Data Encryption and Decryption Using RSA Algorithm in a Network Environment

Goshwe, Nentawe Y.
May 2014
International Journal of Computer Science & Network Security;May2014, Vol. 14 Issue 5, p82
Academic Journal
One of the principal challenges of resource sharing on data communication network is its security. This is premised on the fact that once there is connectivity between computers sharing some resources, the issue of data security becomes critical. This paper presents a design of data encryption and decryption in a network environment using RSA algorithm with a specific message block size. The algorithm allows a message sender to generate a public keys to encrypt the message and the receiver is sent a generated private key using a secured database. An incorrect private key will still decrypt the encrypted message but to a form different from the original message.


Related Articles

  • An implementation of enhanced public key infrastructure. Tan, Syh-Yuan; Yau, Wei-Chuen; Lim, Boon-Hock // Multimedia Tools & Applications;Aug2015, Vol. 74 Issue 16, p6481 

    In this paper, we present the implementation of an enhanced public key infrastructure (PKI) which supports not only conventional public key cryptography (PKC) but also identity-based cryptography (IBC). In addition, we discuss the possible way of placing together IBC and PKI as well as solving...

  • The new period encryption technology in the application the study of network security. jinglin // Applied Mechanics & Materials;2014, Issue 685, p599 

    with the rapid development of computer, network is also in constant development. A variety of network attacks and the corresponding means also breed, network security has become now the human network life about to ask. One of the most important methods to protect the network security is a...

  • Cryptanalysis of Blind Signature Schemes. Singh, Nitu; Das, Sumanjit // International Journal of Computer Science & Network Security;May2014, Vol. 14 Issue 5, p73 

    Security of the consumer's data over internet is the major problem in present time. In this paper we have analyzed blind signature schemes based on RSA and with taking advantage of elliptic curve cryptography to achieve the security goals. Blind signature scheme is one of the security protocol...

  • Image Encryption Using Parallel RSA Algorithm on CUDA. Tuteja, Vaibhav // International Journal of Computer Networks & Communications Secu;Jul2014, Vol. 2 Issue 7, p232 

    In this paper we discuss Image Encryption and Decryption using RSA Algorithm which was earlier used for text encryption. In today's era it is a crucial concern that proper encryption decryption should be applied so that unauthorized access can be prevented. We intend to build a general RSA...

  • Security using image processing. Kapur, Jyotika; Baregar, Akshay. J. // International Journal of Managing Information Technology;May2013, Vol. 5 Issue 2, p13 

    Using image stitching and image steganography security can be provided to any image which has to be sent over the network or transferred using any electronic mode. There is a message and a secret image that has to be sent. The secret image is divided into parts. The first phase is the Encrypting...

  • Multi-Level Steganographic Algorithm for Audio Steganography using LSB, Parity Encoding and Advanced LSB Technique. Kaur, Kamalpreet; Verma, Deepankar // International Journal of Advanced Research in Computer Science;Jul/Aug2013, Vol. 4 Issue 9, p184 

    In this era of emerging technologies, electronic communication has become an integral and significant part of everyone's life because it is simpler, faster and more secure. The purpose of this paper is to come up with a technique hiding the presence of secret message and increase the security...

  • IMPROVED NEW VISUAL CRYPTOGRAPHIC SCHEME USING ONE SHARED IMAGE. Gowramma, B. H.; Shyla, M. G.; Vivekananda // International Journal of Advances in Engineering & Technology;Jul2014, Vol. 7 Issue 3, p957 

    Visual cryptography scheme is a cryptographic technique which allows visual information (e.g. printed text, handwritten notes, and picture) to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. The Improved Visual...

  • a New Certificateless Forward Secure Proxy Signcryption Scheme. Kening Liu; Junyao Ye; Yinglian Wang // Applied Mechanics & Materials;2014, Issue 685, p659 

    This paper proposes a new certificateless forward secure proxy signcryption scheme based on DLP. Compared with other similar schemes, the scheme has overcome key escrow problem in the id-based cryptography and saving certificate problem in PKI cryptography. The scheme has some good nature, such...

  • Visual Cryptography (VC) using Zigzag Scan Approach.  // International Journal of Computer Science Engineering & Technolo;Sep2011, Vol. 1 Issue 8, p456 

    This paper proposes a new method of Visual Secret Sharing using Zigzag Scan approach. Non-expanded shares are generated by this scheme. This overcomes the drawback of Hilbert Curve approach, that is, the input should be a square image of size which is an integral power of 2.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics