Development of “RSA” Encryption Algorithm for Secure Communication
DOI:
https://doi.org/10.26438/ijcse/v7i6.581585Keywords:
RSA Algorithm, Prime Numbers, Complexisity, Public Key, Private KeyAbstract
In this paper there are modifications in the RSA algorithm by using more than four prime numbers in the combination of public and private key by using this factoring complexity of variables is increased. This is a new technique to provide max security for data over the internet. In this technique we are using more than four prime numbers which is not easily decomposed this technique provides more efficiency and reliability over the network. In this paper we try to increase the level of security by modifying the RSA Encryption Algorithm.
References
[1]. Pratik A. Vanjara, “Analysis and Design of Cryptography Algorithms”, “International Journal of Computer Application & Information Technology”, Vol: 1, Issue: 2, 2012.
[2]. B.Persis Urbana Ivy,Purshotam Mandiwa, Mukesh Kumar, “A Modified RSA Cryptosystem Based on ‘n’ Prime Number”, “International Journal of Engineering and Computer Science”,Vol:1,Issue:2,2012.
[3]. B, Padmavathi, S. Ranjita Kumari, “A Survey on Performance Analysis of DES,AES and RSA Algorithm along with LSB Substitution Technique ”, “International Journal of Science and Research”,Vol:2,Issue:4,2013.
[4]. Nitin jirwan, Ajay Singh,Sandip Vijay,”Review and Analysis of Cryptography Techique”, “International Journal of Scientific & Engineering Research”,Vol:4,Issue:3,2013 .
[5]. Manisha Vishwakarma,”Comparative study of Cryptography Algorithms”, ”International Journal of Advanced Research in Computer Science”,Vol:4,Issue:3,2013.
[6]. Gurpreet Singh,Supriya,”A Study of Encryption Algorithms (RSA,DES,3DES and AES)for Information Security”,“International Journal of Computer Application”, Vol: 67,Issue: 19,2013.
[7]. Rejani. R,Deepu. V. Krishnan, “Study of Symmetric Key Cryptography Algorithms”, “International Journal of ComputerTechniques”, Vol:2, Issue:2, 2015,
[8]. S.Suguna,V. Dhanakoti,R. Manjupriya “A Study on Symmetric And Asymmetric Key Encryption Algorithms ”, “International Research Journal of Engineering and Technology”,Vol:3,Issue:4,2016.
[9]. A. Joseph Amalraj,Dr. J. John Raybin Jose, ”A Survey Paper on Cryptography Techniques”, “International Journal of Computer Science and Mobile Computing”,Vol:5,Issue:8,pp55-59,2016.
[10]. Arpit Agrawal,Gunjan Patanker, “Design Hybrid Cryptography Algorithm for Secure Communication”, “International Research Journal of Engineering and Technology”, Vol:3,Issue:1,2016
[11]. Sarthak R Patel,Khushbu Shah,Gaurav R Patel, ”Study on Improvements in RSA Algorithm”, “International Journal of Engineering Development and Research”,2017.
[12]. Sarita Kumari, “A research paper on Cryptography Encryption and Compression Techniques”,”International Journal of Engineering And Computer Science”,Vol:6,Issue:4,pp: 20915-20919,2017.
[13]. Venkat Prasad .K, S. Magesh, “A Survey on Encryption Using Modern Technique”,“International Journal of Pure and Applied Mathematics”,Vol:117,Issue:16,2017.
[14]. Shivani Sharma,Yash Gupta,”Study on Cryptography and Techniques”,”International Journal of Scientific Research in Computer Science”,Vol:2,Issue:1,2017.
[15]. Faiqa Maqsood,Muhammad Ahmed, Muhammad Mumtaz Ali,Munam Ali Shah, “Cryptography: A Comparative Analysis for Modern Techniques”,“International Journal of Advanced Computer Science and Application”, Vol: 8, Issue: 6, 2017.
[16]. Omar G. Abood,Shawkat K.Guirguis, ” A Survey on Cryptography Algorithms ”, ” International Journal of Science and Research Publications ”, Vol:8,Issue:7,2018.
[17]. Swapnil Chaudhari,Mangesh Pahade ,Sahil Bhat,Chetan Jadhav,Tejaswini Sawant, ”A Research Paper on New Hybrid Cryptography Algorithm ”, “International Journal for Research & Development in Technology ”,Vol:9,Issue:5,2018.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
