A Study On Enhancing Public Key Cryptography by The Use of RSA and Some Symmetric and Asymmetric Key Cryptography Algorithms.
A Study On Enhancing Public Key Cryptography by The Use of RSA and Some Symmetric and Asymmetric Key Cryptography Algorithms.
Abstract:
In current scenario everything is being transferred on the web and other communication medium. So
that we need to make our data secure from all other attacker and unauthorized person. So that we
have to give lot of protection to the transmitting data. For that we have lots of cryptography
algorithm .But all of them do not provide level best protection in today’s world as there are lots of ways
to make that algorithm cracked and the cryptanalyst can retrieve the plain text so easily. Data security
is very important in wireless network and for this cryptography plays a crucial role which means “secret
writing”. In Cryptography encryption decryption of data is done by using secret key to provide data
confidentiality, data integrity and data authentication. This paper provide a comparative study between
various encryption algorithm like AES,DES, RSA and DIFFIE-HELLMAN .Here we compare the different
factors of both symmetric key and asymmetric key encryption algorithm.
Keywords:
Public Key, RSA, Cryptography, encryption, symmetric key encryption, asymmetric key encryption.
___________________________________________________________________________________
Introduction:
Cryptography, a word with Greek origins, means “secret writing” is the science of devising methods
that allow for information to be sent in a secure form in such a way that the only person able to
retrieve this information is the intended recipient. It makes the message unreadable and that can make
the message too secure. The message to be sent through an unreliable medium is known as plaintext,
which is encrypted before sending over the medium. The encrypted message is known as cipher text,
which is received at the other end of the medium and decrypted to get back the original plaintext
message. Hence a cryptosystem is a collection of algorithms and associated procedures for hiding and
revealing information. So that the cryptography is mainly used for making the data safe when it is
transmitting over the communication medium of at the storage space. The main concern of
cryptographic algorithm is that the security provided by that algorithm that should be at its best. There
are two kind of approaches like symmetric and asymmetric way of communication or algorithm. Here
we are concerning on public key cryptosystem in which there are two kind of keys are used as public
key and private key. There are many famous algorithm as RSA, Diffie Hellman etc. In recent days these
RSA, Diffie Hellman algorithms are not that much secure as there are many cryptanalyst who can crack
it.
RSA is a cryptosystem for public-key encryption, and is widely used for securing sensitive data,
particularly when being sent over an insecure network such as the Internet. RSA was first
described in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman of the Massachusetts Institute
of Technology. Public-key cryptography, also known as asymmetric cryptography, uses two
different but mathematically linked keys, one public and one private. The public key can be
shared with everyone, whereas the private key must be kept secret. In RSA cryptography, both
the public and the private keys can encrypt a message; the opposite key from the one used to
encrypt a message is used to decrypt it. This attribute is one reason why RSA has become the
most widely used asymmetric algorithm: It provides a method of assuring the confidentiality,
integrity, authenticity and non-reputability of electronic communications and data storage.
A comparative study of encryption techniques in terms of public kry, symmetric key and
asymmetric key algorithms analyzed that symmetric key algorithms is viewed to be good in terms
of speed and power consumption while asymmetric key algorithms in terms of tunability. In the
symmetric key encryption AES algorithm is found to be better in terms of cost, security and
implementation. In asymmetric key encryption RSA algorithm is better in terms of speed and
security.
References:
1)A.J.Menezes ,P.C.Van Oorschot, and S.Vanstone , “Handbook of Applied
cryptography”, CRC Press, Boca Ration,Florida, USA,1997.
2) Amare Anagaw Ayele1 , Dr. Vuda Sreenivasarao.,” A Modified RSA Encryption
Technique Based on Multiple public keys, International Journal of Innovative Research
in Computer and Communication Engineering ISSN (Online): 2320 – 9801Vol.1, Issue 4,
June 2013
3) Sonia Goyat.,” Genetic key generation for public key cryptography “,International
Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-3,
July 2012
4) B.Schenier. “Applied Cryptography”, John Wiley & Sons Inc, New York, Second
Edition, 1996.
5) William Stallings, ”Cryptography and Network Security”, Prentice Hall, Upper Saddle
River, New Jersy, USA, Second Edition ,1997.
6) Ashish Agarwala R Saravanan,” A Public Key Cryptosystem Based on Number
Theory” 978-1-4673-0255-5/12,IEEE2012.
7) Pell‟s RSA key generation and its security analysis
Monika Agrawal “A Comparative Survey on Symmetric Key Encryption Techniques” In
International Journal on Computer Science and Engineering (IJCSE) Vol.4 No. 05 May
2012
8) B.Schenier. “Applied Cryptography”, John Wiley & Sons Inc, New York, Second
Edition, 1996.
9)William Stallings, ”Cryptography and Network Security”, Prentice Hall, Upper Saddle
River, New Jersy, USA, SecondEdition ,1997.
10)Ashish Agarwala R Saravanan,” A Public Key Cryptosystem Based on Number
Theory” 978-1-4673-0255-5/12,IEEE2012
11)Pell‟s RSA key generation and its security analysis
12)http://searchsecurity.techtarget.com/definition/Diffie-Hellman-key-exchange