SlideShare a Scribd company logo
SMT.BHAGWATI CHATURVEDI               COLLEGE OF ENGG.LokmanyaTilakJankalyanShikshanSansthaPAPERPRESENTATIONA  NETWORK  SECURITY  APPROACH :  RSA  ALGORITHMGUIDED BY –PROF. MANOJ    CHAUDARY  SIRPresented  By :TUHIN  DAS IV SEMC.S.E
CONTENTSOverview of encryption and decryption.
  Method of   Encryption &  Decryption .
  Introduction to RSA    . 
  Example of  RSA     algorithm .
  Security of RSA.
  RSA currently in use today. 
  Advantages & limitations.   
  Conclusion.
  References  .                                 Overview of encryption and decryptionEncryption : The process of converting plaintext into ciphertext.
Decryption : The process of turning ciphertext back into the original plaintext.
Encryption algorithm : Algorithm that performs various transformation operation on plaintext.
Ad

More Related Content

What's hot (20)

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
Triad Square InfoSec
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
Alex Punnen
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
Amit Pathak
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
aritraranjan
 
cryptography
cryptographycryptography
cryptography
Jai Nathwani
 
Cryptography
CryptographyCryptography
Cryptography
Jens Patel
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
Amit Debnath
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
Vaibhav Khanna
 
Cryptography
CryptographyCryptography
Cryptography
okolo chukwudumebi prince
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
Mohd Arif
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
Anas Rock
 
Encryption
EncryptionEncryption
Encryption
Nitin Parbhakar
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Ramki M
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
Dr. Himanshu Gupta
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Bharat Kumar Katur
 
Data encryption
Data encryptionData encryption
Data encryption
Deepam Goyal
 
Network security
Network securityNetwork security
Network security
anoop negi
 
Cryptography
CryptographyCryptography
Cryptography
Nishant Pahad
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
Alex Punnen
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
Amit Pathak
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
aritraranjan
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
Amit Debnath
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
Vaibhav Khanna
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
Mohd Arif
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
Anas Rock
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Ramki M
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
Dr. Himanshu Gupta
 
Network security
Network securityNetwork security
Network security
anoop negi
 

Viewers also liked (20)

Rsa Algorithm
Rsa AlgorithmRsa Algorithm
Rsa Algorithm
Ashik Iqbal
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Dr. Shashank Shetty
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
Hatem Mahmoud
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
 
Why Computational/Applied Mathematics?
Why Computational/Applied Mathematics?Why Computational/Applied Mathematics?
Why Computational/Applied Mathematics?
Jon Ernstberger
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA Encryption
Nathan F. Dunn
 
Stream ciphers
Stream ciphersStream ciphers
Stream ciphers
degarden
 
Slideshare cost of ignoring network security presentation v4
Slideshare   cost of ignoring network security presentation v4Slideshare   cost of ignoring network security presentation v4
Slideshare cost of ignoring network security presentation v4
Sergio Loureiro
 
Network Security
Network SecurityNetwork Security
Network Security
Jaya sudha
 
Network security
Network securityNetwork security
Network security
Nkosinathi Lungu
 
Computer Graphics Introduction
Computer Graphics IntroductionComputer Graphics Introduction
Computer Graphics Introduction
Ghaffar Khan
 
Network Security
Network SecurityNetwork Security
Network Security
Pallavi Sonone
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
Sripati Mahapatra
 
SSL
SSLSSL
SSL
theekuchi
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphics
Partnered Health
 
Network security policies
Network security policiesNetwork security policies
Network security policies
Usman Mukhtar
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
Vinayak Raja
 
An Introduction to Kerberos
An Introduction to KerberosAn Introduction to Kerberos
An Introduction to Kerberos
Shumon Huque
 
Network Security
Network SecurityNetwork Security
Network Security
MAJU
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
Hatem Mahmoud
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
Adam Reagan
 
Why Computational/Applied Mathematics?
Why Computational/Applied Mathematics?Why Computational/Applied Mathematics?
Why Computational/Applied Mathematics?
Jon Ernstberger
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA Encryption
Nathan F. Dunn
 
Stream ciphers
Stream ciphersStream ciphers
Stream ciphers
degarden
 
Slideshare cost of ignoring network security presentation v4
Slideshare   cost of ignoring network security presentation v4Slideshare   cost of ignoring network security presentation v4
Slideshare cost of ignoring network security presentation v4
Sergio Loureiro
 
Network Security
Network SecurityNetwork Security
Network Security
Jaya sudha
 
Computer Graphics Introduction
Computer Graphics IntroductionComputer Graphics Introduction
Computer Graphics Introduction
Ghaffar Khan
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
Sripati Mahapatra
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphics
Partnered Health
 
Network security policies
Network security policiesNetwork security policies
Network security policies
Usman Mukhtar
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
cegonsoft1999
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
Vinayak Raja
 
An Introduction to Kerberos
An Introduction to KerberosAn Introduction to Kerberos
An Introduction to Kerberos
Shumon Huque
 
Ad

Similar to A NETWORK SECURITY APPROACH USING RSA. (20)

State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
ijcsa
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
Amlan Patel
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
IJECEIAES
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
LAKSHMI TEJA SAYABARAPU
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Ramesh Nagappan
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
Chandan Gupta Bhagat
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
Iasir Journals
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
IJERA Editor
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
IJNSA Journal
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
IJNSA Journal
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
International Journal of Science and Research (IJSR)
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
IRJET Journal
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsa
Mohsin Ali
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
journalBEEI
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
ijsrd.com
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
Amirul Wiramuda
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
Prateek Pandey
 
Cryptography & Security
Cryptography & SecurityCryptography & Security
Cryptography & Security
Chanaka Lasantha
 
Nwc rsa
Nwc rsaNwc rsa
Nwc rsa
anupamnm
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
ijcsa
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
IJECEIAES
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Ramesh Nagappan
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
IJNSA Journal
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
IJNSA Journal
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
IRJET Journal
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsa
Mohsin Ali
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
journalBEEI
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
ijsrd.com
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
Amirul Wiramuda
 
Ad

More from Tuhin_Das (14)

Workshop Assembler
Workshop AssemblerWorkshop Assembler
Workshop Assembler
Tuhin_Das
 
Aop2007
Aop2007Aop2007
Aop2007
Tuhin_Das
 
SQL
SQLSQL
SQL
Tuhin_Das
 
Operating System
Operating SystemOperating System
Operating System
Tuhin_Das
 
Operating System
Operating SystemOperating System
Operating System
Tuhin_Das
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
Tuhin_Das
 
Presentation
PresentationPresentation
Presentation
Tuhin_Das
 
Malware Trends Developments
Malware Trends DevelopmentsMalware Trends Developments
Malware Trends Developments
Tuhin_Das
 
Malware
MalwareMalware
Malware
Tuhin_Das
 
GPS DOCUMENT
GPS DOCUMENTGPS DOCUMENT
GPS DOCUMENT
Tuhin_Das
 
Presentation On Gps
Presentation On GpsPresentation On Gps
Presentation On Gps
Tuhin_Das
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITY
Tuhin_Das
 
Brain Machine Interfacenew
Brain Machine InterfacenewBrain Machine Interfacenew
Brain Machine Interfacenew
Tuhin_Das
 
Laser & Its Application
Laser & Its ApplicationLaser & Its Application
Laser & Its Application
Tuhin_Das
 
Workshop Assembler
Workshop AssemblerWorkshop Assembler
Workshop Assembler
Tuhin_Das
 
Operating System
Operating SystemOperating System
Operating System
Tuhin_Das
 
Operating System
Operating SystemOperating System
Operating System
Tuhin_Das
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
Tuhin_Das
 
Presentation
PresentationPresentation
Presentation
Tuhin_Das
 
Malware Trends Developments
Malware Trends DevelopmentsMalware Trends Developments
Malware Trends Developments
Tuhin_Das
 
GPS DOCUMENT
GPS DOCUMENTGPS DOCUMENT
GPS DOCUMENT
Tuhin_Das
 
Presentation On Gps
Presentation On GpsPresentation On Gps
Presentation On Gps
Tuhin_Das
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITY
Tuhin_Das
 
Brain Machine Interfacenew
Brain Machine InterfacenewBrain Machine Interfacenew
Brain Machine Interfacenew
Tuhin_Das
 
Laser & Its Application
Laser & Its ApplicationLaser & Its Application
Laser & Its Application
Tuhin_Das
 

A NETWORK SECURITY APPROACH USING RSA.

  • 1. SMT.BHAGWATI CHATURVEDI COLLEGE OF ENGG.LokmanyaTilakJankalyanShikshanSansthaPAPERPRESENTATIONA NETWORK SECURITY APPROACH : RSA ALGORITHMGUIDED BY –PROF. MANOJ CHAUDARY SIRPresented By :TUHIN DAS IV SEMC.S.E
  • 3. Method of Encryption & Decryption .
  • 4. Introduction to RSA    . 
  • 5. Example of RSA algorithm .
  • 7. RSA currently in use today. 
  • 8. Advantages & limitations.   
  • 10. References  .                                 Overview of encryption and decryptionEncryption : The process of converting plaintext into ciphertext.
  • 11. Decryption : The process of turning ciphertext back into the original plaintext.
  • 12. Encryption algorithm : Algorithm that performs various transformation operation on plaintext.
  • 13. Decryption algorithm : Accepts the ciphertext ,matching key and produce plaintext.
  • 14. Cryptology : Branch of mathematics which deals with both cryptography and cryptoanalysis.
  • 15. Cryptography : Branch of cryptology which deals with making communications secure.   METHOD OF ENCRYPTION & DESCRYPTIONKEY GENERATORENCRYPTEDMESSAGE
  • 16. R S ARSA is invented by Ron Rivest , AdiShamir and Leonard Adleman in 1977.
  • 17. In RSA algorithm plaintext and ciphertext are integers between 0 and n-1 for some n.
  • 18. There are two types of keys public & private keys which is a pair of keys that have been selected so that if one is used for encryption , the other is used for decryption.
  • 19. Both sender and receiver must know the value of n.
  • 20. The sender knows the value of e and only receiver knows the value of d.Example of RSA algorithm Select two prime nos. , p=17 and q=11.
  • 21. Calculate n = p*q = 17*11 = 187.
  • 22. Calculate phi (n) = (p-1)*(q-1) = 16 * 10 =160.
  • 23. Select e such that GCD(phi (n) ,e)=1 ; 1
  • 24. Determine d such that d*e ~ 1 (mod 160) and dOUTPUT:-
  • 25. SECURITY OF RSA The security of the system depends on two critical assumptions:1) Factoring is required to break the system, and Factoring is `inherently computationally intractable', or, alternatively, `factoring is hard‘ and `any approach that can be used to break the system is at least as hard as factoring'.
  • 26. RSA Currently in Use Today RSA is currently used in a wide variety of products, platforms, and industries around the world.
  • 27. It is found in many commercial software products. It is built into current operating systems by Microsoft, Apple and etc.
  • 28. In hardware, RSA can be found in secure telephones, on Ethernet network cards, and on smart cards. In addition, RSA is incorporated into all of the major protocols for secured Internet communication.
  • 29. It is also used internally in many institutions, major corporations, national laboratories, and universities. ADVANTAGES :Provides security from unauthorized user/access.
  • 30. This technique can be used in various fields 0f banking and National Security Service (NSS) .TECHNICAL ADVANTAGES & BENEFITS :ClassicSys is easy to implement in integrated circuits because:it uses only XOR and branching functions.
  • 31. no reporting arithmetic bits are needed.
  • 32. Programming can be done with a polynomial structure.
  • 33. The length of the blocks of key and data are identical and equal to 128 bits (16 bytes). CONCLUSIONIt is most popular and most efficiently used algorithm due to its stability and reliability.
  • 34. RSA is one of the standard algorithms that is used in most of the encryptions and decryption tasks.REFERENCESCryptography And Network Security - By William Stallings.Principles Of Key Management - By W .Fumy And P. Landrock.A Comparative Study Of RSA Encryption And Decryption – By R.E Ting And S.T. Barnum.
  • 35. THANK YOU .....
  翻译: