An International Journal House

Einstein International Journal Organization(EIJO)

Connecting People With Genius Thought

Einstein International Journal Organization(EIJO) is an international Genius Thought journals platform .
JOURNALS || EIJO Journal of Engineering, Technology and Innovative Research (EIJO – JETIR) [ ISSN : 2455 - 9172 ]
Enhancement of Asymmetric RSA Algorithm for Cryptographic System

Author Names : 1Dr. Himanshu Arora,2Shilpi Mishra, 3Smita Sankhla,4Pradeep Jha  Volume 4 Issue 2
Article Overview

Abstract  

A cryptosystem is a pair of algorithms that accept a key and convert the plaintext into encrypted text and vice versa. In this process two types of algorithms are used symmetric and asymmetric algorithm. In the symmetric algorithm both the sender and receiver key are same but in the asymmetric algorithm the sender and receiver key are different that makes this type of algorithms more secure. In the asymmetric algorithm RSA is the one of the most popular algorithm. In this paper present the enhancement of Asymmetric RSA algorithm which is used in the cryptographic System. The security of the RSA system is based on the premise that many decomposing factors are difficult. In RSA, if we can factor the module (n) in its prime numbers, we can also get the private key. So in this paper a customized RSA algorithm is offered called Dual Modulus Digital Logarithmic Algorithm (DMDLA). The DMDLA algorithm uses dual module digital logarithmic encryption and decryption, so it is safer than the RSA algorithm.

Keywords: RSA Algorithm, DMDLA Algorithm, Encryption, Decryption, Cryptography.

Reference
  1.  Soram Ranbir Singh, Ajoy Kumar Khan and Soram Rakesh Singh, "Performance Evaluation of RSA and Elliptic Curve Cryptography", IEEE 2nd International Conference on Contemporary Computing and Informatics (ic3i), PP-302-306, 2016.
  2. Aiswarya P M, Archana Raj, Dona John, Liya Martin and Sreenu G, "BINARY RSA ENCRYPTION ALGORITHM", IEEE International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), PP-178-181, 2016.
  3. Prasenjit Kumar Das, Mr. Pradeep Kumar and Manubolu Sreenivasulu, "Image Cryptography: A Survey towards its Growth", Advance in Electronic and Electric Engineering, Volume 4, Number 2, pp. 179-184, 2014.
  4. Aniati Murni, “Image Processing”, class handouts, Faculty of Computer Science, University of Indonesia, Jakarta, 2000.
  5. Wen-bi Rao, Quan Gan “The Performance Analysis of Two Digital Signature Schemes     Based on Secure Charging Protocol”, International Conference on Wireless Communications, Networking and Mobile Computing, vol.-2, pp. 1180 - 1182, Sept. 2005.
  6. Qing Liu, Yunfei Li, Lin Hao and Hua Peng, "Two Efficient Variants of the RSA Cryptosystem", International Conference On Computer Design And Appliations (ICCDA 2010), Volume-5, PP-250-253, 2010.
  7. Yunfei Li, “Design and Implementation of an Improved RSA Algorithm”, International Conference on E-Health Networking, Digital Ecosystems and Technologies, vol.-1, April 2010.
  8. Aiswarya P M, Archana Raj, Dona John, Liya Martin and Sreenu G," Binary RSA Encryption Algorithm", IEEE International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT), PP-178-181, 2016.
  9. Soram Ranbir Singh, Ajoy Kumar Khan and Soram Rakesh Singh, " Performance Evaluation of RSA and Elliptic Curve Cryptography", IEEE International Conference on Contemporary Computing and Informatics (ic3i), PP-302-306, 2016.