private key by using this factoring complexity of variables is increased. This is a new technique to provide max security for data over the internet. In this technique we are using more than four prime numbers which is not easily decomposed this technique provides more efficiency and reliability over the network. In this paper we try to increase the level of security by modifying the RSA Encryption Algorithm.
Key-Words / Index Term
RSA Algorithm, Prime Numbers, Complexisity, Public Key, Private Key
References
[1]. Pratik A. Vanjara, “Analysis and Design of Cryptography Algorithms”, “International Journal of Computer Application & Information Technology”, Vol: 1, Issue: 2, 2012.
[2]. B.Persis Urbana Ivy,Purshotam Mandiwa, Mukesh Kumar, “A Modified RSA Cryptosystem Based on ‘n’ Prime Number”, “International Journal of Engineering and Computer Science”,Vol:1,Issue:2,2012.
[3]. B, Padmavathi, S. Ranjita Kumari, “A Survey on Performance Analysis of DES,AES and RSA Algorithm along with LSB Substitution Technique ”, “International Journal of Science and Research”,Vol:2,Issue:4,2013.
[4]. Nitin jirwan, Ajay Singh,Sandip Vijay,”Review and Analysis of Cryptography Techique”, “International Journal of Scientific & Engineering Research”,Vol:4,Issue:3,2013 .
[5]. Manisha Vishwakarma,”Comparative study of Cryptography Algorithms”, ”International Journal of Advanced Research in Computer Science”,Vol:4,Issue:3,2013.
[6]. Gurpreet Singh,Supriya,”A Study of Encryption Algorithms (RSA,DES,3DES and AES)for Information Security”,“International Journal of Computer Application”, Vol: 67,Issue: 19,2013.
[7]. Rejani. R,Deepu. V. Krishnan, “Study of Symmetric Key Cryptography Algorithms”, “International Journal of ComputerTechniques”, Vol:2, Issue:2, 2015,
[8]. S.Suguna,V. Dhanakoti,R. Manjupriya “A Study on Symmetric And Asymmetric Key Encryption Algorithms ”, “International Research Journal of Engineering and Technology”,Vol:3,Issue:4,2016.
[9]. A. Joseph Amalraj,Dr. J. John Raybin Jose, ”A Survey Paper on Cryptography Techniques”, “International Journal of Computer Science and Mobile Computing”,Vol:5,Issue:8,pp55-59,2016.
[10]. Arpit Agrawal,Gunjan Patanker, “Design Hybrid Cryptography Algorithm for Secure Communication”, “International Research Journal of Engineering and Technology”, Vol:3,Issue:1,2016
[11]. Sarthak R Patel,Khushbu Shah,Gaurav R Patel, ”Study on Improvements in RSA Algorithm”, “International Journal of Engineering Development and Research”,2017.
[12]. Sarita Kumari, “A research paper on Cryptography Encryption and Compression Techniques”,”International Journal of Engineering And Computer Science”,Vol:6,Issue:4,pp: 20915-20919,2017.
[13]. Venkat Prasad .K, S. Magesh, “A Survey on Encryption Using Modern Technique”,“International Journal of Pure and Applied Mathematics”,Vol:117,Issue:16,2017.
[14]. Shivani Sharma,Yash Gupta,”Study on Cryptography and Techniques”,”International Journal of Scientific Research in Computer Science”,Vol:2,Issue:1,2017.
[15]. Faiqa Maqsood,Muhammad Ahmed, Muhammad Mumtaz Ali,Munam Ali Shah, “Cryptography: A Comparative Analysis for Modern Techniques”,“International Journal of Advanced Computer Science and Application”, Vol: 8, Issue: 6, 2017.
[16]. Omar G. Abood,Shawkat K.Guirguis, ” A Survey on Cryptography Algorithms ”, ” International Journal of Science and Research Publications ”, Vol:8,Issue:7,2018.
[17]. Swapnil Chaudhari,Mangesh Pahade ,Sahil Bhat,Chetan Jadhav,Tejaswini Sawant, ”A Research Paper on New Hybrid Cryptography Algorithm ”, “International Journal for Research & Development in Technology ”,Vol:9,Issue:5,2018.