0% found this document useful (0 votes)
13 views

RSA Encryption and Decryption System

Uploaded by

triplefour2112
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

RSA Encryption and Decryption System

Uploaded by

triplefour2112
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

International Journal of Scientific Research in Computer Science, Engineering and Information Technology

ISSN : 2456-3307 (www.ijsrcseit.com)


doi : https://doi.org/10.32628/CSEIT206520
RSA Encryption and Decryption System
Neha Bansal, Sukhdeep Singh
Department of Computer Science Engineering, Institute of Technology, Bhaddal, Ropar, Punjab, India

ABSTRACT

Article Info For communication in the wireless networking, transmission of data over
Volume 6, Issue 5 network sometimes is not safe. In such case security of network is one of the
Page Number: 109-113 essential aspect in computer networking. Cryptography is antechnique of
Publication Issue : transforming an plaindata into encrypted one, and then retransform that
September-October-2020 encrypted data back to its plain (original) form. In this we authenticate the
sender to whom you want to send that data file. There are two different
techniques of cryptography, symmetric key cryptography (called public-key
cryptography) algorithms and asymmetric key cryptography (called public-key
cryptography) algorithms. There are also various algorithms for encrypted data
Article History using either public or private key or both. This paper describes RSA algorithm
Accepted : 20 Sep 2020 which first convert our data into other form and then encrypt it using RSA
Published : 28 Sep 2020 public key encryption at sender side & at receiver side, first it authenticate the
receiver then decrypt the data/ file and convert into original form.
Keywords : Encryption, Symmetric Key Cryptography, Asymmetric Key
Cryptography, RSA Encryption& Decryption, Key Distribution, RSA

I. INTRODUCTION cryptography algorithms are used for encrypting data


and make it unreadable to understand and the only
Due to greed, power, publicity or desire to access way to make it understand we can use key to decrypt
forbidden information, an unauthorized person may data. There are various techniques for this purpose.
try to access our person information while we We can use Hash function for this purpose can be
send our data over internet in wireless environment. used in which we use hash key for encrypting data
Every day, many users generate data and send it over and send it over internet. Same hash key is used to
internet in many areas. So, communication over decrypt data over receiver. Other method, symmetric
internet is important part in today life.When we set encryption key in which same key is used for
up network there should be high data securitydue to decrypting the data. Sender first encrypts the data
the growing threat of hackers trying to infect as into cipher text using key and Receiver use the same
many computers possible. So to avoid misuse of data, key for decrypting the data. In the Asymmetric Key
there is need of protecting the data/ file in such era. Encryption, different key are use at receiver end and
Network security involves the authentication of also at sender end. The cryptography not only ensure
receiver and decrypts the data to right person. So

Copyright: © the author(s), publisher and licensee Technoscience Academy. This is an open-access article distributed
under the terms of the Creative Commons Attribution Non-Commercial License, which permits unrestricted non-
commercial use, distribution, and reproduction in any medium, provided the original work is properly cited
109
Neha Bansal et al Int J Sci Res CSE & IT, September-October-2020; 6 (5) : 109-113

the confidentiality but also ensure data-integrity, electronic data with its secret key. During encryption
non-repudiated and authentication. it will be in the main memory.

II. METHODS AND MATERIAL Asymmetric Key Cryptography

Why Encryption? As compared to symmetric key, in Asymmetric key


cryptography we use two different key.one for
With increase in demand of sending data over encrypting the data at sender side and other at
internet in wireless network, may be stolen by receiver side for decrypting the data. Sender send us
unauthorized person. Hackers always try to steal and public key for encryption of data and while
reveal someone’s personal information. The reason encrypting the data it generate cipher text and also
behind hacking is not to learn something but to take generate the private key. When sender sends the data
revenge by blackmailing to reveal their personal at other end, it sends cipher key as well as private key
information to the world or sometimes it may be for decryption of data. This cryptography technique
their greed. To avoid such things encryption resolves two problems of symmetric algorithms. One
techniques are used. The goal of encryption of the problem is key distribution i.e. two different
techniques are as: users use same key which is distributed over network
which compromises the security of data. Second one
1) Authentication: while sending message over is digital signatures which ensure all the user that
internet wirelessly, Sender and receiver’ identity data is send by particular individual. So there is lack
should be verified. of authentication of receiver.Various algorithm are
2) Data Confidentiality: It ensures that used for this purpose like RSA ,Diffie Hellman, XTR
unauthorized person is not able to gain access on etc. XTR based on difficulties of solving discrete
the data. Only authorize persons are able to gain logarithm related problems in the finite field which
access on data. make it more complex. In Diffie Hellman, it allows
3) Integrity: There is no change in the content of the two nodes to exchange data over an insecure
message while sending over wireless network. medium it is also based on discrete algorithm
The correct message is received to receiver. problems. On the other hand if we consider RSA
There is no modification or amendment of data. algorithm this algorithm is used both for encrypting
4) Non- repudiated: It ensures that sender is the data as well as for digital signature. The key size
actually sending the data. He can’t deny that he for this RSA algorithm must be greater that 1024 bits
is not sending message. to get reasonable security of exchange data over
internet in wireless medium. In further section we
Symmetric Key Cryptography
how RSA algorithm works.

In this data is converted into other form which is not


RSA Encryption & Decryption
understood by anyone who does not how to decrypt
it. In this cryptography same private key is used by
RSA algorithm is public key encryption cryptography
both receiver and sender. Various algorithm are use
in which it generates two keys i.e. public key and
in this like AES, DES, IDEA, which are block cipher.
private key. Public key is published to all other users
AES (Advance Encryption Standard) are like blocked
hence all users know about this key while private key
cipher in which data is encrypted in block of
is kept with user or authenticate receiver only.RSA

Volume 6, Issue 5, September-October-2020 | http://ijsrcseit.com


110
Neha Bansal et al Int J Sci Res CSE & IT, September-October-2020; 6 (5) : 109-113

2048 encryption technique crypt the data of length


up to 245 bytes. The most important advantage of How RSA algorithm actually works:
using this key is that it is almost support on all
hardware. Also it take less time to generate the key
thus less CPU usage and as result less battery drainage.
RSA Algorithm is generally based on idea that it
generate two prime number which must be kept
secret only for authenticate receiver. If any
unauthorized person know about these prime
numbers, that person can decode the message.

III. RESULTS AND DISCUSSION

Key Distribution:

Suppose that user (1) wants to send message to user(2)


using RSA encryption, then user(1) uses the public
key for encrypting the message. User(1) does not use The idea behind the RSA algorithm is that it is
his public key. For encrypting the message, user(1) difficult to compute the prime factors for decrypting
use the public key of the user(2) i.e. user(1) must message. On the basis of prime factors generate by
have knowledge of user(2)’s public key. For this, the client’ private key, it generate the public key
user(2) distribute his public key to the entire user. which is send over wireless network to all. Here in
The sender (user1) who wants to send message to this case, private key is only at client end and which
user(2), his public key which is already distributed lead to secure transformation.
over network. Thus using user(2)’s public key ,user(1)
encrypt his message and send to user(2). Now at 1) First of all, on receiver system, private key is
receiver end, if any unauthenticated user tries to generated by receiver. For this , he select any two
decrypt this message, he is not able to encrypt that prime Numbers. Receiver also choose RSA public
message because only public key is distributed over key and generate his private key. Now at receiver
network. For decrypted the message, user need end private key is generated.
private key. Hence if any unauthorized person tries 2) If any sender wants to send message to receiver,
to do so, it indicates that you are not authorized user. first of all he has to obtain his public key which
This level of security is used in this method of key receiver has used or sending message. This key is
distribution. As private key is not distributed over distributed by the receiver over the network.
network, data is safely decrypted by authenticate user 3) Sender who sends the message use receiver’ public
only. At receiver end, receiver has to use his private key and decrypt the message. In this case, he is
key for decrypt the message. If private key is lost not encryption of text message, first of all plain
then it is not possible to decrypt message. text message is converted into bits form i.e.
0010000100010111001001 then sender encrypt
the message using public key for encryption. After
encryption, send the crypted file over network
with authenticate receiver.

Volume 6, Issue 5, September-October-2020 | http://ijsrcseit.com


111
Neha Bansal et al Int J Sci Res CSE & IT, September-October-2020; 6 (5) : 109-113

4) At receiver end if any unknown person tries to in this paper RSA-2048 is used for encrypting the
access the data, due to encryption, he is not able to message.
encrypt the message because he does not know
about the private key. Private key is not IV.CONCLUSION
distributed over network. So not possible for
unauthorized user to decrypt the message. A public key encryption technique is generally used
5) When authorized receiver tries to see the actual for this security in the network. During the lifetime
message from encrypted one then he has to use his of cryptographic information, the information is
private key for encryption. First it verify the user either “in transit” (e.g., is inthe process of distributed
then show him the encrypted message. Using nature information is available to theauthorized
private key when he tries to decrypt the message, communications users for use) or is “at rest” (e.g.,
first message is convert into bits form as security is theInformation is stored in storage). In either case,
done at physical layer. From that bits form, there is need of protecting the key material. However,
original data is extracted. Thus receiver is able to which protection mechanism is used may vary with
read the message. time. With increase in development technique
various ways of hacking are developed.Although
Key Selection: there are several methods of protecting our data,
these methods are not provide same security for
The security of this encryption technique relies on different data. So it is completely upto which type is
the fact of calculating the prime numbers. As data is selected for sending, then protection
computation decrease, less effective the algorithm mechanism is used. In addition, the mechanisms used
works. To make the algorithm more effective donot guarantee for protection of data. The
computation power must be high. The encryption of implementation and the associated keymanagement
data/ message is completely depending on the Key need to provide adequate security to prevent any
size which is used for encrypting the message. Higher attack from beingsuccessful.
the key size, it increases the exponential terms which
lead to decrease in computation power lead to less V. FUTURE SCOPE
effective algorithm. RSA keys are1024 or 2048 or
4096-bits long. The National Institute of Standards In today’s world, protection of data is most critical.
and Technology (NIST) has published some standards Encryption is the most reliable way to secure data in
and guidance for which cryptography technique is wireless data transmission. The sensitive dataof
used for protecting for sensitive and unclassified National security agencies and major financial
information. Using RSA-1024 key size, security is institutions have protected using various mechanisms
less as it is no longer fully secured against all the of cryptography and encryption. The use of such
attacks or also it is says that 1024 bits RSA may be techniques is growing rapidly. It is spread in a much
cracked by hackers in the near future. They predict wider set of industry sectors. With increase in the
that the key with longer size may affect the range of applications and platforms cryptography and
performance i.e. it take long time to process data but encryption have become one of the latest
too small size key may or may not provide adequate technologies in the IT security industry – the
security. They predict that 1024-bits is good till 2010 challenge is that we are able to handle such
while 2048-bits is good till 2030 after that 3072-bits is difficulties to secure our data. Also we have to
needed. This is completely up to their prediction. So increase CPU performance via selecting suitable key

Volume 6, Issue 5, September-October-2020 | http://ijsrcseit.com


112
Neha Bansal et al Int J Sci Res CSE & IT, September-October-2020; 6 (5) : 109-113

size for variety of data and also send data in parallel [5]. Agrawal, Ekta& Pal, Parashu. (2017). It is a
form i.e. multiple data is send to multiple receiver Secure and Fast Approach for Encryption and
simultaneously. Only selected user is able to receive Decryption of Message Communication.
data that is already added in the sender’s list. The International Journal of Engineering Science
encryption and decryption of data is only for and Computing. 7. 5.
enhancing the security for secure data transmission [6]. Panford, Joseph &Yeng, Prosper &Hayfron-
over internet. It also provide assurance that an Acquah, James &Twum, Frimpong. (2016). An
unauthorized person is not able to access this data. Efficient Symmetric Cipher Algorithm for Data
The future work is to provide to encrypt or decrypt Encryption. International Resaerch Journal of
other types of files (except text file), including audio, Engineering and Technology. 3. 1713 - 1732.
& video. Also there is need to develop such algorithm [7]. Nisha, Shireen&Farik, Mohammed. (2017).
which take the advantage of both symmetric and RSA Public Key Cryptography Algorithm – A
asymmetric key cryptography which makes the Review.International Journal of Scientific &
encryption process more easier and faster. Technology Research. 6. 187-191.
[8]. F. Yan,C. Lin, and Y. Jian-Wen in 2015
Seventh International Conference on
VI. REFERENCES Measuring Technology and Mechatronics
Automation,"Computer Network Security and
[1]. Xin Zhou and XiaofeiTang,"Research and Technology Research,". Nanchang, 2015, pp.
implementation of RSA algorithm for 293-296, doi: 10.1109/ICMTMA.2015.77.
encryption and decryption,"Proceedings of [9]. Abdullah, Ako. (2017). For Encrypt and
2011 6th International Forum on Strategic Decrypt Data Advanced Encryption Standard
Technology, Harbin, Heilongjiang,2011,pp. (AES).
1118-1121,doi:10.1109/IFOST.2011.6021216 [10]. Ukwuoma, Henry &Hammawa, Mohammed.
[2]. Abdelhalim, mohamed b & El-Mahallawy, (2015). Optimised Key Generation for RSA
Mohamed &Ayyad, Mohammad. (2013). In Encryption. IISTE. 6. 2222-2871.
RFID SystemDesign and Implementation of an
Encryption Algorithm is available.
International Journal of RFID Security and Cite this article as :
Cryptography.2)51-
57.10.20533/ijrfidsc.2046.3715.2013.0007. Neha Bansal, Sukhdeep Singh, "RSA Encryption and
[3]. Osho, Oluwafemi&Zubair, Yunus&Ojeniyi, Decryption System", International Journal of
Joseph &Osho, Lauretta. (2014). A Simple Scientific Research in Computer Science, Engineering
Encryption and Decryption System. and Information Technology (IJSRCSEIT), ISSN :
[4]. Aminudin, Nur&Maseleno, 2456-3307, Volume 6 Issue 5, pp. 109-113,
Andino&Shanmugam, Hemalatha& Kumar, K September-October 2020. Available at
&Fauzi, &Irviani, Rita &Muslihudin, doi : https://doi.org/10.32628/CSEIT206520
Muhamad. (2018). Nur Algorithm on Data Journal URL : http://ijsrcseit.com/CSEIT206520
Encryption and Decryption.International
Journal of Engineering and Technology.7.
10.14419/ijet.v7i2.26.14363.

Volume 6, Issue 5, September-October-2020 | http://ijsrcseit.com


113

You might also like