Fast Implementation of the Rivest-Shamir-Adleman (RSA) Algorithm with Robust Packet Data Loss Detection Function
DOI:
https://doi.org/10.51983/ajeat-2021.10.2.3058Keywords:
Cryptography, Encryption, Decryption, Packet Loss, Public Key, Private Key, ModulusAbstract
Encryption is the process of protecting information from unauthorized parties by converting such information into an unreadable form. Packet data is a method of transferring data, broken into bits called packets which travels over a network. Packet losses occur when packets fail to reach their destination devices as a result of network congestion, faulty routers or as a result of an attack. Encryption is the standard method for making a communication private. In sending a private message to another user, it is first encrypted (termed encipher), the intended recipient alone knows how to correctly decrypt (decipher) the message. There are several algorithms developed for the purpose of encryption which provides data security and integrity. This paper proposes the use of the Rivest-Shamir-Adleman (RSA) algorithm to implement a system for encrypting text files of any length (by breaking long messages into valid blocks and encrypting each block) capable of being transmitted using a Simple Mail Transfer Protocol (SMTP). Probable primes, 3048 bits in length are generated to be used in the generation of public, private key pairs for encryption and decryption. The proposed scheme is better because the route taken during transmission of data is recorded and packet losses are also checked for during transmission of encrypted files as compared to known state-of-the-art schemes.
References
RSA algorithm. November 2014. [Online]. Available: http://searchsecurity.target.com/definition/RSA
M. Thangavel, P. Varalakshmi, P. M. Murrali, and K. Nithya, "An Enhanced and Secured RSA Key Generation Scheme (ESRKGS)," Journal of Information Security and Applications, vol. 20, pp. 3-10, February 2015.
Y. Li, Q. Liu, and T. Li, "Design and Implementation of an Improved RSA Algorithm," in International Conference on E-Health Networking Digital Ecosystems and Technologies, 2010.
C. Sinjan, K. Vincent, "A Study and Implementation of RSA Cryptosystem," arXiv:1506.04265[cs: CR], 13 June 2015.
M. A. Islam, Md. A. Islam, N. Islam, and B. Shabnam, "A Modified and Secured RSA Public Key Cryptosystem Based On 'N' Prime Numbers," Journal of Computer and Communication, vol. 6, pp. 78-90, 2018. [Online]. Available: http://doi.org/10.4236/jcc. 2018.63006.
R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems," Communication of the Association for Computing Machinery, pp. 120-126, 1978.
B. Persis, U. Ivy and P. Mandiwa, "A Modified RSA Cryptosystem Based on 'n' Prime Numbers," International Journal of Engineering and Computer Science, vol. 1, no. 2, pp. 63-66, November 2012.
Packet loss, 6th July 2018, In Wikipedia. [Online]. Available: https://en.wikipedia.org/wiki/packet_loss.
H. Mike, "4 Causes of Packet Loss and How to Fix Them," April 28, 2015. [Online]. Available: https://www.annese.com/blog/what-causes-packet-loss.
P. Boyana, "What Is a Ping Test?," 18th April 2013. [Online]. Available: https://www.websitepulse.com/blog/what-is-ping-test.
A. B. Alhassan, K. A. Gbolade, and E. K. Bankas, "A Novel and Efficient LZN-RNS Scheme for Enhanced Information Compression and Security," International Journal of Advanced Research in Computer Engineering and Technology (IJARCET), vol. 4, no. 11, pp. 1450-4019, 2015.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2021 The Research Publication
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.