期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2013
卷号:1
期号:4
出版社:S&S Publications
摘要:In the today‟s world, security is required to transmit confidential information over the network. Securityis also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the datasecurity against malicious attacks.RSA algorithm is extensively used in the popular implementations of Public KeyInfrastructures. In asymmetric key cryptography, also called Public Key cryptography, two different keys (which forma key pair) are used. One key is used for encryption & only the other corresponding key must be used for decryption.No other key can decrypt the message – not even the original (i.e. the first) key used for encryption. The beauty of thisscheme is that every communicating party needs just a key pair for communicating with any number of othercommunicating parties. Once someone obtains a key pair, he /she can communicate with anyone else. In this paper, wehave done an efficient implementation of RSA algorithm using two public key pairs and using some mathematical logicrather than sending the e value directly as a public key.Because if an attacker has opportunity of getting the e value theycan directly find d value and decrypt the message.
关键词:Cryptography; RSA; Key; Symmetric Key and Asymmetric Key