Paper 11888
Paper 11888
net/publication/373710831
CITATION READS
1 350
3 authors, including:
SEE PROFILE
All content following this page was uploaded by Dazin Kaing Balaram on 06 September 2023.
Abstract: Cryptographic technique is one of the principal means to protect information security. Not only
has it to ensure the information confidential, but also provides digital signature, authentication, secret sub-
storage, system security and other functions. Therefore, the encryption and decryption solution can ensure
the confidentiality of the information, as well as the integrity of information and certainty, to prevent
information from tampering, forgery and counterfeiting. Encryption and decryption algorithm's security
depends on the algorithm while the internal structure of the rigor of mathematics, it also depends on the key
confidentiality. Key in the encryption algorithm has a pivotal position, once the key was leaked, it means
that anyone can be in the encryption system to encrypt and decrypt information, it means the encryption
algorithm is useless. Therefore, what kind of data you choose to be a key, how to distribute the private key,
and how to save both data transmission keys are very important issues in the encryption and decryption
algorithm. This paper proposed an implementation of a complete and practical RSA encrypt/decrypt
solution based on the study of RSA public key algorithm. In addition, the encrypt procedure and code
implementation is provided in details.
I. INTRODUCTION
NETWORKS are a must for any company to achieve competitive advantage; however, all communication over any
network, mainly the Internet needs to be secure to prevent breach of confidential and sensitive data. An IBM sponsored
benchmark study carried out by Ponemon Institute for the past 11 years highlights the alarming boost (see Fig. 1) in the
average cost of data breach globally (ACoDBG) each year with 2016 being $4 million, a 29 percent increase since
2013.
Networks aren’t just used by businesses but also by home users. Hence, network security is of utmost importance. This
brings in cryptography, as a major component enabling secure communications over networks. Cryptography looks at
methods of hiding the actual message from unintended recipients by scrambling the data via an algorithm. The first
proven use of cryptography dates back to 1900 B.C, Ancient Egypt, when a document writer used irregular hieroglyphs
(writing system using a combination of graphics, symbols and alphabet) while copying a document. Modern
cryptography algorithms offer more security than the ancient ones and can be divided into 3 categories, namely secret
key, public key and hash functions. The focus of this paper is public key cryptography (PKC) algorithm.
II. METHODOLOGIES
RSA PUBLIC KEY CRYPTOGRAPHY Known also as asymmetric encryption, PKC works on the concept of dual
keys. While the recipients’ public key is used to encrypt the message, the private key is used for decryption, so there is
no need to share a secret key as required in secret key (symmetric) cryptography. PKC is largely used for
authentication, non-repudiation, and key exchange. The most widely used PKC algorithm in the world today, Rivest,
Shamir, and Adleman algorithm (RSA) is considered superlative in comparison with algorithms such as the symmetric
key Advanced Encryption Standard (AES) (Ponemon 2014). and the asymmetric Goldwasser and Micali (GM)
algorithms. Officially launched in 1977 and named with the surname initials of inventors Ron Rivest, Adi Shamir, and
Copyright to IJARSCT 66
www.ijarsct.co.in
ISSN (Online) 2581-9429
IJARSCT
International Journal of Advanced Research in Science,, Communication and Technology (IJARSCT)
International Open-Access,
Access, Double-Blind,
Double Peer-Reviewed,
Reviewed, Refereed, Multidisciplinary Online Journal
Impact Factor: 7.301 Volume 3, Issue 19, May 2023
Leonard Adleman, RSA is actually a set of two algorithms; key generation, the most complex part used to produce the
public and private keys, and RSA function evaluation which looks at encrypting and decrypting (Ponemon 2013). Fig. 2
explains how the public and private key is generated. Fig. 4 shows the methods of encrypting pla
plaintext and decrypting a
ciphertext using the two keys.
Fig 1: Global average cost of data breach from years 2012 to2016. Data from Ponemon Institute reports for the years
2012,2013,2014, 2015 and 2016
Copyright to IJARSCT 67
www.ijarsct.co.in
ISSN (Online) 2581-9429
IJARSCT
International Journal of Advanced Research in Science,, Communication and Technology (IJARSCT)
International Open-Access,
Access, Double-Blind,
Double Peer-Reviewed,
Reviewed, Refereed, Multidisciplinary Online Journal
Impact Factor: 7.301 Volume 3, Issue 19, May 2023
Copyright to IJARSCT 68
www.ijarsct.co.in
ISSN (Online) 2581-9429
IJARSCT
International Journal of Advanced Research in Science, Communication and Technology (IJARSCT)
International Open-Access, Double-Blind, Peer-Reviewed, Refereed, Multidisciplinary Online Journal
Impact Factor: 7.301 Volume 3, Issue 19, May 2023
Another product that uses RSA is the RSA SecurID, a two-factor authentication technology used in high-security
environments to protect network resources and can be hardware authenticator (a USB token, smart card, software
application residing on your smartphone or key fob) and RSA authentication manager software based tokens. The
authenticator generates passcodes/pin tokens which resets itself every 60 seconds making the previous token worthless.
When trying to access a protected resource, users enter the passcode together with their username which are intercepted
by the RSA authentication Agent and presented to the RSA SecureID system on the RSA authentication server which
validates the pass code by running the same algorithm that was used to generate the passcode to check if their 8-digit
output matches the one entered by the user along with the username before granting access to the remote server.
V. CONCLUSION
Even though RSA is the most used cryptography algorithm today, it has certain limitations which need to be taken into
consideration for RSA to continue to be the best and research has to be done into making RSA quantum resistant. There
is a need now more than ever for studies to be conducted in the area of quantum encryption methods resistant to
quantum computers as it will soon replace the current encryption systems. Development of qCrypt isn’t enough, but it’s
a start. However, we need more research into quantum resistant encryption systems.
Copyright to IJARSCT 69
www.ijarsct.co.in
ISSN (Online) 2581-9429
IJARSCT
International Journal of Advanced Research in Science, Communication and Technology (IJARSCT)
International Open-Access, Double-Blind, Peer-Reviewed, Refereed, Multidisciplinary Online Journal
Impact Factor: 7.301 Volume 3, Issue 19, May 2023
ACKNOWLEDGEMENT
I hereby declare that all the information provided in the respected paper is authenticated, authorized and hence reliable.
I would like to thanks all the viewers and readers of this paper for their precious time.
REFERENCES
[1]. Accenture. (2019). The Cost of Cybercrime. Accenture. Retrieved from https://www.accenture.com/us-
en/insights/security/cost-cybercrime-study
[2]. Balakrishnan, A. L. Jr. (2016). Cost of data breaches hits $4 million on average: IBM. CNBC. Retrieved
from http://www.cnbc.com/2016/06/14/cost-of-data-breaches-hits-4-million-on-average-ibm.html.
[3]. Cybersecurity Ventures. (2021). Cybercrime and Ransomware Damage Costs to Top $6 Trillion Annually by
2025. Cybersecurity Ventures. Retrieved from https://cybersecurityventures.com/hackerpocalypse-
cybercrime-report-2016/
[4]. IBM Security. (2020). Cost of a Data Breach Report 2020. IBM Security. Retrieved from
https://www.ibm.com/security/data-breach
[5]. J, Jeba Sonia, D. J. Joel Devadass Daniel, Dr. R. Sabin Begum, Dr. A., K., N., K. Pathan, Dr. Veera
Talukdar, and Vivek Dadasaheb Solavande. (2022) 2023. “AI Techniques for Efficient Healthcare Systems
in ECG Wave Based Cardiac Disease Detection by High Performance Modelling”. International Journal of
Communication Networks and Information Security (IJCNIS) 14 (3):290-302.
https://doi.org/10.5281/zenodo.7562589
[6]. McAfee. (2019). Grand Theft Data II - The Drivers and Shifting State of Data Breaches. McAfee. Retrieved
from https://www.mcafee.com/enterprise/en-us/assets/reports/rp-grand-theft-data-ii.pdf
[7]. Ponemon Institute (2013). Cost of Data Breach Study: Global Analysis," Ponemon Institute, North Traverse,
2013.
[8]. Ponemon Institute (2016). 2016 Cost of Data Breach Study: Global Analysis. North Traverse: Ponemon
Institute.
[9]. Ponemon Institute, (2014). Cost of Data Breach Study: Global Analysis," Ponemon Institute, North Traverse,
2014.
[10]. Ponemon Institute, (2015). Cost of Data Breach Study: Global Analysis," Ponemon Institute, North Traverse,
2015
[11]. Verizon. (2021). 2021 Data Breach Investigations Report. Verizon. Retrieved from
https://enterprise.verizon.com/resources/reports/dbir/
Copyright to IJARSCT 70
www.ijarsct.co.in