RSA Encryption and Decryption System
RSA Encryption and Decryption System
ABSTRACT
Article Info For communication in the wireless networking, transmission of data over
Volume 6, Issue 5 network sometimes is not safe. In such case security of network is one of the
Page Number: 109-113 essential aspect in computer networking. Cryptography is antechnique of
Publication Issue : transforming an plaindata into encrypted one, and then retransform that
September-October-2020 encrypted data back to its plain (original) form. In this we authenticate the
sender to whom you want to send that data file. There are two different
techniques of cryptography, symmetric key cryptography (called public-key
cryptography) algorithms and asymmetric key cryptography (called public-key
cryptography) algorithms. There are also various algorithms for encrypted data
Article History using either public or private key or both. This paper describes RSA algorithm
Accepted : 20 Sep 2020 which first convert our data into other form and then encrypt it using RSA
Published : 28 Sep 2020 public key encryption at sender side & at receiver side, first it authenticate the
receiver then decrypt the data/ file and convert into original form.
Keywords : Encryption, Symmetric Key Cryptography, Asymmetric Key
Cryptography, RSA Encryption& Decryption, Key Distribution, RSA
Copyright: © the author(s), publisher and licensee Technoscience Academy. This is an open-access article distributed
under the terms of the Creative Commons Attribution Non-Commercial License, which permits unrestricted non-
commercial use, distribution, and reproduction in any medium, provided the original work is properly cited
109
Neha Bansal et al Int J Sci Res CSE & IT, September-October-2020; 6 (5) : 109-113
the confidentiality but also ensure data-integrity, electronic data with its secret key. During encryption
non-repudiated and authentication. it will be in the main memory.
Key Distribution:
4) At receiver end if any unknown person tries to in this paper RSA-2048 is used for encrypting the
access the data, due to encryption, he is not able to message.
encrypt the message because he does not know
about the private key. Private key is not IV.CONCLUSION
distributed over network. So not possible for
unauthorized user to decrypt the message. A public key encryption technique is generally used
5) When authorized receiver tries to see the actual for this security in the network. During the lifetime
message from encrypted one then he has to use his of cryptographic information, the information is
private key for encryption. First it verify the user either “in transit” (e.g., is inthe process of distributed
then show him the encrypted message. Using nature information is available to theauthorized
private key when he tries to decrypt the message, communications users for use) or is “at rest” (e.g.,
first message is convert into bits form as security is theInformation is stored in storage). In either case,
done at physical layer. From that bits form, there is need of protecting the key material. However,
original data is extracted. Thus receiver is able to which protection mechanism is used may vary with
read the message. time. With increase in development technique
various ways of hacking are developed.Although
Key Selection: there are several methods of protecting our data,
these methods are not provide same security for
The security of this encryption technique relies on different data. So it is completely upto which type is
the fact of calculating the prime numbers. As data is selected for sending, then protection
computation decrease, less effective the algorithm mechanism is used. In addition, the mechanisms used
works. To make the algorithm more effective donot guarantee for protection of data. The
computation power must be high. The encryption of implementation and the associated keymanagement
data/ message is completely depending on the Key need to provide adequate security to prevent any
size which is used for encrypting the message. Higher attack from beingsuccessful.
the key size, it increases the exponential terms which
lead to decrease in computation power lead to less V. FUTURE SCOPE
effective algorithm. RSA keys are1024 or 2048 or
4096-bits long. The National Institute of Standards In today’s world, protection of data is most critical.
and Technology (NIST) has published some standards Encryption is the most reliable way to secure data in
and guidance for which cryptography technique is wireless data transmission. The sensitive dataof
used for protecting for sensitive and unclassified National security agencies and major financial
information. Using RSA-1024 key size, security is institutions have protected using various mechanisms
less as it is no longer fully secured against all the of cryptography and encryption. The use of such
attacks or also it is says that 1024 bits RSA may be techniques is growing rapidly. It is spread in a much
cracked by hackers in the near future. They predict wider set of industry sectors. With increase in the
that the key with longer size may affect the range of applications and platforms cryptography and
performance i.e. it take long time to process data but encryption have become one of the latest
too small size key may or may not provide adequate technologies in the IT security industry – the
security. They predict that 1024-bits is good till 2010 challenge is that we are able to handle such
while 2048-bits is good till 2030 after that 3072-bits is difficulties to secure our data. Also we have to
needed. This is completely up to their prediction. So increase CPU performance via selecting suitable key
size for variety of data and also send data in parallel [5]. Agrawal, Ekta& Pal, Parashu. (2017). It is a
form i.e. multiple data is send to multiple receiver Secure and Fast Approach for Encryption and
simultaneously. Only selected user is able to receive Decryption of Message Communication.
data that is already added in the sender’s list. The International Journal of Engineering Science
encryption and decryption of data is only for and Computing. 7. 5.
enhancing the security for secure data transmission [6]. Panford, Joseph &Yeng, Prosper &Hayfron-
over internet. It also provide assurance that an Acquah, James &Twum, Frimpong. (2016). An
unauthorized person is not able to access this data. Efficient Symmetric Cipher Algorithm for Data
The future work is to provide to encrypt or decrypt Encryption. International Resaerch Journal of
other types of files (except text file), including audio, Engineering and Technology. 3. 1713 - 1732.
& video. Also there is need to develop such algorithm [7]. Nisha, Shireen&Farik, Mohammed. (2017).
which take the advantage of both symmetric and RSA Public Key Cryptography Algorithm – A
asymmetric key cryptography which makes the Review.International Journal of Scientific &
encryption process more easier and faster. Technology Research. 6. 187-191.
[8]. F. Yan,C. Lin, and Y. Jian-Wen in 2015
Seventh International Conference on
VI. REFERENCES Measuring Technology and Mechatronics
Automation,"Computer Network Security and
[1]. Xin Zhou and XiaofeiTang,"Research and Technology Research,". Nanchang, 2015, pp.
implementation of RSA algorithm for 293-296, doi: 10.1109/ICMTMA.2015.77.
encryption and decryption,"Proceedings of [9]. Abdullah, Ako. (2017). For Encrypt and
2011 6th International Forum on Strategic Decrypt Data Advanced Encryption Standard
Technology, Harbin, Heilongjiang,2011,pp. (AES).
1118-1121,doi:10.1109/IFOST.2011.6021216 [10]. Ukwuoma, Henry &Hammawa, Mohammed.
[2]. Abdelhalim, mohamed b & El-Mahallawy, (2015). Optimised Key Generation for RSA
Mohamed &Ayyad, Mohammad. (2013). In Encryption. IISTE. 6. 2222-2871.
RFID SystemDesign and Implementation of an
Encryption Algorithm is available.
International Journal of RFID Security and Cite this article as :
Cryptography.2)51-
57.10.20533/ijrfidsc.2046.3715.2013.0007. Neha Bansal, Sukhdeep Singh, "RSA Encryption and
[3]. Osho, Oluwafemi&Zubair, Yunus&Ojeniyi, Decryption System", International Journal of
Joseph &Osho, Lauretta. (2014). A Simple Scientific Research in Computer Science, Engineering
Encryption and Decryption System. and Information Technology (IJSRCSEIT), ISSN :
[4]. Aminudin, Nur&Maseleno, 2456-3307, Volume 6 Issue 5, pp. 109-113,
Andino&Shanmugam, Hemalatha& Kumar, K September-October 2020. Available at
&Fauzi, &Irviani, Rita &Muslihudin, doi : https://doi.org/10.32628/CSEIT206520
Muhamad. (2018). Nur Algorithm on Data Journal URL : http://ijsrcseit.com/CSEIT206520
Encryption and Decryption.International
Journal of Engineering and Technology.7.
10.14419/ijet.v7i2.26.14363.