SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 34
Data Transmission using RSA Algorithm
Miss. Akshata Chavan1, Miss. Asmita Jadhav2, Miss. Shraddha Kumbhar3 , Miss. Indira Joshi4
Ms. Akshata Chavan, Department of Computer Engineering, DRIEMS, Neral, Maharashtra.
Ms. Asmita Jadhav, Department of Computer Engineering, DRIEMS, Neral, Maharashtra.
Ms. Shraddha Kumbhar, Department of Computer Engineering, DRIEMS, Neral, Maharashtra.
Ms. Indira Joshi, Department of Computer Engineering, DRIEMS, Neral, Maharashtra.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The confidential details transferred through the
internet are hacked by phishing in an electronic
communication world. So information security plays an
important role. The cryptographic algorithms are applied
over many applications for secure transmission of data
against malignant attacks. In this work, a discussion is
made based on a method for the data security
authentication in a network using the combination of
symmetric and asymmetric algorithms. In order to have
data security, all the data packets are encrypted and
decrypted using symmetric cryptography algorithm AES
and authentication can be obtained by asymmetric
cryptography all using the RSA algorithm.
Key Words: AES, RSA, Cryptography, Encryption,
Decryption.
1. INTRODUCTION
The security in the network plays an important role and
can be achieved by different cryptographic algorithms.
Cryptography is the science and art of transforming
messages to make them secure and immune to attacks by
authenticating the sender to the receiver within the
network. Cryptography basically works on the principle of
mathematics that generates different algorithms known.
The cryptographic algorithms are of two types: symmetric
key and asymmetric key algorithms. The symmetric key
algorithm uses a single key to encrypt and decrypt the
data whereas, the asymmetric key algorithm uses two
types of keys i.e. the public key for the encryption and
private key for the decryption. Two important properties
of cryptosystems are its speed and security. To solve the
problem of attacks and threats the system needs to have
strong security. In this project, the work is done to
implement a security mechanism that will hold against
security issues. Security is a process and not a product.
The password is being the most common authentication
technique which provides the claimant access to system
resources. For encryption, symmetric algorithms and
asymmetric algorithms can be used to design a secure
system, but there are some drawbacks. Like the AES
algorithm is symmetric key algorithm means it makes use
of its secret key for encryption and decryption similarly
RSA algorithm is an asymmetric key algorithm that makes
use of public key and private key. Both the algorithms
have their own disadvantage like the AES algorithm is fast
but vulnerable to the Brute force attack and the RSA
algorithm is slow but provides high security. So, a
mechanism is designed using both the algorithms which
help to overcome the problems of security in networking.
2. PROBLEM STATEMENT
The main objective of this work is to achieve data
confidentiality and authentication by the RSA
cryptographic algorithm followed by the AES
cryptographic algorithm. So, a mechanism is designed
using both the algorithms which help to overcome the
problems of security. We have proposed a secure
mechanism by using Multiple Encryption and OTP. OTP
password provides strong authentication while the AES
algorithm and RSA algorithm provide strong encryption
security.
3. PROPOSED SYSTEM
We have proposed a secure mechanism by using Multiple
Encryption and OTP. OTP password provides strong
authentication while the AES algorithm and RSA algorithm
provide strong encryption security.
3.1. User Authentication:
It consists of two phases in the introduced technique. They
are the Registration Phase and Login Phase.
3.1.1. Registration Phase:
During registration, users will register by providing
personal information like email and username along with
the text-based password.
3.1.2. Login Phase:
To ensure the successful login, first of all, the user will
enter the username and text-based password.
3.2. Multiple Encryptions:
After login successfully if the user wants to send a file or
data to the receiver, the user has to first upload the file.
During the upload phase the file gets encrypted with the
AES algorithm, and the secret key of the AES algorithm
gets encrypted by a public key of the RSA algorithm. The
receiver can download the file by using the private key,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 35
and the system generated OTP password which is sent to
the registered mobile no. The private key is sent to the
receiver through another secured channel like email. Thus,
a strong security mechanism for data security is obtained
by using multiple encryptions.
3.2.1. AES Algorithm:
The Advanced Encryption Standard (AES), is a symmetric
block cipher.
The AES (Advanced Encryption Standard), is a symmetric
block cipher. The AES encryption process uses a set of
derived keys known as round keys. These keys are used
with other operations that hold only one block of data to
be encrypted.
The following steps of AES encryption are for 128 bits
block:
1) Derive the set of round keys by using a cipher key.
2) Initialize the state array with the block of data i.e.
plaintext.
3) Starting state array is added with initial round
key.
4) Perform the four operations for nine rounds
which consist of several processing steps like
substitution step, row-wise permutation, a
column-wise mixing step and the addition of the
round key.
5) Perform the tenth and final round which does not
have (MixColumns) it includes only SubBytes,
ShiftRows and AddRoundKey.
6) Copy the final state array as the encrypted data i.e.
cipher text. The process of transforming the
cipher text to plaintext using the same encryption
key is called a decryption process of AES. During
the decryption process, the set of rounds is just
the reverse of encryption rounds.
3.2.2. RSA Algorithm
The Rivest-Shamir-Adleman (RSA) cryptosystem is one of
the best-known public key cryptosystems for key
exchange or encryption of blocks of data. The RSA uses a
variable size encryption block and a variable size key. The
key-pair is derived from a very large number, n, that is the
product of two prime no. chosen according to special
rules. The difficulty of factoring large numbers is the basis
of the security of RSA Algorithm. Over 1,000 bits long
numbers are used for RSA. The RSA can be used to encrypt
and decrypt actual messages, and it is very slow if the
message is long. Therefore, the RSA algorithm is useful for
short messages. Since the algorithm uses two keys for
encryption and decryption: the public key and the private
key, the RSA algorithm is considered as an example of
asymmetric key cryptography.
Existing RSA algorithm Key generation:
1) Select two prime numbers, x and y, and x ≠ y.
2) Calculate n = x * y. Calculate φ (n) = (x -1) x (y -1).
3) Select integer e such that gcd (e, φ (n)) = 1 such
that 1 < e < φ (n).
4) Calculate the private key, d = e^(-1) ( mod φ (n)).
5) Then public key = {e, n}.
6) Private key = {d, n}.
7) Encryption: c = me mod n.
8) Decryption: m = cd mod n.
9) Where, c - ciphertext, m – message
The key feature of the public-key cryptosystem is that the
encryption and decryption procedure is done with two
different keys - the public key and private key.
Fig-1. System Architecture
4. CONCLUSION
The project is focused on the improvement of security and
performance of cloud computing by building a secure
mechanism for transferring data over the internet. The
approach is built by using a Text-based password and
Multiple Encryption. One time password provides privacy
and confidentiality by restricting the unauthorized user
and Multiple Encryption prevents the system from the
attacks by maintaining the loopholes of the securing
mechanism.
5. REFERENCES
[1] Stallings, William, “Public Key Encryption and RSA,” in
Cryptography and Network Security, 5th ed. Published by
Pearson Education, Inc, Copyright © 2011, pp. 293-314.
[2] R. Rivest, A. Shamir, and L. Adleman, “A Method for
Obtaining Digital Signatures and Public-Key
Cryptosystems”, Communications of ACM, Vol.-21, Issue-2,
February 1978.
[3] Evgeny Milanov, "The RSA Algorithm," June 2009.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 36
[4]W. Stallings, Cryptography and network security 4th
Edition. prentice hall, 2005.
[5] Wentao Liu, Dept. of Comput. & Inf. Eng. ,Wuhan
Polytech. Univ., Wuhan, China “Research on cloud
computing security problem and strategy, “in Proc.
Consumer Electronics, Communications and Networks
(CECNet), 2012 2nd International Conference, Yichang, 21-
23 April 2012, pp.1216-1219.
Ad

More Related Content

What's hot (20)

IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
 
RSA 32-bit Implementation Technique
RSA 32-bit Implementation TechniqueRSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
Universitas Pembangunan Panca Budi
 
Rsa Encryption in java
Rsa Encryption in java Rsa Encryption in java
Rsa Encryption in java
PiyushPatil73
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
IJERA Editor
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
ijtsrd
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
ijircee
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
PiyushPatil73
 
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
IRJET Journal
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1
Sumit Bajaj
 
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
AnirbanBhowmik8
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
miteshkumar82
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
ijcsa
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
IRJET Journal
 
Security in Manets using Cryptography Algorithms
Security in Manets using Cryptography AlgorithmsSecurity in Manets using Cryptography Algorithms
Security in Manets using Cryptography Algorithms
IRJET Journal
 
C0281010016
C0281010016C0281010016
C0281010016
inventionjournals
 
Hybrid AES DES
Hybrid AES DESHybrid AES DES
Hybrid AES DES
Hardik Manocha
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
IRJET Journal
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
IOSR Journals
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
 
Rsa Encryption in java
Rsa Encryption in java Rsa Encryption in java
Rsa Encryption in java
PiyushPatil73
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
ijtsrd
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
ijircee
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
PiyushPatil73
 
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
IRJET Journal
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1
Sumit Bajaj
 
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
AnirbanBhowmik8
 
File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
miteshkumar82
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
ijcsa
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
IRJET Journal
 
Security in Manets using Cryptography Algorithms
Security in Manets using Cryptography AlgorithmsSecurity in Manets using Cryptography Algorithms
Security in Manets using Cryptography Algorithms
IRJET Journal
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
IRJET Journal
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
IOSR Journals
 

Similar to IRJET- Data Transmission using RSA Algorithm (20)

IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
 
IRJET- Cloud Data Security using AES Algorithm
IRJET- Cloud Data Security using AES AlgorithmIRJET- Cloud Data Security using AES Algorithm
IRJET- Cloud Data Security using AES Algorithm
IRJET Journal
 
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
IRJET Journal
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
IRJET Journal
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
IRJET Journal
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
Shubham Patil
 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET Journal
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
IOSR Journals
 
O017128591
O017128591O017128591
O017128591
IOSR Journals
 
D018141922
D018141922D018141922
D018141922
IOSR Journals
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
IRJET Journal
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
Enhancement in data security and integrity using minhash technique
Enhancement in data security and integrity using minhash  techniqueEnhancement in data security and integrity using minhash  technique
Enhancement in data security and integrity using minhash technique
nooriasukmaningtyas
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
ijtsrd
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
 
L017136269
L017136269L017136269
L017136269
IOSR Journals
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
IOSR Journals
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
IRJET Journal
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
 
IRJET- Cloud Data Security using AES Algorithm
IRJET- Cloud Data Security using AES AlgorithmIRJET- Cloud Data Security using AES Algorithm
IRJET- Cloud Data Security using AES Algorithm
IRJET Journal
 
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
IRJET Journal
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
IRJET Journal
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
IRJET Journal
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
Shubham Patil
 
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 BoardIRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET Journal
 
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networksThe effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
IOSR Journals
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
IRJET Journal
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
Enhancement in data security and integrity using minhash technique
Enhancement in data security and integrity using minhash  techniqueEnhancement in data security and integrity using minhash  technique
Enhancement in data security and integrity using minhash technique
nooriasukmaningtyas
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
ijtsrd
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
IOSR Journals
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
IRJET Journal
 
Ad

More from IRJET Journal (20)

Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
IRJET Journal
 
BRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATIONBRAIN TUMOUR DETECTION AND CLASSIFICATION
BRAIN TUMOUR DETECTION AND CLASSIFICATION
IRJET Journal
 
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
IRJET Journal
 
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ..."Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
IRJET Journal
 
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
IRJET Journal
 
Breast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer VisionBreast Cancer Detection using Computer Vision
Breast Cancer Detection using Computer Vision
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...A Novel System for Recommending Agricultural Crops Using Machine Learning App...
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
IRJET Journal
 
Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.Auto-Charging E-Vehicle with its battery Management.
Auto-Charging E-Vehicle with its battery Management.
IRJET Journal
 
Analysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the HeliosphereAnalysis of high energy charge particle in the Heliosphere
Analysis of high energy charge particle in the Heliosphere
IRJET Journal
 
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
IRJET Journal
 
FIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACHFIR filter-based Sample Rate Convertors and its use in NR PRACH
FIR filter-based Sample Rate Convertors and its use in NR PRACH
IRJET Journal
 
Kiona – A Smart Society Automation Project
Kiona – A Smart Society Automation ProjectKiona – A Smart Society Automation Project
Kiona – A Smart Society Automation Project
IRJET Journal
 
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
IRJET Journal
 
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
IRJET Journal
 
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based CrowdfundingInvest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
IRJET Journal
 
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
IRJET Journal
 
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUBSPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
IRJET Journal
 
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
AR Application: Homewise VisionMs. Vaishali Rane, Om Awadhoot, Bhargav Gajare...
IRJET Journal
 
Ad

Recently uploaded (20)

twin tower attack 2001 new york city
twin  tower  attack  2001 new  york citytwin  tower  attack  2001 new  york city
twin tower attack 2001 new york city
harishreemavs
 
Working with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to ImplementationWorking with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to Implementation
Alabama Transportation Assistance Program
 
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdfML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
rameshwarchintamani
 
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
Taqyea
 
A Survey of Personalized Large Language Models.pptx
A Survey of Personalized Large Language Models.pptxA Survey of Personalized Large Language Models.pptx
A Survey of Personalized Large Language Models.pptx
rutujabhaskarraopati
 
Building-Services-Introduction-Notes.pdf
Building-Services-Introduction-Notes.pdfBuilding-Services-Introduction-Notes.pdf
Building-Services-Introduction-Notes.pdf
Lawrence Omai
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
Analog electronic circuits with some imp
Analog electronic circuits with some impAnalog electronic circuits with some imp
Analog electronic circuits with some imp
KarthikTG7
 
Dynamics of Structures with Uncertain Properties.pptx
Dynamics of Structures with Uncertain Properties.pptxDynamics of Structures with Uncertain Properties.pptx
Dynamics of Structures with Uncertain Properties.pptx
University of Glasgow
 
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Modelling of Concrete Compressive Strength Admixed with GGBFS Using Gene Expr...
Journal of Soft Computing in Civil Engineering
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
Nanometer Metal-Organic-Framework Literature Comparison
Nanometer Metal-Organic-Framework  Literature ComparisonNanometer Metal-Organic-Framework  Literature Comparison
Nanometer Metal-Organic-Framework Literature Comparison
Chris Harding
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
Routing Riverdale - A New Bus Connection
Routing Riverdale - A New Bus ConnectionRouting Riverdale - A New Bus Connection
Routing Riverdale - A New Bus Connection
jzb7232
 
DED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedungDED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedung
nabilarizqifadhilah1
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 
twin tower attack 2001 new york city
twin  tower  attack  2001 new  york citytwin  tower  attack  2001 new  york city
twin tower attack 2001 new york city
harishreemavs
 
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdfML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
ML_Unit_V_RDC_ASSOCIATION AND DIMENSIONALITY REDUCTION.pdf
rameshwarchintamani
 
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
最新版加拿大魁北克大学蒙特利尔分校毕业证(UQAM毕业证书)原版定制
Taqyea
 
A Survey of Personalized Large Language Models.pptx
A Survey of Personalized Large Language Models.pptxA Survey of Personalized Large Language Models.pptx
A Survey of Personalized Large Language Models.pptx
rutujabhaskarraopati
 
Building-Services-Introduction-Notes.pdf
Building-Services-Introduction-Notes.pdfBuilding-Services-Introduction-Notes.pdf
Building-Services-Introduction-Notes.pdf
Lawrence Omai
 
Frontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend EngineersFrontend Architecture Diagram/Guide For Frontend Engineers
Frontend Architecture Diagram/Guide For Frontend Engineers
Michael Hertzberg
 
Design of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdfDesign of Variable Depth Single-Span Post.pdf
Design of Variable Depth Single-Span Post.pdf
Kamel Farid
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
Analog electronic circuits with some imp
Analog electronic circuits with some impAnalog electronic circuits with some imp
Analog electronic circuits with some imp
KarthikTG7
 
Dynamics of Structures with Uncertain Properties.pptx
Dynamics of Structures with Uncertain Properties.pptxDynamics of Structures with Uncertain Properties.pptx
Dynamics of Structures with Uncertain Properties.pptx
University of Glasgow
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
Nanometer Metal-Organic-Framework Literature Comparison
Nanometer Metal-Organic-Framework  Literature ComparisonNanometer Metal-Organic-Framework  Literature Comparison
Nanometer Metal-Organic-Framework Literature Comparison
Chris Harding
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
Routing Riverdale - A New Bus Connection
Routing Riverdale - A New Bus ConnectionRouting Riverdale - A New Bus Connection
Routing Riverdale - A New Bus Connection
jzb7232
 
DED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedungDED KOMINFO detail engginering design gedung
DED KOMINFO detail engginering design gedung
nabilarizqifadhilah1
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 

IRJET- Data Transmission using RSA Algorithm

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 34 Data Transmission using RSA Algorithm Miss. Akshata Chavan1, Miss. Asmita Jadhav2, Miss. Shraddha Kumbhar3 , Miss. Indira Joshi4 Ms. Akshata Chavan, Department of Computer Engineering, DRIEMS, Neral, Maharashtra. Ms. Asmita Jadhav, Department of Computer Engineering, DRIEMS, Neral, Maharashtra. Ms. Shraddha Kumbhar, Department of Computer Engineering, DRIEMS, Neral, Maharashtra. Ms. Indira Joshi, Department of Computer Engineering, DRIEMS, Neral, Maharashtra. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The confidential details transferred through the internet are hacked by phishing in an electronic communication world. So information security plays an important role. The cryptographic algorithms are applied over many applications for secure transmission of data against malignant attacks. In this work, a discussion is made based on a method for the data security authentication in a network using the combination of symmetric and asymmetric algorithms. In order to have data security, all the data packets are encrypted and decrypted using symmetric cryptography algorithm AES and authentication can be obtained by asymmetric cryptography all using the RSA algorithm. Key Words: AES, RSA, Cryptography, Encryption, Decryption. 1. INTRODUCTION The security in the network plays an important role and can be achieved by different cryptographic algorithms. Cryptography is the science and art of transforming messages to make them secure and immune to attacks by authenticating the sender to the receiver within the network. Cryptography basically works on the principle of mathematics that generates different algorithms known. The cryptographic algorithms are of two types: symmetric key and asymmetric key algorithms. The symmetric key algorithm uses a single key to encrypt and decrypt the data whereas, the asymmetric key algorithm uses two types of keys i.e. the public key for the encryption and private key for the decryption. Two important properties of cryptosystems are its speed and security. To solve the problem of attacks and threats the system needs to have strong security. In this project, the work is done to implement a security mechanism that will hold against security issues. Security is a process and not a product. The password is being the most common authentication technique which provides the claimant access to system resources. For encryption, symmetric algorithms and asymmetric algorithms can be used to design a secure system, but there are some drawbacks. Like the AES algorithm is symmetric key algorithm means it makes use of its secret key for encryption and decryption similarly RSA algorithm is an asymmetric key algorithm that makes use of public key and private key. Both the algorithms have their own disadvantage like the AES algorithm is fast but vulnerable to the Brute force attack and the RSA algorithm is slow but provides high security. So, a mechanism is designed using both the algorithms which help to overcome the problems of security in networking. 2. PROBLEM STATEMENT The main objective of this work is to achieve data confidentiality and authentication by the RSA cryptographic algorithm followed by the AES cryptographic algorithm. So, a mechanism is designed using both the algorithms which help to overcome the problems of security. We have proposed a secure mechanism by using Multiple Encryption and OTP. OTP password provides strong authentication while the AES algorithm and RSA algorithm provide strong encryption security. 3. PROPOSED SYSTEM We have proposed a secure mechanism by using Multiple Encryption and OTP. OTP password provides strong authentication while the AES algorithm and RSA algorithm provide strong encryption security. 3.1. User Authentication: It consists of two phases in the introduced technique. They are the Registration Phase and Login Phase. 3.1.1. Registration Phase: During registration, users will register by providing personal information like email and username along with the text-based password. 3.1.2. Login Phase: To ensure the successful login, first of all, the user will enter the username and text-based password. 3.2. Multiple Encryptions: After login successfully if the user wants to send a file or data to the receiver, the user has to first upload the file. During the upload phase the file gets encrypted with the AES algorithm, and the secret key of the AES algorithm gets encrypted by a public key of the RSA algorithm. The receiver can download the file by using the private key,
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 35 and the system generated OTP password which is sent to the registered mobile no. The private key is sent to the receiver through another secured channel like email. Thus, a strong security mechanism for data security is obtained by using multiple encryptions. 3.2.1. AES Algorithm: The Advanced Encryption Standard (AES), is a symmetric block cipher. The AES (Advanced Encryption Standard), is a symmetric block cipher. The AES encryption process uses a set of derived keys known as round keys. These keys are used with other operations that hold only one block of data to be encrypted. The following steps of AES encryption are for 128 bits block: 1) Derive the set of round keys by using a cipher key. 2) Initialize the state array with the block of data i.e. plaintext. 3) Starting state array is added with initial round key. 4) Perform the four operations for nine rounds which consist of several processing steps like substitution step, row-wise permutation, a column-wise mixing step and the addition of the round key. 5) Perform the tenth and final round which does not have (MixColumns) it includes only SubBytes, ShiftRows and AddRoundKey. 6) Copy the final state array as the encrypted data i.e. cipher text. The process of transforming the cipher text to plaintext using the same encryption key is called a decryption process of AES. During the decryption process, the set of rounds is just the reverse of encryption rounds. 3.2.2. RSA Algorithm The Rivest-Shamir-Adleman (RSA) cryptosystem is one of the best-known public key cryptosystems for key exchange or encryption of blocks of data. The RSA uses a variable size encryption block and a variable size key. The key-pair is derived from a very large number, n, that is the product of two prime no. chosen according to special rules. The difficulty of factoring large numbers is the basis of the security of RSA Algorithm. Over 1,000 bits long numbers are used for RSA. The RSA can be used to encrypt and decrypt actual messages, and it is very slow if the message is long. Therefore, the RSA algorithm is useful for short messages. Since the algorithm uses two keys for encryption and decryption: the public key and the private key, the RSA algorithm is considered as an example of asymmetric key cryptography. Existing RSA algorithm Key generation: 1) Select two prime numbers, x and y, and x ≠ y. 2) Calculate n = x * y. Calculate φ (n) = (x -1) x (y -1). 3) Select integer e such that gcd (e, φ (n)) = 1 such that 1 < e < φ (n). 4) Calculate the private key, d = e^(-1) ( mod φ (n)). 5) Then public key = {e, n}. 6) Private key = {d, n}. 7) Encryption: c = me mod n. 8) Decryption: m = cd mod n. 9) Where, c - ciphertext, m – message The key feature of the public-key cryptosystem is that the encryption and decryption procedure is done with two different keys - the public key and private key. Fig-1. System Architecture 4. CONCLUSION The project is focused on the improvement of security and performance of cloud computing by building a secure mechanism for transferring data over the internet. The approach is built by using a Text-based password and Multiple Encryption. One time password provides privacy and confidentiality by restricting the unauthorized user and Multiple Encryption prevents the system from the attacks by maintaining the loopholes of the securing mechanism. 5. REFERENCES [1] Stallings, William, “Public Key Encryption and RSA,” in Cryptography and Network Security, 5th ed. Published by Pearson Education, Inc, Copyright © 2011, pp. 293-314. [2] R. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of ACM, Vol.-21, Issue-2, February 1978. [3] Evgeny Milanov, "The RSA Algorithm," June 2009.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 36 [4]W. Stallings, Cryptography and network security 4th Edition. prentice hall, 2005. [5] Wentao Liu, Dept. of Comput. & Inf. Eng. ,Wuhan Polytech. Univ., Wuhan, China “Research on cloud computing security problem and strategy, “in Proc. Consumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference, Yichang, 21- 23 April 2012, pp.1216-1219.
  翻译: