RSA Encryption and Decryption System
DOI:
https://doi.org/10.32628/CSEIT206520Keywords:
Encryption, Symmetric Key Cryptography, Asymmetric Key Cryptography, RSA Encryption& Decryption, Key Distribution, RSAAbstract
For communication in the wireless networking, transmission of data over network sometimes is not safe. In such case security of network is one of the essential aspect in computer networking. Cryptography is antechnique of transforming an plaindata into encrypted one, and then retransform that encrypted data back to its plain (original) form. In this we authenticate the sender to whom you want to send that data file. There are two different techniques of cryptography, symmetric key cryptography (called public-key cryptography) algorithms and asymmetric key cryptography (called public-key cryptography) algorithms. There are also various algorithms for encrypted data using either public or private key or both. This paper describes RSA algorithm which first convert our data into other form and then encrypt it using RSA public key encryption at sender side & at receiver side, first it authenticate the receiver then decrypt the data/ file and convert into original form.
References
- Xin Zhou and XiaofeiTang,"Research and implementation of RSA algorithm for encryption and decryption,"Proceedings of 2011 6th International Forum on Strategic Technology, Harbin, Heilongjiang,2011,pp. 1118-1121,doi:10.1109/IFOST.2011.6021216
- Abdelhalim, mohamed b & El-Mahallawy, Mohamed &Ayyad, Mohammad. (2013). In RFID SystemDesign and Implementation of an Encryption Algorithm is available. International Journal of RFID Security and Cryptography.2)51-57.10.20533/ijrfidsc.2046.3715.2013.0007.
- Osho, Oluwafemi&Zubair, Yunus&Ojeniyi, Joseph &Osho, Lauretta. (2014). A Simple Encryption and Decryption System.
- Aminudin, Nur&Maseleno, Andino&Shanmugam, Hemalatha& Kumar, K &Fauzi, &Irviani, Rita &Muslihudin, Muhamad. (2018). Nur Algorithm on Data Encryption and Decryption.International Journal of Engineering and Technology.7. 10.14419/ijet.v7i2.26.14363.
- Agrawal, Ekta& Pal, Parashu. (2017). It is a Secure and Fast Approach for Encryption and Decryption of Message Communication. International Journal of Engineering Science and Computing. 7. 5.
- Panford, Joseph &Yeng, Prosper &Hayfron-Acquah, James &Twum, Frimpong. (2016). An Efficient Symmetric Cipher Algorithm for Data Encryption. International Resaerch Journal of Engineering and Technology. 3. 1713 - 1732.
- Nisha, Shireen&Farik, Mohammed. (2017). RSA Public Key Cryptography Algorithm – A Review.International Journal of Scientific & Technology Research. 6. 187-191.
- F. Yan,C. Lin, and Y. Jian-Wen in 2015 Seventh International Conference on Measuring Technology and Mechatronics Automation,"Computer Network Security and Technology Research,". Nanchang, 2015, pp. 293-296, doi: 10.1109/ICMTMA.2015.77.
- Abdullah, Ako. (2017). For Encrypt and Decrypt Data Advanced Encryption Standard (AES).
- Ukwuoma, Henry &Hammawa, Mohammed. (2015). Optimised Key Generation for RSA Encryption. IISTE. 6. 2222-2871.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.