Study on Securely Digitalizing Crime Records by using RSA Algorithm
Keywords:
RSA, Encrypt, Decrypt, Ciphertext, Crime, CriminlasAbstract
Crime Records are exists in Police Stations. Crime Records are enable to find crimes and their involved criminals. In the existing system they are using a FIR for maintain the crime and criminal details. It contain a less security and easy to perform fraud. The record has been updated manually every time. The main objective of this system is providing security to data, by using the RSA algorithm. It contain the two keys based security. In this, crime and involved criminal details are stored in database in the form of encrypted data. Criminal details such as (name, address, etc,) are stored in the Ciphertext format. So that we can speed up investigation process as soon as possible. Highly impossible to decrypt data who are unauthorized to access crime data. Through the using this system witnesses can easy to access and generate the reports. We can providing a security to witnesses data by using RSA algorithm. If any person performing misleading activities to on crime data they can’t access plain text and difficult to change cipher text to plain text.
References
[1] Anu Sharma 1 ,Mohd. Shahnawaz 2, “ Crime Record Management System”, 3rdInternational Conference on System Modeling & Advancement in Research Trends (SMART) College of Computing Sciences and Information Technology (CCSIT) ,TeerthankerMahaveer University , Moradabad , page 6-9, October 2016.
[2] Richard Adderley, “Police Crime Recording and Investigation System”, Policing An International Journal Of Police Strategies And Management, 24(1):100-114, March 2001.
[3] Ms. Pooja.Bahule, Ms. Nisha Maria Abraham, “E-Police System” , International Journal of Engineering Research & Management Technology, Volume 2, Issue-1, January- 2015.
[4] Sandeep D. Nawale, Ms. Poonam C. Songra, “Online Criminal Record”, Global Journal of Computer Science and Technology, Volume 12, Issue 8, April 2012.
[5] NentaweY .Goshwe ,“Data Encryption and Decryption Using RSA Algorithm in a Network Environment”, International Journal of Computer Science and Network Security, VOL.13 No.7, July 2013.
[6] M. Preetha1 , M. Nithya2 , “A Study And Performance Analysis Of Rsa Algorithm”, International Journal of Computer Science and Mobile Computing , Vol. 2, Issue. 6, June 2013.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
