DESIGN AND IMPLEMENTATION OF DATA SECURITY USING RSA ALGORITHM (A CASE STUDY CYBER SPACE)

in ,

Choose Your Desired Option(s)

0 Sale

Share Now!

ABSTRACT
Abstract: Cryptographic technique is one of the principal means to protect information security. Not only has it to ensure the information confidential, but also provides digital signature, authentication, secret sub-storage, system security and other functions. Therefore, the encryption and decryption solution can ensure the confidentiality of the information, as well as the integrity of information and certainty, to prevent information from tampering, forgery and counterfeiting. Encryption and decryption algorithm’s security depends on the algorithm while the internal structure of the rigor of mathematics, it also depends on the key confidentiality. Key in the encryption algorithm has a pivotal position, once the key was leaked, it means that anyone can be in the encryption system to encrypt and decrypt information, it means the encryption algorithm is useless. Therefore, what kind of data you choose to be a key, how to distribute the private key, and how to save both data transmission keys are very important issues in the encryption and decryption algorithm. This paper proposed an implementation of a complete RSA encrypt/decrypt solution based on the study of RSA public key algorithm. In addition, the encrypt procedure and code implementation is provided in details

Background of the Study
Historically, cryptography arose as a means to enable parties to maintain privacy of the information they send to each other, even in the presence of an adversary with access to the communication channel. While providing privacy remains a central goal, the field has expanded to encompass many others, including not just other goals of communicating security, such as guaranteeing integrity and authenticity of communications, but many sophisticated and fascinating goals. (BellarM & Rogaway2005).

Cryptography is the science of writing in secret code and is an ancient art; the first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription. Some experts argue that cryptography appeared spontaneously sometime after writing was invented, with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In data and telecommunications, cryptography is necessary when communicating over any entrusted medium, which includes just about any network, particularly the Internet.

Cryptography has been used almost since writing was invented. For the larger part of its history, cryptography remained an art, a game of ad hoc design and attacks. Although the field retains some of this flavor, over the last 25 years have brought in something new. The art of cryptography has now been supplemented with a legitimate science. The use of cryptography includes commitment schemes, secure multi-party communication, e-voting, authentication, digital signature and crypto systems.

Modern cryptography is a cornerstone of computer and communication security with the end products that are imminently practical.
It addresses a wide range of problems. But the most basic problem remains the classical one of ensuring security of communication across an insecure medium. (Schneier2000).
Its study touches on branches of mathematics that may have been considered esoteric, and it bring together fields like number theory, computational and complexity theory and probability theory. This study / Project provide a survey of some of the current data encryption Algorithms in use today for prevention of criminal activities in. the Government Institutions, multinational corporations, or private owned companies.

0 Sale

Share Now!

Document Information

You must log in and be a buyer of this download to submit a review.

Related Products

IMPACT OF ABANDONED ROAD CONSTRUCTION ON THE ENVIRONMENT (A CASE STUDY OF AWKA SOUTH L.G.A.)

1.1 Background of the Study The well-being of any nation lies on its functional and a readily available infra-structure. Infrastructural…

$10.00
Pages: 41 Language: English

1.1 Background of the Study The well-being of any nation lies on its functional and a readily available infra-structure. Infrastructural…

Pages: 41 Language: English

ENVIRONMENTAL POLLUTION THE NEED FOR AWARENESS CREATION IN ONITSHA, ANAMBRA STATE

Introduction The accumulation of waste can rightly be said to be a four-runner of present day environmental problems. The revolution…

$10.00
Pages: 57 Language: English

Introduction The accumulation of waste can rightly be said to be a four-runner of present day environmental problems. The revolution…

Pages: 57 Language: English

AN INVESTIGATION OF COMPENSATION FOR ENVIRONMENTAL DEGRADATION IN NJOKOKA L.G.A, ANAMBRA STATE

Background of the Study According to Ogboru, (2006), history and science both seemed to agree that before the advent of…

$10.00
Pages: 80 Language: English

Background of the Study According to Ogboru, (2006), history and science both seemed to agree that before the advent of…

Pages: 80 Language: English

CAUSES OF FLOOD IN OGBARU LGA OF ANAMBRA STATE

Background of the study Floods are major disasters affecting Ogbaru L.G.A of Anambra state, Nigeria and the world annually especially…

$10.00
Pages: 53 Language: English

Background of the study Floods are major disasters affecting Ogbaru L.G.A of Anambra state, Nigeria and the world annually especially…

Pages: 53 Language: English

Popular & Trending

ANALYSIS OF CASH DEPOSIT PATTERN IN COMMERCIAL BANKS : A CASE STUDY OF FIDELITY BANK PLC, AUCHI

INTRODUCTION A bank is a financial institution that accepts deposits from the public and creates credit (Western Cengage, 2009). Lending…

$7.00
Pages: 67 Language: English Co-Author: teset

INTRODUCTION A bank is a financial institution that accepts deposits from the public and creates credit (Western Cengage, 2009). Lending…

Pages: 67 Language: English Co-Author: teset

THE EFFECT OF ADOPTION OF INTERNATIONAL PUBLIC SECTOR ACCOUNTING STANDARDS (IPSAS) ON FINANCIAL REPORTING IN THE PUBLIC SECTOR IN NIGERIA

1.1 Background of the Study Over the last few decades, the public demand for radical improvement of public sector management…

$10.00
Pages: 82 Language: English

1.1 Background of the Study Over the last few decades, the public demand for radical improvement of public sector management…

Pages: 82 Language: English

EFFECTIVE OF HUMAN RESOURCE ACCOUNTING ON FINANCIAL PERFORMANCE OF QUOTED MONEY DEPOSIT BANK IN NIGERIA

CHAPTER ONE INTRODUCTION 1.1   Background of the Study The growing importance of human resources accounting is a determinant of economic…

$10.00
Pages: 43 Language: English

CHAPTER ONE INTRODUCTION 1.1   Background of the Study The growing importance of human resources accounting is a determinant of economic…

Pages: 43 Language: English

THE EFFECT OF COMPUTERIZED ACCOUNTING SYSTEM ON THE PERFORMANCE OF SELECTED MONEY DEPOSIT BANKS IN NIGERIA

CHAPTER ONE INTRODUCTION Background of the Study Financial accounting can be defined as the process of collecting, recording, presently and…

$10.00
Pages: 80 Language: English

CHAPTER ONE INTRODUCTION Background of the Study Financial accounting can be defined as the process of collecting, recording, presently and…

Pages: 80 Language: English

Add New Institution