DESIGN AND IMPLEMENTATION OF DATA SECURITY USING RSA ALGORITHM (A CASE STUDY CYBER SPACE)
in Research Project Paper , Studies & ThesisChoose Your Desired Option(s)
Share Now!
ABSTRACT
Abstract: Cryptographic technique is one of the principal means to protect information security. Not only has it to ensure the information confidential, but also provides digital signature, authentication, secret sub-storage, system security and other functions. Therefore, the encryption and decryption solution can ensure the confidentiality of the information, as well as the integrity of information and certainty, to prevent information from tampering, forgery and counterfeiting. Encryption and decryption algorithm’s security depends on the algorithm while the internal structure of the rigor of mathematics, it also depends on the key confidentiality. Key in the encryption algorithm has a pivotal position, once the key was leaked, it means that anyone can be in the encryption system to encrypt and decrypt information, it means the encryption algorithm is useless. Therefore, what kind of data you choose to be a key, how to distribute the private key, and how to save both data transmission keys are very important issues in the encryption and decryption algorithm. This paper proposed an implementation of a complete RSA encrypt/decrypt solution based on the study of RSA public key algorithm. In addition, the encrypt procedure and code implementation is provided in details
Background of the Study
Historically, cryptography arose as a means to enable parties to maintain privacy of the information they send to each other, even in the presence of an adversary with access to the communication channel. While providing privacy remains a central goal, the field has expanded to encompass many others, including not just other goals of communicating security, such as guaranteeing integrity and authenticity of communications, but many sophisticated and fascinating goals. (BellarM & Rogaway2005).
Cryptography is the science of writing in secret code and is an ancient art; the first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. Some experts argue that cryptography appeared spontaneously sometime after writing was invented, with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In data and telecommunications, cryptography is necessary when communicating over any entrusted medium, which includes just about any network, particularly the Internet.
Cryptography has been used almost since writing was invented. For the larger part of its history, cryptography remained an art, a game of ad hoc design and attacks. Although the field retains some of this flavor, over the last 25 years have brought in something new. The art of cryptography has now been supplemented with a legitimate science. The use of cryptography includes commitment schemes, secure multi-party communication, e-voting, authentication, digital signature and crypto systems.
Modern cryptography is a cornerstone of computer and communication security with the end products that are imminently practical.
It addresses a wide range of problems. But the most basic problem remains the classical one of ensuring security of communication across an insecure medium. (Schneier2000).
Its study touches on branches of mathematics that may have been considered esoteric, and it bring together fields like number theory, computational and complexity theory and probability theory. This study / Project provide a survey of some of the current data encryption Algorithms in use today for prevention of criminal activities in. the Government Institutions, multinational corporations, or private owned companies.
Share Now!
You must log in and be a buyer of this download to submit a review.
Leave a reply Cancel reply