File Encryption and Decryption using AES and RSA Algorithm
DOI:
https://doi.org/10.32628/CSEIT2390130Keywords:
Encryption, decryption, AES algorithm, RSA algorithm, vulnerability, IntegrityAbstract
In the present scenario, no technology that's connected to the internet is unhackable. All digital services like internet communication, military and medical imaging systems, multimedia systems require reliable security in storage and transmission of digital images. The importance of protecting digital images cannot be overstated. Therefore, there is a need for image encryption techniques in order to hide images from such attacks. In this encryption process, we use AES and RSA Algorithm in order to hide images. This encryption techniques helps us to avoid intrusive attacks. Since, the image is encrypted using the AES technique, only the receiver can view it, as the key is known only to the sender and receiver. Overall, image encryption improves data integrity and can raise consumer trust.
References
- "Handbook of Applied Cryptography" by Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone.
- "A survey of symmetric key encryption techniques" by H. Abdalla, J. Garay, and P. Papadimitriou
- https://www.itprotoday.com/windows-78/how-do-i-encryptdecrypt-file
- https://blog.box.com/what-is-file-encryption
- https://www.researchgate.net/figure/RSA-algorithm-structure_fig2_298298027
- https://www.researchgate.net/figure/The-basic-AES-128-cryptographic-architecture_fig1_230853805
- https://docs.huihoo.com/globus/gt4-tutorial/ch09s02.html
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.