logo

Paper | Implementation Design for Data Encryption & Decryption

   

Added on  2019-09-30

7 Pages2263 Words227 Views
Faculty of Science, Engineering and ComputingMSc in Network and Information SecurityCryptography and ApplicationsEncrypting and Decrypting Data Using RSA Algorithm for Micro Distributers Student Name : M.A.M.Mafaaz

AbstractOne of$the major$challenge faced by microdistributes sharing resources on networksand its security. The fact is when it comes tosharing between$computers in a network,the main issue is when it comesstodataasecurity its critical. This paper presentsan implementation design fordatawencryption and decryptionain anetworkwenvironment using RSA algorithmusing a$specificdblock size message. Andthe algorithmaallows the sender to$generatea public key to encrypt the data and receiveris to$generate a privet key using a securedatabase. And even an incorrect privet keycan decrypt the encrypted data, but it willgive a different form of original date whichis not the data sent by the sender.IntroductionCryptography is playing a majorrole in dataprotection in applications running in anetwork$environment. It allows individualsto do business electronicallyswithout anyfear of fraud or deceptionnin$addition toensure the integrity of the$data andauthenticity from its sender. Now a days itsmore critical$to our day to day life sincemillions of individuals interact electronicallyevery day via email, ecommerce, onlinebanking, Mobile phones, etc. In this way$ofinformation being transmitted electronicallyhas bought a great impact on the dependsof$cryptography and authentication methods[1-3].Determining the factWthat securedcommunication$has been for ages, the keymanaging problem has prevented it fromdifferent applications. The@development ofpublic key$cryptography has allowed alarge-scale of network users$that cancommunicate securely with$each other evenif they had never$communicated earlier. Inconsidering to micro distributes$which isthe largest distribution network in thecountry, and where else they$need tostrengthen their ERP system interconnectingwith$a Public Key encryption techniqueusing RSA algorithm which will convert$thedata to a form of meaningless data thereforeit will protect unsanctioned users$fromhaving access to the data even if theyareable to access the system [6-7].Methodology There aresseveral waysoof categorizing datacryptographic algorithms but for the purposeof this paper, it willsbe classified based onthe amount of keys that are used for theencryption and decryption. The threecommon typessof algorithms are:SymmetricKeyAlgorithm:The technique used here is a single key forboth encryption and decryption. Thearrangements are generally categorized asbeing either stream ciphers or block ciphers.Stream ciphers functions on a single bit/byteor computer word at a time and implementsome form of the response mechanism sothat the key is continually changing whileblock cipher arrangement encrypts oneblock of data at a time using the same keyon each block.The key disadvantage of this technique ispropagationeerror because a corruptedtbit intransmission will resultosome corrupt bits atthe receiving end. Though stream ciphers donot$propagate transmission errors, they areperiodic therefore of key stream willeventuallykeepoonrepeating.Thisnnormally results in the use of digitalsignature mechanisms with any large keys ofthe public verification$function or the use ofa TTP [4-5].2 | P a g e

Asymmetric Key algorithm: This arrangement usessone key forencryption and a different key fordecryption. Modern asymmetrickkey wasfirst describeduusing a two-keycryptodsystem in which twodparties couldengage in a secure communication over anon-secure communication network channelwithouthhaving a shared secret key. But inasymmetric key, one of the keys isdesignated as the public keynand may beadvertised as widely as thessender wants.The other key is designated as the privatekey and is never revealed tosanother parties.RSA is one of the first andsstill mostcommonaasymmetric key implementationthat issin use at present for keyeexchange ordigitalssignatures. The key advantage of thismethod is that administrationnof keys on anetwork requires the presence of only afunctionally trusted TTP, as opposed to anunconditionally trusted TTP. Depending onthe way of usage of the TTP might only berequired in an off-line manner, assopposedto in real time. Many public-key schemesyield relatively efficient signaturemechanisms. The key used to describe thepubliccverification function istypicallymuch lesser than the symmetric-keyccounterpart [6-7].Hash Functions: The uses a mathematicalotransformation toirreversibly "encrypt" data. Thisalgorithmmdoes not allows use of keysforrencryption andddecryption of data. Itrather uses a fixed-length hashhvalue whichcomputeddbased on a plaintext that makessitimpossible for either the contents or lengthof the plaintext to be recovered. Thesealgorithms are typically used to givedigitalhfingerprints of file's content,oftennused to certify that the filehhas notbeennaltered by an intruder or virus. Hashfunctions are also usually used by manyoperatingssystems to encryptdpasswords toprovide somemeasure of the integrity of afile.Generating RSA Algorithm Publicand Private Key PairThe RSA algorithmccan be used for bothkey exchange and digitalssignatures.Although its used with numbersuusinghundreds of digits, the mathematics behindRSA is relatively straight-forward. To createan RSA public and privateekey pair, thefollowing steps can be used: i.Choose two prime numbers, p and q.From these numbers you cancalculate the modulus, n = pq ii.Select a third number, e, that isrelatively prime to the product (p−1)(q−1), the number e is the publicexponent.iii.Calculate an integer d fromthequotient The number d isthe private exponent. iv.The public key is the number pair(n,e) Although these values arecommonly known, it iscomputationally infeasible todetermine d from n and e if p and qarelargeenough.v.To encrypt a message, M, with thepublic key, creates the cipher-text, C,using the equation: C=M Mod n 3 | P a g e

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Encryption Techniques Assignment 2022
|9
|2287
|7

Cryptography Assignment 2022
|8
|559
|16

World Interoperability Assignment PDF
|6
|1956
|35

Wireless Networking Concepts
|5
|897
|471

Cryptography and System Security .
|7
|1528
|232

Encryption Algorithm Assignment
|6
|1103
|186