Implementation of RSA Cryptosystem Using Verilog Research Papers (original) (raw)

2024, Utilising Simulation Technique to Examine the Security of Various Key Sizes on Rijandael, FPA, and RC4 Algorithms in VB.NET

A breach of the unprotected electronic data might result in sensitive or confidential information being taken, changed, copied, sent, viewed, or used without authority. This study focuses on having security testing of Rijindael, Rivest... more

A breach of the unprotected electronic data might result in sensitive or confidential information being taken, changed, copied, sent, viewed, or used without authority. This study focuses on having security testing of Rijindael, Rivest Cipher4 and Format Preserving Algorithms in VB.Net Using simulation Comparison Techniques by comparing three (3) encryption algorithms by simulation method to know the most secured algorithm in VB.Net of different minimum and maximum key sizes to determine the security. The study also evaluate the three most common encryption algorithms like Rijandael, Rivest Cipher4 and Format Preserving Encryption Algorithm. A simulation comparison were conducted for those three (3) encryption algorithms at different settings for each algorithm such as minimum and maximum key size change to know which among those algorithms performs cryptography in the most secured way. Results from simulation analysis showed that Rivest Cipher4 (RC4) is the best algorithm in terms of security among the other compared contenders using the higher key size and lower key size as it maintain an average time for each key size both (Min & Max) followed by Rijandael and format preserving algorithm. This study therefore recommend the adoption of Rivest Cipher4 (RC4) in VB.Net in terms of secured cryptography.

2024, AIP Conference Proceedings

Users use weak passwords and reuse them on different websites and applications. Password managers are a solution to store login information for websites and help users log in automatically. This project developed a system that acts as an... more

Users use weak passwords and reuse them on different websites and applications. Password managers are a solution to store login information for websites and help users log in automatically. This project developed a system that acts as an agent managing passwords. Multi-Agent Integrated Password Management (MIPM) is an application using encryption that provides users with secure storage of their login account information such as their username, emails and passwords. This project was developed on an Android platform with an encryption agent using Java Agent Development Environment (JADE). The purpose of the embedded agents is to act as a third-party software to ease the encryption process, and in the future, the developed encryption agents can form part of the security system. This application can be used by the computer and mobile users. Currently, users log into many applications causing them to use unique passwords to prevent password leaking. The crypto agent handles the encryption process using an Advanced Encryption Standard (AES) 128bit encryption algorithm. As a whole, MIPM is developed on the Android application to provide a secure platform to store passwords and has high potential to be commercialised for public use.

2024, Journal of Telecommunication, Electronic and Computer Engineering

Rapid development of the Internet and increasing number of available Web applications require users to memorize the passwords for authentication. Password management system is a solution to store login information such as password and... more

Rapid development of the Internet and increasing number of available Web applications require users to memorize the passwords for authentication. Password management system is a solution to store login information such as password and help users to log in automatically. In preventing from password leaking, this project was integrated with the multi-agents using Java Agent Development Environment (JADE). The purpose of the embedded agents is act as the third party software to ease the encryption process. The application agent sends data to Crypto Agent using Agent Communication Language (ACL) message, a method of communication between agents. Upon receiving, crypto agent encrypts the data using AES 128-bit encryption algorithm. AES will facilitate the process of the encryption and decryption, and withstand the application from the brute force attack. As whole, MIPM is a development on android application that provide secure platform to store their login account information such as th...

2023, Jurnal Online Informatika

SMS (Short Message Service) is one of the data exchange features in cellphones, including Android smartphones, which are the most widely used smartphone platforms today. However, the security of the SMS is questionable because the message... more

SMS (Short Message Service) is one of the data exchange features in cellphones, including Android smartphones, which are the most widely used smartphone platforms today. However, the security of the SMS is questionable because the message sent must pass through a third party frist, namely SMSC (Short Message Service Center), so that message can be tapped or misused. One of the ways to reduce this risk is to encrypt or keep the original message secret by applying the cryptography algorithm. This research is to develop a system that serves to encrypt and decrypt SMS for Android-based smartphone users. The application is created to encrypt dan decrypt SMS using the Java programming language on Android, that is applied to smartphone integrated with Android Studio and used RSA cryptography algorithm. The application can be used to encrypt and decrypt SMS using the RSA algorithm on the Android-based smartphone. This application can send an SMS with a size of 86 characters and using QR Code to exchange the public key.

2023, The Foundation of Asymmetric Encryption: Computational Principles Behind Prime Number Factorization

Asymmetric encryption techniques have transformed secure communication by introducing a paradigm that utilizes distinct keys-a public key for encryption and a private key for decryption. At the core of these methods lie intricate... more

Asymmetric encryption techniques have transformed secure communication by introducing a paradigm that utilizes distinct keys-a public key for encryption and a private key for decryption. At the core of these methods lie intricate computational operations, particularly involving the factorization of large prime numbers. This article delves into the computational aspects of asymmetric encryption, emphasizing algorithms like RSA and the complex calculations integral to their security within the realm of computer science. Introduction: Asymmetric encryption, a cornerstone of computer science, facilitates secure data exchange without necessitating a shared secret key. It operates on mathematically linked key pairs-a public key known to all and a private key kept confidential by the recipient. This innovative approach significantly contributes to digital security. Prime Numbers and their Computational Significance: Prime numbers, fundamental in computer science, play a pivotal role in ensuring the security of encrypted data. The robustness of asymmetric encryption stems from the computational complexity of factoring the product of two large prime numbers, forming the basis of security in algorithms like RSA. Consider two large prime numbers, p = 61 and q = 53. Their product, n = p × q = 3233, serves as the modulus for encryption and decryption operations.

2023

advancem informatio data. This data scien availability comprehe of data sci

2023

In present day Social systems administration framework Data security is the most extreme basic issue in guaranteeing safe transmission of data through the web. Web has turned out to be increasingly across the board, if an unapproved... more

In present day Social systems administration framework Data security is the most extreme basic issue in guaranteeing safe transmission of data through the web. Web has turned out to be increasingly across the board, if an unapproved individual can gain admittance to this system, he can keep an eye on us as well as he can without much of a stretch chaos up our lives. System Security and Cryptography is an idea to ensure system and information transmission over remote system. Today information correspondence for the most part relies on computerized information correspondence. The insurance of sight and sound information, delicate data like charge cards, banking exchanges and interpersonal organization security numbers is winding up significant. The security of this classified information from unapproved access should be possible with numerous encryption strategies. Likewise organize security issues are presently getting to be significant as society is moving towards computerized data ...

calculation is an awry cryptography calculation  If we consider the alphabet as numerical value 0 to 25 which is figured out the below table:

2022

An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in this paper. Due to increasing use of image in various field, it is very important to protect the confidential image data from unauthorized... more

An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in this paper. Due to increasing use of image in various field, it is very important to protect the confidential image data from unauthorized access. The design uses the iterative approach with block size of 128 bit and key size of 256 bit. The numbers of round for key size of 256 bits is 14. As secret key increases the security as well as complexity of the cryptography algorithms.This paper presents a algorithm in which the image is an input to AES Encryption to get the encrypted image and the encrypted image is the input to AES Decryption to get the original image.

2022

In this paper the development of a software to encrypt messages with asymmetric cryptography is presented. In particular, is used the RSA (Rivest, Shamir and Adleman) algorithm to encrypt alphanumeric information. The software allows to... more

In this paper the development of a software to encrypt messages with asymmetric cryptography is presented. In particular, is used the RSA (Rivest, Shamir and Adleman) algorithm to encrypt alphanumeric information. The software allows to generate different public keys from two prime numbers provided by the user, the user must then select a public-key to generate the corresponding private-key. To encrypt the information, the user must provide the public-key of the recipient as well as the message to be encrypted. The generated ciphertext can be sent through an insecure channel, so that would be very difficult to be interpreted by an intruder or attacker. At the end of the communication, the recipient can decrypt the original message if provide his/her public-key and his/her corresponding private-key.

2022, E3S Web of Conferences

Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography. In this study developed a data security system by implementing the... more

Data security and confidentiality is one of the most important aspects of information systems at the moment. One attempt to secure data such as by using cryptography. In this study developed a data security system by implementing the cryptography algorithm Rivest, Shamir Adleman (RSA) and Vigenere Cipher. The research was done by combining Rivest, Shamir Adleman (RSA) and Vigenere Cipher cryptographic algorithms to document file either word, excel, and pdf. This application includes the process of encryption and decryption of data, which is created by using PHP software and my SQL. Data encryption is done on the transmit side through RSA cryptographic calculations using the public key, then proceed with Vigenere Cipher algorithm which also uses public key. As for the stage of the decryption side received by using the Vigenere Cipher algorithm still use public key and then the RSA cryptographic algorithm using a private key. Test results show that the system can encrypt files, decryp...

2022, Applied Computer Science

The major challenge being faced by the financial related institutions, such as e-Commerce has been insecurity. Therefore, there is urgent need to develop a scheme to protect transmitted financial information or messages from getting to... more

The major challenge being faced by the financial related institutions, such as e-Commerce has been insecurity. Therefore, there is urgent need to develop a scheme to protect transmitted financial information or messages from getting to the third party, intruder and/or unauthorized person(s). Such scheme will be based on Advanced Encryption Standard (AES) and Neural Data Security (NDS) Model. Based on this background, an AES using Time-based Dynamic Key Generation coupled with NDS model will be used to develop security model for preventing e-commerce related crimes. While AES will secure users' details in the database server and ensures login authentications, NDS model will fragment or partition sensitive data into High and Low levels of confidentiality. The sensitivity of the data will determine, which category of confidentiality the data will fall into. The fragmented data are saved into two different databases, on two different servers and on the same datacenter. In addition, ...

2022, BOHR Publisher

RSA's strong cryptosystem works on the principle that there are no trivial solutions to integer factorization. Furthermore, factorization of very large semi primes cannot be done in polynomial time when it comes to the processing power of... more

RSA's strong cryptosystem works on the principle that there are no trivial solutions to integer factorization. Furthermore, factorization of very large semi primes cannot be done in polynomial time when it comes to the processing power of classical computers. In this paper, we present the analysis of Fermat's Last Theorem and Arnold's Theorem. Also highlighted include new techniques such as Arnold's Digitized Summation Technique (A.D.S.T.) and a top-to-bottom, bottom-to-top approach search for the prime factors. These drastically reduce the time taken to factorize large semi primes as for the case in RSA Cryptosystem.

2022

People across the globe exchange information but security remains primary concern while sharing information (data or images). This paper highlights the encryption technique using Arnold’s cat mapping and RSA algorithm in which first... more

People across the globe exchange information but security remains primary concern while sharing information (data or images). This paper highlights the encryption technique using Arnold’s cat mapping and RSA algorithm in which first images are jostled using Arnold technique and then encrypted these jostled images using RSA algorithm. This concludes that the suggested new method will improve the security and encrypted and decrypted quality of images.

2022

Company ABC is a pharmaceutical company, and we discovered that it has problems in their business with regards to their manual business process. The current system uses Microsoft Excel as its inventory tracker and product database.... more

Company ABC is a pharmaceutical company, and we discovered that it has problems in their business with regards to their manual business process. The current system uses Microsoft Excel as its inventory tracker and product database. Through the use of an Agile driven approach, we were able to identify the company's issues. Through the use of this technique, the system we built is well aligned to address the issues that were identified. This is done through an iterative approach of interviews and feedback on their business process, possible solutions and constraints, and the system. With this medicine-based<br> inventory, it provides a system that keeps track of the company's sales, inventory movement & management, sales invoice creation, stock replenishment, and client contracts. After a sprint, validation is done through a client survey and feedback to improve the system. Our results showed that the Agile Methodology approach is effective in identifying problems with t...

2022, International Journal of Computer Applications

In modern days data transmission through a channel requires more security. Security based more important transmission is comparatively better & believable than simple transmission. The aim of this work to use RC5 algorithm for encryption... more

In modern days data transmission through a channel requires more security. Security based more important transmission is comparatively better & believable than simple transmission. The aim of this work to use RC5 algorithm for encryption and decryption of data for secure data transmission from one place to another place for proper communication purposes. Today this is utmost importance to send information confidentially through network without any risk for hackers or unauthorized possibility to access from the network. This urgently require security implementation devices in network for well secured transmission of data. Symmetric encryption cores provide data protection through the use of secret key only known as encryption, whereas decryption deals with the yield at the end of communication path. Today world require secure transmission through cryptographic algorithm. Keeping view in mind the proposed well defined RC5 architecture have been taken, based on the fact for suitability of each operation for encryption, high speed processing and possibility of area reduction. The work results of the study clearly indicate that logic implementation by this hardware is maximum clock frequency of 179 MHz and areas reduced to 50% as compare with the results of design of previous worker. The propose design is described in verilog, synthesized by Xilinx synthesis technology.

2022, 2018 IEEE Sensors Applications Symposium (SAS)

Internet of things (IoT), internetworking of smart devices, embedded with sensors, software, electronics and network connectivity that enables to communicate with each other to exchange and collect data through an uncertain wireless... more

Internet of things (IoT), internetworking of smart devices, embedded with sensors, software, electronics and network connectivity that enables to communicate with each other to exchange and collect data through an uncertain wireless medium. Recently IoT devices are dominating the world by providing it's versatile functionality and real-time data communication. Apart from versatile functionality of IoT devices, they are very low-battery powered, small and sophisticated, and experience lots of challenges due to unsafe communication medium. Despite the fact of many challenges, the energy issue is now becoming the prime concern. Optimization of algorithms in terms of energy consumption has not been explored specifically, rather most of the algorithms focus on hardware area to minimize it extensively and to maximize it on security issue as possible. But due to recent emerge of IoT devices, the main concern is shifting to moderate security and less energy consumption rate. We present ...

2021

The most common problem involves while the internet user logging into the website are phishing and key logger attacks. Most of the people even don‟t know about them. At present most of the websites and online banking system uses the... more

The most common problem involves while the internet user logging into the website are phishing and key logger attacks. Most of the people even don‟t know about them. At present most of the websites and online banking system uses the password contains a word, alphanumeric and special characters which are unique for each and every user. It will contain fixed password characters only. So, It can be stolen by adversaries easily. To prevent this researchers proposed graphical scheme, secret question. In our scheme captcha is created from the server and user performing a simple mathematical operation on the captcha digit. It can be entered along with the fixed part of the password. Our proposed system has a simple UI. User can set the logic as much as possible. Our scheme is immune to the phishing, key logger and bot attacks. In furthermore to add security to our scheme we use the modified RSA crypto system [5] that uses n prime numbers for encryption and decryption of the users credential.

2021

Electronic commerce has offered much less transaction costs and a suitable mode of business to consumers all over the world. As E-commerce is growing day by day, the risk of it being hit by a disaster is also increasing. The security in... more

Electronic commerce has offered much less transaction costs and a suitable mode of business to consumers all over the world. As E-commerce is growing day by day, the risk of it being hit by a disaster is also increasing. The security in web services plays an important part for this business. Any e-commerce business that wants to gain advantage over other business must have a solid and comprehensive security policy for the customers so that their data could be safe and secured. The online transaction need customer to give their personal data which keeps them in at risk. Our project will focus on creating a Disaster Recovery and Business Continuity Plan to protect E-commerce transactions and information against unauthorized access, use, alteration and destruction. We will implement security algorithms for safer transactions and security of information of customers. We will create a multi-layer encryption algorithm consisting of RSA and Fernet Cipher algorithms to secure the OTP messages sent during transactions. We will also create a database of customer information and encrypt it using DES algorithm. The result of our Project will provide a successful Disaster Recovery and Business Continuity Plan with Implementation of Security algorithms for a more secure Electronic Commerce Business.

2021, Journal of Innovation and Community Engagement

The Point of Sales (POS) system is a system that supports sales transactions where POS is currently evolving because it can record sales, record inventory, print invoices, calculate profits and improve services for businesspeople and... more

The Point of Sales (POS) system is a system that supports sales transactions where POS is currently evolving because it can record sales, record inventory, print invoices, calculate profits and improve services for businesspeople and entrepreneurs. InHome Café is one of the growing cafe in Subang, Bandung. Ease of access to purchase products through online services led to an increase in transactions. At InHome Café Subang, data management, data processing, and sales transaction processing used to rely on a manual system or paper-based recording, which open to risks in data management and security. Therefore, to solve the problem, a website-based Point of Sales System was developed to record sales, collect inventory, print invoices, calculate profits using the PHP programming language with the CodeIgniter framework, and MySQL. The system was developed using the Agile development system with a reasoning that a short-term system development that emphasizes client satisfaction was requi...

2021, Journal of Innovation and Community Engagement

The Point of Sales (POS) system is a system that supports sales transactions where POS is currently evolving because it can record sales, record inventory, print invoices, calculate profits and improve services for businesspeople and... more

The Point of Sales (POS) system is a system that supports sales transactions where POS is currently evolving because it can record sales, record inventory, print invoices, calculate profits and improve services for businesspeople and entrepreneurs. InHome Café is one of the growing cafe in Subang, Bandung. Ease of access to purchase products through online services led to an increase in transactions. At InHome Café Subang, data management, data processing, and sales transaction processing used to rely on a manual system or paper-based recording, which open to risks in data management and security. Therefore, to solve the problem, a website-based Point of Sales System was developed to record sales, collect inventory, print invoices, calculate profits using the PHP programming language with the CodeIgniter framework, and MySQL. The system was developed using the Agile development system with a reasoning that a short-term system development that emphasizes client satisfaction was requi...

2021, Scientific Periodicals on Information Technology Research - Discussion Paper Series

Company ABC is a pharmaceutical company, and we discovered that it has problems in their business with regards to their manual business process. The current system uses Microsoft Excel as its inventory tracker and product database.... more

Company ABC is a pharmaceutical company, and we discovered that it has problems in their business with regards to their manual business process. The current system uses Microsoft Excel as its inventory tracker and product database. Through the use of an Agile driven approach, we were able to identify the company's issues. Through the use of this technique, the system we built is well aligned to address the issues that were identified. This is done through an iterative approach of interviews and feedback on their business process, possible solutions and constraints, and the system. With this medicine-based inventory, it provides a system that keeps track of the company's sales, inventory movement & management, sales invoice creation, stock replenishment, and client contracts. After a sprint, validation is done through a client survey and feedback to improve the system. Our results showed that the Agile Methodology approach is effective in identifying problems with their business process and designing client-centric solutions. Based on our results, we were able to move in the right direction in solving the research problems and objectives. This research is a follow-up to our initial report regarding the development of a Pharmaceutical Inventory System through an Agile Methodology.

2021, ENGLISH FOR COMPUTER 1 WHY DO DATABASE IS IMPORTANT

2020, Iconic Research and Engineering Journals

In present day Social systems administration framework Data security is the most extreme basic issue in guaranteeing safe transmission of data through the web. Web has turned out to be increasingly across the board, if an unapproved... more

In present day Social systems administration framework Data security is the most extreme basic issue in guaranteeing safe transmission of data through the web. Web has turned out to be increasingly across the board, if an unapproved individual can gain admittance to this system, he can keep an eye on us as well as he can without much of a stretch chaos up our lives. System Security and Cryptography is an idea to ensure system and information transmission over remote system. Today information correspondence for the most part relies on computerized information correspondence. The insurance of sight and sound information, delicate data like charge cards, banking exchanges and interpersonal organization security numbers is winding up significant. The security of this classified information from unapproved access should be possible with numerous encryption strategies. Likewise organize security issues are presently getting to be significant as society is moving towards computerized data age. As an ever increasing number of clients associate with the web it pulls in a great deal of digital offenders. The errand of system security not just requires guaranteeing the security of end frameworks however of the whole arrange. In this paper, an endeavor has been made to present the different Network Security and Cryptographic ideas.

calculation is an awry cryptography calculation  If we consider the alphabet as numerical value 0 to 25 which is figured out the below table:

2019, Privacy Law Bulletin

In this article we explore the emergence of blockchain, its development and use before turning to the challenge the Australian privacy regime places on effective implementation and uptake. We will examine the limits imposed upon... more

In this article we explore the emergence of blockchain, its development and use before turning to the challenge the Australian privacy regime places on effective implementation and uptake. We will examine the limits imposed upon blockchain by Australia’s privacy law for use and storage of personal information. We will also explore the main areas of conflict between privacy and blockchain: correction, data breaches and jurisdiction.
As the law currently stands entities that are covered by the APPs should be extremely cautious when storing personal information on blockchains, as it may result in an arrangement that makes compliance with the APPs impossible.

2017

The data flows between two machines that i.e. source and destination the data should be locked in the two keys that are called Private and public keys. The algorithm that used to make strong security in data flow inside the computer... more

The data flows between two machines that i.e. source and destination the data should be locked in the two keys that are called Private and public keys. The algorithm that used to make strong security in data flow inside the computer network; in this research work is RSA. The algorithmused to encrypt and decrypt the flow of data between the source (A) and Destination(B). If the source (A) sends data to Destination (B) then my experiment could automates first A encrypts the message or Plaintext by using sources (A) private key and Public keys of A.In general, RSA data encrypting method useful to secure and lock data in the computer network.

2017

Challenges Nigeria organizations are facing which include embezzlement, fraud, misappropriation and mismanagement can be checkmated if there is a proper and secure documentation of all documents. Hence this work focuses on the design and... more

Challenges Nigeria organizations are facing which include embezzlement, fraud, misappropriation and mismanagement can be checkmated if there is a proper and secure documentation of all documents. Hence this work focuses on the design and Implementation of an Improve Document Management System for Oyo state Housing Corporation with special emphasis on security and space management; Waterfall design model and three-tier architecture was used in the design of this work. HTML, CSS, Javascript and Jquery were used for the codes at the Client side, PHP was used at the Server-side scripting and MySQL was used at the Data Server side in the work. PHP AES encryption algorithm was used in encryption and decryption of all allowed document types in the system while Zzlib library was used for the compression module in the work. A two weeks user evaluation of the system showed interesting usage scenarios and future trends for improving user interaction. The work made it easier for organizations to find document, securely store document, share document without stress. Considering the immense benefit this work holds, it is important for all organizations to key into this work as a means of securely documenting its documents.

2017

This paper provides an overview of the RSA algorithm, exploring the foundations and mathematics in detail. It then uses this base information to explore issues with the RSA algorithm that detract from the algorithms security.

2016

The following document will be overlooking the research carried out to develop a sales management system that will implement high end RSA encryption. The report consists of all the research carried out into the field of cybersecurity and... more

The following document will be overlooking the research carried out to develop a sales management system that will implement high end RSA encryption. The report consists of all the research carried out into the field of cybersecurity and sales management systems and oversees the development of the actual system. The research includes the types of encryption algorithms and the processes of encrypting data in a sales management system. various software development methodologies are looked at and the methodology used to develop the system is highlighted stating the advantages and disadvantages of using it The resulting system is tested and documented to allow for future maintenance and improvements.

2016

E-commerce has presented a new way of doing transactions all over the world using internet. The success of ecommerce depends greatly on how its information technology is used. Over the years the rate at which ecommerce sensitive... more

E-commerce has presented a new way of doing transactions all over the world using internet. The success of ecommerce depends greatly on how its information technology is used. Over the years the rate at which ecommerce sensitive information is sent over the internet and network has increased drastically. It is for this reason that every company wants to ensure that its ecommerce information is secured. There is need for ecommerce information transmitted via the internet and computer networks to be protected. There is substantial growth in the areas of credit card fraud and identity theft because the internet is a public network with thousands of millions of users. Amongst users are crackers or hackers that carry out the credit card fraud and identity theft in numerous ways facilitated by poor internet security; a concern regarding the exchange of money securely and conveniently over the internet increases. The criticality, danger, and higher priority importance of any e-commerce money transfer makes it a hot area of research interest in modern computer science and informatics. E-commerce industry is slowly addressing security issues on their internal networks but security protection for the consumers is still in its infancy, thus posing a barrier to the development of e-commerce. There is a growing need for technological solutions to globally secure ecommerce transaction information by using appropriate data security technology. The technology solution proposed for solving this security problem is the RSA cryptosystem. This research paper focuses on securing ecommerce information sent through the computer network and internet using RSA cryptography. It elucidates the implementation of RSA algorithm and shows that ecommerce security powered with RSA cryptography is very important in ecommerce transaction. While many attacks exist, the system has proven to be very secure.

2016

ABSTRACT This study addresses a problem related to a branch of computer security - data security. It proposes a higher level of efficiency in securing sensitive capable of three-layer encryption for additional data security. 3Crypt was... more

2016

Organizations in both public and private sectors have become increasingly dependent on electronic data processing. Protecting these important data is of supreme concern to the organizations and cryptography is one of the primary ways to... more

Organizations in both public and private sectors have become increasingly dependent on electronic data processing. Protecting these important data is of supreme concern to the organizations and cryptography is one of the primary ways to do the job. Public Key Cryptography is used to protect digital data going through an insecure channel from one place to another. As the government of Bangladesh is going to implement e-commerce and e-governance, public key cryptography should be implemented for bangla alphabets to ensure security of bangla data. In this paper, RSA algorithm is used to implement public key cryptography to encrypt and decrypt bangla alphabets.

2016

This project focuses on finding the possibilities of using current advanced cryptosystems and dongles to improve the security of stored backup files on allocated remote servers. Secret key and public key cryptography are discussed A... more

This project focuses on finding the possibilities of using current advanced cryptosystems and dongles to improve the security of stored backup files on allocated remote servers. Secret key and public key cryptography are discussed A number of advanced cryptosystems are identified, and their advantages and disadvantages are highlighted. A number of issues with using dongles to protect file security are identified, and the strengths of the chosen dongle for the prototype system are highlighted. A product prototype is deve loped to assess the contribution of cryptosystems and dongles to improve file security. The findings from the literature review show that cryptosystem can be used toimprove file security. However, the findings indicate that dongles may not be a viable solution to protect files from unauthorised access due to general issues associated with dongle-protected software. The results from the prototype system indicate that using cryptosystems are beneficial to improving fil...

2015

This paper is on an RSA example.

2014

In this paper we introduce an approach which is more secure than original RSA algorithm, which is used for digital signatures and encryption in public key cryptography. This approach eliminates the need to transfer n, the product of two... more

In this paper we introduce an approach which is more secure than original RSA algorithm, which is used for digital signatures and encryption in public key cryptography. This approach eliminates the need to transfer n, the product of two random but essentially big prime numbers, in the public key due to which it becomes difficult for the intruder to guess the factors of n and hence the encrypted message remains safe from the hackers. Thus this approach provides a more secure path for transmission and reception of messages through public key cryptography.

2013

The main objective of Securing data transmission by xml using lychrel numbers, RGB colors and one time password. The universal technique for providing Cryptography is the primary technique to assure data security. This scheme provides... more

The main objective of Securing data transmission by xml using lychrel numbers, RGB colors and
one time password. The universal technique for providing Cryptography is the primary technique to assure
data security. This scheme provides various factors to encrypt and decrypt the data using a key such as
Lychrel numbers and RGB colors as the password. There are three keys used to provide secure and reliable
data transmission with the RGB colors which is a primary security element which provides authentication.
Here colors and Time based one-time key are been used as the password for authentication process. Lychrel
numbers are used to encrypt and then decrypt the data that is to be transmitted.

2013

In this paper we will discuss the utilization of a set of waveforms derived from chaotic dynamical systems for compression and feature recognition in digital images. We will also describe the design and testing of an embedded systems... more

In this paper we will discuss the utilization of a set of waveforms derived from chaotic dynamical systems for compression and feature recognition in digital images. We will also describe the design and testing of an embedded systems implementation of the algorithm. We will show that a limited set of combined chaotic oscillations are sufficient to form a basis for the compression of thousands of digital images. We will demonstrate this in the analysis of images extracted from the solar heliospheric observatory (SOHO), showing that we are able to detect coronal mass ejections (CMEs) in quadrants of the image data during a severe solar event. We undertake hardware design in order to optimize the speed of the algorithm, taking advantage of its parallel nature. We compare the calculation speed of the algorithm in compiled C, enhanced Matlab, Simulink, and in hardware.

2011

Internet is treasure of information i.e. all information are available on the Internet. Security is the major challenge when sharing information on shared media. So many encryption algorithms like RSA, DES etc are developed to... more

Internet is treasure of information i.e. all information are available on the Internet. Security is the major challenge when sharing information on shared media. So many encryption algorithms like RSA, DES etc are developed to unauthorized access of information in any form. Encryption Algorithms gives the response depending on programming language in which they developed. Java Script is the most popular scripting language for development of Encryption Algorithms. Web browsers are used to retrieve the information stored on World Wide Web, the retrieval response may depends on many factors like Programming language, Operating System, Internet bandwidth, congestion etc. In this paper we have chosen RSA algorithm in JavaScript scripting language to analyzed performance on different web browsers and finally we study that different Web browsers perform differently on RSA Algorithm in terms of response time.