Affiliation:
1. Department of Computer Science Engineering, Institute of Technology, Bhaddal, Ropar, Punjab, India
Abstract
For communication in the wireless networking, transmission of data over network sometimes is not safe. In such case security of network is one of the essential aspect in computer networking. Cryptography is antechnique of transforming an plaindata into encrypted one, and then retransform that encrypted data back to its plain (original) form. In this we authenticate the sender to whom you want to send that data file. There are two different techniques of cryptography, symmetric key cryptography (called public-key cryptography) algorithms and asymmetric key cryptography (called public-key cryptography) algorithms. There are also various algorithms for encrypted data using either public or private key or both. This paper describes RSA algorithm which first convert our data into other form and then encrypt it using RSA public key encryption at sender side & at receiver side, first it authenticate the receiver then decrypt the data/ file and convert into original form.
Reference10 articles.
1. Xin Zhou and XiaofeiTang,"Research and implementation of RSA algorithm for encryption and decryption,"Proceedings of 2011 6th International Forum on Strategic Technology, Harbin, Heilongjiang,2011,pp. 1118-1121,doi:10.1109/IFOST.2011.6021216
2. Abdelhalim, mohamed b & El-Mahallawy, Mohamed &Ayyad, Mohammad. (2013). In RFID SystemDesign and Implementation of an Encryption Algorithm is available. International Journal of RFID Security and Cryptography.2)51-57.10.20533/ijrfidsc.2046.3715.2013.0007.
3. Osho, Oluwafemi&Zubair, Yunus&Ojeniyi, Joseph &Osho, Lauretta. (2014). A Simple Encryption and Decryption System.
4. Aminudin, Nur&Maseleno, Andino&Shanmugam, Hemalatha& Kumar, K &Fauzi, &Irviani, Rita &Muslihudin, Muhamad. (2018). Nur Algorithm on Data Encryption and Decryption.International Journal of Engineering and Technology.7. 10.14419/ijet.v7i2.26.14363.
5. Agrawal, Ekta& Pal, Parashu. (2017). It is a Secure and Fast Approach for Encryption and Decryption of Message Communication. International Journal of Engineering Science and Computing. 7. 5.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献