SlideShare a Scribd company logo
DOI : 10.23883/IJRTER.2017.3359.UXAIW 279
RSA 32-bit Implementation Technique
Dian Kurnia1
, Haida Dafitri2
, Sugianto3
, Mardiana4
, Andysah Putera Utama Siahaan5
1,5
Faculty of Computer Science, Universitas Pembanguan Panca Budi, Medan, Indonesia
2,4
Department of Informatics, Sekolah Tinggi Teknik Harapan, Medan, Indonesia
3
Department of Information System, Sekolah Tinggi Teknik Harapan, Medan, Indonesia
Abstract - Encryption is a technique that transforms a code from an understandable into an
incomprehensible code. Many methods can be applied to an encryption process. One such method is
RSA. RSA works by appointing on byte values. The value is obtained from character conversion to
ASCII code. This algorithm is based on the multiplication of two relatively large primes. Applications
of the RSA algorithm can be used in data security. This research provides RSA algorithm application
on data security system that can guarantee data confidentiality. RSA algorithm is known as a very
secure algorithm. This algorithm works with the number of bits in the search for prime numbers. The
larger the bits, the less chance of ciphertext can be solved. The weakness of this method is the amount
of ciphertext capacity will be floating in line with the number of prime numbers used. Also, to perform
the process of encryption and decryption, RSA requires a relatively long time than other algorithms.
The advantage of RSA is that complicated ciphertext is solved into plaintext.
Keywords - Cryptography, RSA, Public Key, Prime
I. INTRODUCTION
Data security and confidentiality issues are an important aspect of information systems.
Because of the confidentiality and security of data, it is essential always to be concerned both for
common security, as well as for the privacy of individuals [6]. In this case, it is closely related to how
important the information and data is sent and received by the interested person. Information is no
longer useful if the information is tapped by an irresponsible person. For the data is not known by
parties who are not concerned, then each data owner is always trying to do security with some specific
techniques.
To secure the data, one way can be applied to use cryptography. Cryptography will encrypt the
data before the submission. There are many algorithms for cryptography that can be used. The use of
keys in cryptography is divided into two, symmetrical ones that only use a secret and asymmetric key
that uses a pair of public keys and a secret key. This research uses RSA [1][2]. It was discovered by
Ron Rivest, Adi Shamir, and Leonard Adleman in 1978. RSA stands for the initials of the names of
the three of them. RSA is used because it is the most commonly used asymmetric cryptography
algorithm at present. This algorithm is well known and safe. The length of keys in bits can be set. The
longer bit used, the more difficult to solve. It is because of the difficulty of factoring two huge numbers.
However, the greater the prime used, the longer the decryption process.
II. BASIC CONCEPT
2.1 Cryptography
Cryptography is a science or art of securing a message and done by a cryptographer. While
cryptanalysis is a science and art of solving ciphertext to plaintext. The person doing it is called
cryptanalysis. The word cryptography comes from the Greek word "kryptos" which means to hide and
"graphein" which means to write. Cryptography can be defined as a science that transforms
International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 03, Issue 07; July - 2017 [ISSN: 2455-1457]
@IJRTER-2017, All Rights Reserved 280
information from understandable forms into incomprehensible forms. Cryptography Algorithm always
consists of two parts, namely encryption, and decryption. Encryption is a process done to convert a
readable message into an unreadable message (ciphertext). Decryption is the opposite of the encryption
process, returning unread messages to unread messages. The encryption and decryption process is
governed by one or more cryptographic keys. In a system where there is a cryptographic algorithm,
plus all possible plaintext, ciphertext and keys are called cryptosystems [5].
2.2 Public-Key
One of the major difficulties of conventional encryption is the need for security to distribute
keys used in a secure state. The next generation technique is a modern cryptography. It is a way to
remove this weakness with an encryption model that does not require a key to be distributed. This
method is known as the "public-key" encryption and was first introduced in 1976. For conventional
encryption, the keys used in the encryption and decryption process are the same. However, this is not
necessary conditions. However, it is possible to construct an algorithm that uses one key for encryption
and decryption. This process requires different keys for encryption and decryption. Furthermore, it is
possible to create an algorithm in which the knowledge of the encryption algorithm and the encryption
key is insufficient to determine the decryption key [3].
The following techniques will be possible:
1. Each of the systems makes a key pair used for encryption and decryption.
2. Each of the systems will publish its public key by installing it in a general register or file, while its
partner is kept as a private key.
3. If the sender wants to record a message to the receiver, it will encrypt its message with the receiver's
public key.
4. When the receiver gets a message from the sender, it will use its private key to encrypt a message
from the sender.
Figure 1. Public-Key cryptography scheme
Figure 1 explains how public-key cryptography works. Both plaintexts are covered by public
and private keys. Several of them use the same key to encrypt and decrypt, but there also use the
different keys. Public-key solves the distribution problem because it does not need a key to share. All
users have access to public keys, and private keys are generated individually by each user, so there is
no need to share private keys between each other. As long as the user keeps the private key well, then
the information sent will always be safe and secure. Any system changing the private key of its partner
public key will replace the old public key. The weakness of public key encryption method, when
compared with the conventional encryption method, is this encryption has the more complex algorithm.
So for comparison the size and price of the hardware. The public key method will result in lower
performance than conventional methods.
International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 03, Issue 07; July - 2017 [ISSN: 2455-1457]
@IJRTER-2017, All Rights Reserved 281
Things to watch out for in Public-Key encryption such as:
1. The algorithm used for encryption and decryption with the key pair, one for encryption one for
decryption.
2. The sender and receiver must have a matching pair of keys.
3. One of the keys must be kept secret.
4. It is not possible or very impractical to translate encrypted information.
5. Knowledge of the algorithm and sample of the encrypted word is insufficient to determine the key.
2.3 RSA
RSA is one example of cryptography that applies the concept of the public-key cryptosystem
[4]. In the RSA algorithm, there are three main steps such as key generation, encryption, and decryption.
The keys to RSA include two keys, public key, and private key. The public key is used to perform
encryption and can be known by others. While the private key is kept secret and used to perform
decryption. RSA has several attributes indicate the input and output parameters [7][8]. The following
figure shows the process of RSA algorithm.
Figure 2. A flowchart illustrating the RSA algorithm
International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 03, Issue 07; July - 2017 [ISSN: 2455-1457]
@IJRTER-2017, All Rights Reserved 282
There are seven aspects we have to understand before trying to hack the RSA secret key such as:
1. P and Q : private
2. N = P . Q : public
3. φ(N) = (P - 1)(Q - 1) : private
4. E (encryption key) : public
5. D (decryption key) : private
6. M (plaintext) : private
7. C (ciphertext) : public
RSA uses two kinds of keys, public and private. A public key is a prime number which is shared
and unclassified. Both users can know the key, and anybody can get as well. A private key is a key
which is not shared or it is classified. Both users who keep the key must keep it secretly. The sender
and user hope nobody gets those values. N is got from P times Q. RSA uses the Euler function. It is a
function that is used in mathematical calculations. Euler function is a function that is used in
mathematical calculations on the RSA algorithm. It defines φ(N) for N ≥ 1 indicates the number of
positive integers < N relatively prime to N. Two numbers "A" and "B" are relatively prime if GCD(A,
B) = 1. The value of “E” and “D” are used to encrypt and decrypt. The “M” and “C” are the plaintext
and ciphertext byte arrays.
III. EVALUATION
The following illustration will discuss the RSA algorithm implementation which consists of
encryption and description process. For example, the sender sends a message to the recipient. The
process is done starting from the formation of the key, encryption and then the results are described
again the steps are as follows:
Table 1. Key Generation
Variable Value
P 9661
Q 48781
N 471273241
φ 471214800
Table 1 shows the key capture. Taken two small prime numbers of 5 and 11. N is derived from the
multiplication of both primes, N = 55; While Totien is 40.
Table 2. The Encryption Key and GCD
E GCD
459226353 3
459226354 2
459226355 35
459226356 12
459226357 1
459226358 2
459226359 9
459226360 40
459226361 1
459226362 42
459226363 1
459226364 4
International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 03, Issue 07; July - 2017 [ISSN: 2455-1457]
@IJRTER-2017, All Rights Reserved 283
Furthermore, in Table 2 will be selected value of E which has a value of GCD = 1. There are
several possible values to choose from because some have GCD = 1 viewed from the table. In this
experiment, we will choose the value E = 459226363, because GCD (459226363, 471214800) = 1.
Then we will find the value of the private key by using the algorithm and obtained that D = 459226363-
1
mod 471214800 = 307475827. Thus, the public key is (N, E) = (471273241, 459226363) and the
secret key is D = 307475827.
Table 3. The complete parameters of RSA
Variable Value
P 9661
Q 48781
N 471273241
T 471214800
E 459226363
D 307475827
The calculations below will illustrate the encryption and decryption process of the RSA algorithm.
Encryption Process:
E1 = 144459226363
𝑚𝑜𝑑 471273241
= 174408074
E2 = 102459226363
𝑚𝑜𝑑 471273241
= 118193768
E3 = 235459226363
𝑚𝑜𝑑 471273241
= 443990101
E4 = 218459226363
𝑚𝑜𝑑 471273241
= 409440301
E5 = 121459226363
𝑚𝑜𝑑 471273241
= 474605588
E6 = 2459226363
𝑚𝑜𝑑 471273241
= 445186215
Decryption Process:
D1 = 174408074307475827
𝑚𝑜𝑑 471273241
= 144
D2 = 118193768307475827
𝑚𝑜𝑑 471273241
= 102
D3 = 443990101307475827
𝑚𝑜𝑑 471273241
= 235
D4 = 409440301307475827
𝑚𝑜𝑑 471273241
= 218
E5 = 474605588307475827
𝑚𝑜𝑑 471273241
= 121
E6 = 445186215307475827
𝑚𝑜𝑑 471273241
= 2
International Journal of Recent Trends in Engineering & Research (IJRTER)
Volume 03, Issue 07; July - 2017 [ISSN: 2455-1457]
@IJRTER-2017, All Rights Reserved 284
Table 4. RSA Encryption & Decryptioon
ASCII Encryption Decryption
144 174408074 144
102 118193768 102
235 443990101 235
218 409440301 218
121 474605588 121
2 445186215 2
From the above example, it can be seen that the data before the encryption is the same as the
data after the decryption as shown in Table 4. The RCA cryptosystem makes our data more secure
from people who want to steal the data. In the example above the author used a 32-bit prime number.
To improve the security of data should use a bigger prime number and it is hard to factorize.
IV. CONCLUSION
Secrets and data security should be a top priority so that the data we want to send is only
accepted by the person who has been appointed as the recipient of the information. By using RSA
Algorithm, a system capable of ensuring data confidentiality can be established. From a technical point
of view, RSA has easy and simple encryption. However, seeing the size of the prime used, once
encrypted is a very difficult thing to return to the plaintext without knowing the prime number. In the
process of creating public keys and private keys, there are several factors to consider, namely the size
of the key, the determination of the p and q values to be difficult to crack, and the possible weaknesses
that can be known when the data is encrypted. The RSA algorithm's security is based on the difficulty
of factoring large numbers into their prime factors. RSA is very superior to security but very weak of
speed.
REFERENCES
[1] B. R. Ambedkar dan S. S. Bedi, “A New Factorization Method to Factorize RSA Public Key Encryption,”
International Journal of Computer Science, vol. 8, no. 6, pp. 242-247, 2011.
[2] H.-M. Sun, M.-E. Wu, W.-C. Ting dan M. J. Hinek, “Dual RSA and Its Security Analysis,” IEEE Transactions on
Information Theory, vol. 53, no. 8, 2007.
[3] N. Hegde dan P. Deepthi, “Pollard RHO Algorithm for Integer Factorization and Discrete Logarithm Problem,”
International Journal of Computer Applications, vol. 121, no. 18, pp. 14-17, 2012.
[4] A. P. U. Siahaan, “Factorization Hack of RSA Secret Numbers,” International Journal of Engineering Trends and
Technology, vol. 37, no. 1, pp. 15-18, 2016.
[5] M. Iqbal dan A. P. U. Siahaan, “The Understanding of GOST Cryptography Technique,” International Journal of
Engineering Trends and Technology, vol. 39, no. 3, pp. 168-172, 2016.
[6] E. Hariyanto dan R. Rahim, “Arnold’s Cat Map Algorithm in Digital Image Encryption,” International Journal of
Science and Research, vol. 5, no. 10, pp. 1363-1365, 2016.
[7] N. Y. Goshwe, “Data Encryption and Decryption Using RSA Algorithm in a Network Environment,” International
Journal of Computer Science and Network Security, vol. 13, no. 7, pp. 9-13, 2013.
[8] I. Jahan, M. Asif dan L. J. Rozario, “Improved RSA Cryptosystem Based on the Study of Number Theory and Public
Key Cryptosystems,” American Journal of Engineering Research, vol. 4, no. 1, pp. 143-149, 2015.
Ad

More Related Content

What's hot (19)

50120140507006
5012014050700650120140507006
50120140507006
IAEME Publication
 
Unit 4
Unit 4Unit 4
Unit 4
Vinod Kumar Gorrepati
 
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
AnirbanBhowmik8
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
 
Unit 2
Unit 2Unit 2
Unit 2
Vinod Kumar Gorrepati
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
pradip patel
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
ijtsrd
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
Amit Singh
 
H42063743
H42063743H42063743
H42063743
IJERA Editor
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
Chandan Gupta Bhagat
 
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesResearch trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniques
journalBEEI
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
eSAT Journals
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
acijjournal
 
Public key cryptography
Public key cryptographyPublic key cryptography
Public key cryptography
Lilies DLiestyowati
 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
IJECEIAES
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
eSAT Publishing House
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
ijircee
 
IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DES
IRJET Journal
 
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
AnirbanBhowmik8
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
pradip patel
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
ijtsrd
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
Amit Singh
 
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesResearch trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniques
journalBEEI
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
eSAT Journals
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
acijjournal
 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
IJECEIAES
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
eSAT Publishing House
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
ijircee
 
IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DES
IRJET Journal
 

Similar to RSA 32-bit Implementation Technique (20)

A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
IRJET Journal
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
 
Data Security With Colors Using Rsa
Data Security With Colors Using RsaData Security With Colors Using Rsa
Data Security With Colors Using Rsa
IJERA Editor
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
IJERA Editor
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
IOSR Journals
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
pankaj kumari
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
ijsrd.com
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
ijcsa
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
AnmolBansal66
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
Editor IJCATR
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
IOSR Journals
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
Yasmine Anino
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
Iasir Journals
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
IJNSA Journal
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
IJNSA Journal
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
journalBEEI
 
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
IJNSA Journal
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
IRJET Journal
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
 
Data Security With Colors Using Rsa
Data Security With Colors Using RsaData Security With Colors Using Rsa
Data Security With Colors Using Rsa
IJERA Editor
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
IOSR Journals
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
pankaj kumari
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
ijsrd.com
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
eSAT Publishing House
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
ijcsa
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
Editor IJCATR
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
IOSR Journals
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
Yasmine Anino
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
IJNSA Journal
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
IJNSA Journal
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
journalBEEI
 
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
IJNSA Journal
 
Ad

More from Universitas Pembangunan Panca Budi (20)

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Universitas Pembangunan Panca Budi
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
Universitas Pembangunan Panca Budi
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Universitas Pembangunan Panca Budi
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Universitas Pembangunan Panca Budi
 
Online Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory StudyOnline Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory Study
Universitas Pembangunan Panca Budi
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Universitas Pembangunan Panca Budi
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Universitas Pembangunan Panca Budi
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny Algorithm
Universitas Pembangunan Panca Budi
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Universitas Pembangunan Panca Budi
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Universitas Pembangunan Panca Budi
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
Universitas Pembangunan Panca Budi
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
Universitas Pembangunan Panca Budi
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Universitas Pembangunan Panca Budi
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Universitas Pembangunan Panca Budi
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Universitas Pembangunan Panca Budi
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Universitas Pembangunan Panca Budi
 
Image Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface CalculationImage Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface Calculation
Universitas Pembangunan Panca Budi
 
Data Compression Using Elias Delta Code
Data Compression Using Elias Delta CodeData Compression Using Elias Delta Code
Data Compression Using Elias Delta Code
Universitas Pembangunan Panca Budi
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
Universitas Pembangunan Panca Budi
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Universitas Pembangunan Panca Budi
 
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Universitas Pembangunan Panca Budi
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
Universitas Pembangunan Panca Budi
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Universitas Pembangunan Panca Budi
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Universitas Pembangunan Panca Budi
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Universitas Pembangunan Panca Budi
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Universitas Pembangunan Panca Budi
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny Algorithm
Universitas Pembangunan Panca Budi
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Universitas Pembangunan Panca Budi
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
Universitas Pembangunan Panca Budi
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
Universitas Pembangunan Panca Budi
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Universitas Pembangunan Panca Budi
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Universitas Pembangunan Panca Budi
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Universitas Pembangunan Panca Budi
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Universitas Pembangunan Panca Budi
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
Universitas Pembangunan Panca Budi
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Universitas Pembangunan Panca Budi
 
Ad

Recently uploaded (20)

Cultivation Practice of Onion in Nepal.pptx
Cultivation Practice of Onion in Nepal.pptxCultivation Practice of Onion in Nepal.pptx
Cultivation Practice of Onion in Nepal.pptx
UmeshTimilsina1
 
How to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 PurchaseHow to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 Purchase
Celine George
 
Rock Art As a Source of Ancient Indian History
Rock Art As a Source of Ancient Indian HistoryRock Art As a Source of Ancient Indian History
Rock Art As a Source of Ancient Indian History
Virag Sontakke
 
The History of Kashmir Karkota Dynasty NEP.pptx
The History of Kashmir Karkota Dynasty NEP.pptxThe History of Kashmir Karkota Dynasty NEP.pptx
The History of Kashmir Karkota Dynasty NEP.pptx
Arya Mahila P. G. College, Banaras Hindu University, Varanasi, India.
 
TERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptx
TERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptxTERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptx
TERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptx
PoojaSen20
 
Pope Leo XIV, the first Pope from North America.pptx
Pope Leo XIV, the first Pope from North America.pptxPope Leo XIV, the first Pope from North America.pptx
Pope Leo XIV, the first Pope from North America.pptx
Martin M Flynn
 
Ajanta Paintings: Study as a Source of History
Ajanta Paintings: Study as a Source of HistoryAjanta Paintings: Study as a Source of History
Ajanta Paintings: Study as a Source of History
Virag Sontakke
 
spinal cord disorders (Myelopathies and radiculoapthies)
spinal cord disorders (Myelopathies and radiculoapthies)spinal cord disorders (Myelopathies and radiculoapthies)
spinal cord disorders (Myelopathies and radiculoapthies)
Mohamed Rizk Khodair
 
What is the Philosophy of Statistics? (and how I was drawn to it)
What is the Philosophy of Statistics? (and how I was drawn to it)What is the Philosophy of Statistics? (and how I was drawn to it)
What is the Philosophy of Statistics? (and how I was drawn to it)
jemille6
 
Module 1: Foundations of Research
Module 1: Foundations of ResearchModule 1: Foundations of Research
Module 1: Foundations of Research
drroxannekemp
 
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon DolabaniHistory Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
fruinkamel7m
 
Origin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theoriesOrigin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theories
PrachiSontakke5
 
Drugs in Anaesthesia and Intensive Care,.pdf
Drugs in Anaesthesia and Intensive Care,.pdfDrugs in Anaesthesia and Intensive Care,.pdf
Drugs in Anaesthesia and Intensive Care,.pdf
crewot855
 
Search Matching Applicants in Odoo 18 - Odoo Slides
Search Matching Applicants in Odoo 18 - Odoo SlidesSearch Matching Applicants in Odoo 18 - Odoo Slides
Search Matching Applicants in Odoo 18 - Odoo Slides
Celine George
 
How to Share Accounts Between Companies in Odoo 18
How to Share Accounts Between Companies in Odoo 18How to Share Accounts Between Companies in Odoo 18
How to Share Accounts Between Companies in Odoo 18
Celine George
 
Form View Attributes in Odoo 18 - Odoo Slides
Form View Attributes in Odoo 18 - Odoo SlidesForm View Attributes in Odoo 18 - Odoo Slides
Form View Attributes in Odoo 18 - Odoo Slides
Celine George
 
MEDICAL BIOLOGY MCQS BY. DR NASIR MUSTAFA
MEDICAL BIOLOGY MCQS  BY. DR NASIR MUSTAFAMEDICAL BIOLOGY MCQS  BY. DR NASIR MUSTAFA
MEDICAL BIOLOGY MCQS BY. DR NASIR MUSTAFA
Dr. Nasir Mustafa
 
Chemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptxChemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptx
Mayuri Chavan
 
Ancient Stone Sculptures of India: As a Source of Indian History
Ancient Stone Sculptures of India: As a Source of Indian HistoryAncient Stone Sculptures of India: As a Source of Indian History
Ancient Stone Sculptures of India: As a Source of Indian History
Virag Sontakke
 
Cultivation Practice of Onion in Nepal.pptx
Cultivation Practice of Onion in Nepal.pptxCultivation Practice of Onion in Nepal.pptx
Cultivation Practice of Onion in Nepal.pptx
UmeshTimilsina1
 
How to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 PurchaseHow to Manage Amounts in Local Currency in Odoo 18 Purchase
How to Manage Amounts in Local Currency in Odoo 18 Purchase
Celine George
 
Rock Art As a Source of Ancient Indian History
Rock Art As a Source of Ancient Indian HistoryRock Art As a Source of Ancient Indian History
Rock Art As a Source of Ancient Indian History
Virag Sontakke
 
TERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptx
TERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptxTERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptx
TERMINOLOGIES,GRIEF PROCESS AND LOSS AMD ITS TYPES .pptx
PoojaSen20
 
Pope Leo XIV, the first Pope from North America.pptx
Pope Leo XIV, the first Pope from North America.pptxPope Leo XIV, the first Pope from North America.pptx
Pope Leo XIV, the first Pope from North America.pptx
Martin M Flynn
 
Ajanta Paintings: Study as a Source of History
Ajanta Paintings: Study as a Source of HistoryAjanta Paintings: Study as a Source of History
Ajanta Paintings: Study as a Source of History
Virag Sontakke
 
spinal cord disorders (Myelopathies and radiculoapthies)
spinal cord disorders (Myelopathies and radiculoapthies)spinal cord disorders (Myelopathies and radiculoapthies)
spinal cord disorders (Myelopathies and radiculoapthies)
Mohamed Rizk Khodair
 
What is the Philosophy of Statistics? (and how I was drawn to it)
What is the Philosophy of Statistics? (and how I was drawn to it)What is the Philosophy of Statistics? (and how I was drawn to it)
What is the Philosophy of Statistics? (and how I was drawn to it)
jemille6
 
Module 1: Foundations of Research
Module 1: Foundations of ResearchModule 1: Foundations of Research
Module 1: Foundations of Research
drroxannekemp
 
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon DolabaniHistory Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
History Of The Monastery Of Mor Gabriel Philoxenos Yuhanon Dolabani
fruinkamel7m
 
Origin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theoriesOrigin of Brahmi script: A breaking down of various theories
Origin of Brahmi script: A breaking down of various theories
PrachiSontakke5
 
Drugs in Anaesthesia and Intensive Care,.pdf
Drugs in Anaesthesia and Intensive Care,.pdfDrugs in Anaesthesia and Intensive Care,.pdf
Drugs in Anaesthesia and Intensive Care,.pdf
crewot855
 
Search Matching Applicants in Odoo 18 - Odoo Slides
Search Matching Applicants in Odoo 18 - Odoo SlidesSearch Matching Applicants in Odoo 18 - Odoo Slides
Search Matching Applicants in Odoo 18 - Odoo Slides
Celine George
 
How to Share Accounts Between Companies in Odoo 18
How to Share Accounts Between Companies in Odoo 18How to Share Accounts Between Companies in Odoo 18
How to Share Accounts Between Companies in Odoo 18
Celine George
 
Form View Attributes in Odoo 18 - Odoo Slides
Form View Attributes in Odoo 18 - Odoo SlidesForm View Attributes in Odoo 18 - Odoo Slides
Form View Attributes in Odoo 18 - Odoo Slides
Celine George
 
MEDICAL BIOLOGY MCQS BY. DR NASIR MUSTAFA
MEDICAL BIOLOGY MCQS  BY. DR NASIR MUSTAFAMEDICAL BIOLOGY MCQS  BY. DR NASIR MUSTAFA
MEDICAL BIOLOGY MCQS BY. DR NASIR MUSTAFA
Dr. Nasir Mustafa
 
Chemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptxChemotherapy of Malignancy -Anticancer.pptx
Chemotherapy of Malignancy -Anticancer.pptx
Mayuri Chavan
 
Ancient Stone Sculptures of India: As a Source of Indian History
Ancient Stone Sculptures of India: As a Source of Indian HistoryAncient Stone Sculptures of India: As a Source of Indian History
Ancient Stone Sculptures of India: As a Source of Indian History
Virag Sontakke
 

RSA 32-bit Implementation Technique

  • 1. DOI : 10.23883/IJRTER.2017.3359.UXAIW 279 RSA 32-bit Implementation Technique Dian Kurnia1 , Haida Dafitri2 , Sugianto3 , Mardiana4 , Andysah Putera Utama Siahaan5 1,5 Faculty of Computer Science, Universitas Pembanguan Panca Budi, Medan, Indonesia 2,4 Department of Informatics, Sekolah Tinggi Teknik Harapan, Medan, Indonesia 3 Department of Information System, Sekolah Tinggi Teknik Harapan, Medan, Indonesia Abstract - Encryption is a technique that transforms a code from an understandable into an incomprehensible code. Many methods can be applied to an encryption process. One such method is RSA. RSA works by appointing on byte values. The value is obtained from character conversion to ASCII code. This algorithm is based on the multiplication of two relatively large primes. Applications of the RSA algorithm can be used in data security. This research provides RSA algorithm application on data security system that can guarantee data confidentiality. RSA algorithm is known as a very secure algorithm. This algorithm works with the number of bits in the search for prime numbers. The larger the bits, the less chance of ciphertext can be solved. The weakness of this method is the amount of ciphertext capacity will be floating in line with the number of prime numbers used. Also, to perform the process of encryption and decryption, RSA requires a relatively long time than other algorithms. The advantage of RSA is that complicated ciphertext is solved into plaintext. Keywords - Cryptography, RSA, Public Key, Prime I. INTRODUCTION Data security and confidentiality issues are an important aspect of information systems. Because of the confidentiality and security of data, it is essential always to be concerned both for common security, as well as for the privacy of individuals [6]. In this case, it is closely related to how important the information and data is sent and received by the interested person. Information is no longer useful if the information is tapped by an irresponsible person. For the data is not known by parties who are not concerned, then each data owner is always trying to do security with some specific techniques. To secure the data, one way can be applied to use cryptography. Cryptography will encrypt the data before the submission. There are many algorithms for cryptography that can be used. The use of keys in cryptography is divided into two, symmetrical ones that only use a secret and asymmetric key that uses a pair of public keys and a secret key. This research uses RSA [1][2]. It was discovered by Ron Rivest, Adi Shamir, and Leonard Adleman in 1978. RSA stands for the initials of the names of the three of them. RSA is used because it is the most commonly used asymmetric cryptography algorithm at present. This algorithm is well known and safe. The length of keys in bits can be set. The longer bit used, the more difficult to solve. It is because of the difficulty of factoring two huge numbers. However, the greater the prime used, the longer the decryption process. II. BASIC CONCEPT 2.1 Cryptography Cryptography is a science or art of securing a message and done by a cryptographer. While cryptanalysis is a science and art of solving ciphertext to plaintext. The person doing it is called cryptanalysis. The word cryptography comes from the Greek word "kryptos" which means to hide and "graphein" which means to write. Cryptography can be defined as a science that transforms
  • 2. International Journal of Recent Trends in Engineering & Research (IJRTER) Volume 03, Issue 07; July - 2017 [ISSN: 2455-1457] @IJRTER-2017, All Rights Reserved 280 information from understandable forms into incomprehensible forms. Cryptography Algorithm always consists of two parts, namely encryption, and decryption. Encryption is a process done to convert a readable message into an unreadable message (ciphertext). Decryption is the opposite of the encryption process, returning unread messages to unread messages. The encryption and decryption process is governed by one or more cryptographic keys. In a system where there is a cryptographic algorithm, plus all possible plaintext, ciphertext and keys are called cryptosystems [5]. 2.2 Public-Key One of the major difficulties of conventional encryption is the need for security to distribute keys used in a secure state. The next generation technique is a modern cryptography. It is a way to remove this weakness with an encryption model that does not require a key to be distributed. This method is known as the "public-key" encryption and was first introduced in 1976. For conventional encryption, the keys used in the encryption and decryption process are the same. However, this is not necessary conditions. However, it is possible to construct an algorithm that uses one key for encryption and decryption. This process requires different keys for encryption and decryption. Furthermore, it is possible to create an algorithm in which the knowledge of the encryption algorithm and the encryption key is insufficient to determine the decryption key [3]. The following techniques will be possible: 1. Each of the systems makes a key pair used for encryption and decryption. 2. Each of the systems will publish its public key by installing it in a general register or file, while its partner is kept as a private key. 3. If the sender wants to record a message to the receiver, it will encrypt its message with the receiver's public key. 4. When the receiver gets a message from the sender, it will use its private key to encrypt a message from the sender. Figure 1. Public-Key cryptography scheme Figure 1 explains how public-key cryptography works. Both plaintexts are covered by public and private keys. Several of them use the same key to encrypt and decrypt, but there also use the different keys. Public-key solves the distribution problem because it does not need a key to share. All users have access to public keys, and private keys are generated individually by each user, so there is no need to share private keys between each other. As long as the user keeps the private key well, then the information sent will always be safe and secure. Any system changing the private key of its partner public key will replace the old public key. The weakness of public key encryption method, when compared with the conventional encryption method, is this encryption has the more complex algorithm. So for comparison the size and price of the hardware. The public key method will result in lower performance than conventional methods.
  • 3. International Journal of Recent Trends in Engineering & Research (IJRTER) Volume 03, Issue 07; July - 2017 [ISSN: 2455-1457] @IJRTER-2017, All Rights Reserved 281 Things to watch out for in Public-Key encryption such as: 1. The algorithm used for encryption and decryption with the key pair, one for encryption one for decryption. 2. The sender and receiver must have a matching pair of keys. 3. One of the keys must be kept secret. 4. It is not possible or very impractical to translate encrypted information. 5. Knowledge of the algorithm and sample of the encrypted word is insufficient to determine the key. 2.3 RSA RSA is one example of cryptography that applies the concept of the public-key cryptosystem [4]. In the RSA algorithm, there are three main steps such as key generation, encryption, and decryption. The keys to RSA include two keys, public key, and private key. The public key is used to perform encryption and can be known by others. While the private key is kept secret and used to perform decryption. RSA has several attributes indicate the input and output parameters [7][8]. The following figure shows the process of RSA algorithm. Figure 2. A flowchart illustrating the RSA algorithm
  • 4. International Journal of Recent Trends in Engineering & Research (IJRTER) Volume 03, Issue 07; July - 2017 [ISSN: 2455-1457] @IJRTER-2017, All Rights Reserved 282 There are seven aspects we have to understand before trying to hack the RSA secret key such as: 1. P and Q : private 2. N = P . Q : public 3. φ(N) = (P - 1)(Q - 1) : private 4. E (encryption key) : public 5. D (decryption key) : private 6. M (plaintext) : private 7. C (ciphertext) : public RSA uses two kinds of keys, public and private. A public key is a prime number which is shared and unclassified. Both users can know the key, and anybody can get as well. A private key is a key which is not shared or it is classified. Both users who keep the key must keep it secretly. The sender and user hope nobody gets those values. N is got from P times Q. RSA uses the Euler function. It is a function that is used in mathematical calculations. Euler function is a function that is used in mathematical calculations on the RSA algorithm. It defines φ(N) for N ≥ 1 indicates the number of positive integers < N relatively prime to N. Two numbers "A" and "B" are relatively prime if GCD(A, B) = 1. The value of “E” and “D” are used to encrypt and decrypt. The “M” and “C” are the plaintext and ciphertext byte arrays. III. EVALUATION The following illustration will discuss the RSA algorithm implementation which consists of encryption and description process. For example, the sender sends a message to the recipient. The process is done starting from the formation of the key, encryption and then the results are described again the steps are as follows: Table 1. Key Generation Variable Value P 9661 Q 48781 N 471273241 φ 471214800 Table 1 shows the key capture. Taken two small prime numbers of 5 and 11. N is derived from the multiplication of both primes, N = 55; While Totien is 40. Table 2. The Encryption Key and GCD E GCD 459226353 3 459226354 2 459226355 35 459226356 12 459226357 1 459226358 2 459226359 9 459226360 40 459226361 1 459226362 42 459226363 1 459226364 4
  • 5. International Journal of Recent Trends in Engineering & Research (IJRTER) Volume 03, Issue 07; July - 2017 [ISSN: 2455-1457] @IJRTER-2017, All Rights Reserved 283 Furthermore, in Table 2 will be selected value of E which has a value of GCD = 1. There are several possible values to choose from because some have GCD = 1 viewed from the table. In this experiment, we will choose the value E = 459226363, because GCD (459226363, 471214800) = 1. Then we will find the value of the private key by using the algorithm and obtained that D = 459226363- 1 mod 471214800 = 307475827. Thus, the public key is (N, E) = (471273241, 459226363) and the secret key is D = 307475827. Table 3. The complete parameters of RSA Variable Value P 9661 Q 48781 N 471273241 T 471214800 E 459226363 D 307475827 The calculations below will illustrate the encryption and decryption process of the RSA algorithm. Encryption Process: E1 = 144459226363 𝑚𝑜𝑑 471273241 = 174408074 E2 = 102459226363 𝑚𝑜𝑑 471273241 = 118193768 E3 = 235459226363 𝑚𝑜𝑑 471273241 = 443990101 E4 = 218459226363 𝑚𝑜𝑑 471273241 = 409440301 E5 = 121459226363 𝑚𝑜𝑑 471273241 = 474605588 E6 = 2459226363 𝑚𝑜𝑑 471273241 = 445186215 Decryption Process: D1 = 174408074307475827 𝑚𝑜𝑑 471273241 = 144 D2 = 118193768307475827 𝑚𝑜𝑑 471273241 = 102 D3 = 443990101307475827 𝑚𝑜𝑑 471273241 = 235 D4 = 409440301307475827 𝑚𝑜𝑑 471273241 = 218 E5 = 474605588307475827 𝑚𝑜𝑑 471273241 = 121 E6 = 445186215307475827 𝑚𝑜𝑑 471273241 = 2
  • 6. International Journal of Recent Trends in Engineering & Research (IJRTER) Volume 03, Issue 07; July - 2017 [ISSN: 2455-1457] @IJRTER-2017, All Rights Reserved 284 Table 4. RSA Encryption & Decryptioon ASCII Encryption Decryption 144 174408074 144 102 118193768 102 235 443990101 235 218 409440301 218 121 474605588 121 2 445186215 2 From the above example, it can be seen that the data before the encryption is the same as the data after the decryption as shown in Table 4. The RCA cryptosystem makes our data more secure from people who want to steal the data. In the example above the author used a 32-bit prime number. To improve the security of data should use a bigger prime number and it is hard to factorize. IV. CONCLUSION Secrets and data security should be a top priority so that the data we want to send is only accepted by the person who has been appointed as the recipient of the information. By using RSA Algorithm, a system capable of ensuring data confidentiality can be established. From a technical point of view, RSA has easy and simple encryption. However, seeing the size of the prime used, once encrypted is a very difficult thing to return to the plaintext without knowing the prime number. In the process of creating public keys and private keys, there are several factors to consider, namely the size of the key, the determination of the p and q values to be difficult to crack, and the possible weaknesses that can be known when the data is encrypted. The RSA algorithm's security is based on the difficulty of factoring large numbers into their prime factors. RSA is very superior to security but very weak of speed. REFERENCES [1] B. R. Ambedkar dan S. S. Bedi, “A New Factorization Method to Factorize RSA Public Key Encryption,” International Journal of Computer Science, vol. 8, no. 6, pp. 242-247, 2011. [2] H.-M. Sun, M.-E. Wu, W.-C. Ting dan M. J. Hinek, “Dual RSA and Its Security Analysis,” IEEE Transactions on Information Theory, vol. 53, no. 8, 2007. [3] N. Hegde dan P. Deepthi, “Pollard RHO Algorithm for Integer Factorization and Discrete Logarithm Problem,” International Journal of Computer Applications, vol. 121, no. 18, pp. 14-17, 2012. [4] A. P. U. Siahaan, “Factorization Hack of RSA Secret Numbers,” International Journal of Engineering Trends and Technology, vol. 37, no. 1, pp. 15-18, 2016. [5] M. Iqbal dan A. P. U. Siahaan, “The Understanding of GOST Cryptography Technique,” International Journal of Engineering Trends and Technology, vol. 39, no. 3, pp. 168-172, 2016. [6] E. Hariyanto dan R. Rahim, “Arnold’s Cat Map Algorithm in Digital Image Encryption,” International Journal of Science and Research, vol. 5, no. 10, pp. 1363-1365, 2016. [7] N. Y. Goshwe, “Data Encryption and Decryption Using RSA Algorithm in a Network Environment,” International Journal of Computer Science and Network Security, vol. 13, no. 7, pp. 9-13, 2013. [8] I. Jahan, M. Asif dan L. J. Rozario, “Improved RSA Cryptosystem Based on the Study of Number Theory and Public Key Cryptosystems,” American Journal of Engineering Research, vol. 4, no. 1, pp. 143-149, 2015.
  翻译: