A Key Generation Implementation of Modified RSA Technique in Encryption and Decryption

dc.contributor.guideDubey Sanjay
dc.coverage.spatial
dc.creator.researcherPatidar Rahul (18CAP7CAP0006)
dc.date.accessioned2023-09-21T07:06:29Z
dc.date.available2023-09-21T07:06:29Z
dc.date.awarded2023
dc.date.completed2023
dc.date.registered2019
dc.description.abstractCryptography was introduced from the concern of securing the sensitive information newlineexchanged over the digital network from being hacked. In cryptography, the sender newlineencrypts the information with some special (secret) key and on the other end, the receiver newlinedecrypts the information by using same or another key. In this way, only the receiver is newlineable to interpret that information. newlineCryptosystems can be divided into two types, first one is secret key cryptosystem newline(symmetric) and second one is public key cryptosystem (asymmetric). In secret key newlinecryptosystem, the same key is given to both the sender and the receiver. With the help of newlinethe key, the sender encrypts the message and on the other hand the receiver decrypts the newlineencrypted message to get the original message. It is easy to implement as only one key is newlineused in the whole process but with this easiness some drawbacks are also there such as newlinekey distribution, non repudiation problem, authentication etc. newlineAround 1975, Whitfield Diffie and Martin Hellman suggested public key (asymmetric newlinekey) cryptography. In this type of cryptography, there are two types of key are used, one newlineis public key and the other one is private key. These keys are mathematically related to newlineeach other. Public key is disclosed to everyone while private key is kept secret. Public newlinekey used for the encryption of the message that is to be sent while the private key helps in newlinedecrypting the encrypted message for the receiver. Private Key cannot be generated by newlinethe attacker using public key even though both keys are interrelated. newlineIn this thesis we have proposed a modified RSA cryptographic algorithm and its results newlineare compared with existing algorithms and it is found that the proposed algorithm works newlinebetter than the existing one.
dc.description.note
dc.format.accompanyingmaterialDVD
dc.format.dimensions
dc.format.extent
dc.identifier.urihttp://hdl.handle.net/10603/513049
dc.languageEnglish
dc.publisher.institutionFaculty of Computer Application
dc.publisher.placeIndore
dc.publisher.universitySAGE University, Indore
dc.relation
dc.rightsuniversity
dc.source.universityUniversity
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Interdisciplinary Applications
dc.subject.keywordEngineering and Technology
dc.titleA Key Generation Implementation of Modified RSA Technique in Encryption and Decryption
dc.title.alternative
dc.type.degreePh.D.

Files

Original bundle

Now showing 1 - 5 of 11
Loading...
Thumbnail Image
Name:
01_title.pdf
Size:
72.52 KB
Format:
Adobe Portable Document Format
Description:
Attached File
Loading...
Thumbnail Image
Name:
02_prelim_pages.pdf
Size:
1.24 MB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
03_content.pdf
Size:
249.49 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
04_abstract.pdf
Size:
139.26 KB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
05_chapter 1.pdf
Size:
706.29 KB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.79 KB
Format:
Plain Text
Description: