SlideShare ist ein Scribd-Unternehmen logo
1 von 12
SMT.BHAGWATI CHATURVEDI               COLLEGE OF ENGG.LokmanyaTilakJankalyanShikshanSanstha PAPER PRESENTATION A  NETWORK  SECURITY  APPROACH :  RSA  ALGORITHM GUIDED BY – PROF. MANOJ    CHAUDARY  SIR Presented  By : TUHIN  DAS  IV SEM C.S.E
CONTENTS ,[object Object]
  Method of   Encryption &  Decryption .
  Introduction to RSA    . 
  Example of  RSA     algorithm .
  Security of RSA.
  RSA currently in use today. 
  Advantages & limitations.   
  Conclusion.
  References  .                                 ,[object Object]
Decryption : The process of turning ciphertext back into the original plaintext.
Encryption algorithm : Algorithm that performs various transformation operation on plaintext.

Weitere ähnliche Inhalte

Was ist angesagt?

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationAlex Punnen
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701Amit Pathak
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSAaritraranjan
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographySeema Goel
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSAAmit Debnath
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptographyVaibhav Khanna
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communicationMohd Arif
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Anas Rock
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network SecurityRamki M
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & CryptographyDr. Himanshu Gupta
 
Network security
Network securityNetwork security
Network securityanoop negi
 

Was ist angesagt? (20)

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 
computer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentationcomputer-security-and-cryptography-a-simple-presentation
computer-security-and-cryptography-a-simple-presentation
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Cryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSACryptographic Algorithms: DES and RSA
Cryptographic Algorithms: DES and RSA
 
cryptography
cryptographycryptography
cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Public key Cryptography & RSA
Public key Cryptography & RSAPublic key Cryptography & RSA
Public key Cryptography & RSA
 
Information and network security 31 public key cryptography
Information and network security 31 public key cryptographyInformation and network security 31 public key cryptography
Information and network security 31 public key cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Encryption
EncryptionEncryption
Encryption
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Network Security & Cryptography
Network Security & CryptographyNetwork Security & Cryptography
Network Security & Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Data encryption
Data encryptionData encryption
Data encryption
 
Network security
Network securityNetwork security
Network security
 
Cryptography
CryptographyCryptography
Cryptography
 

Andere mochten auch

Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security ApplicationsHatem Mahmoud
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
Why Computational/Applied Mathematics?
Why Computational/Applied Mathematics?Why Computational/Applied Mathematics?
Why Computational/Applied Mathematics?Jon Ernstberger
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA EncryptionNathan F. Dunn
 
Stream ciphers
Stream ciphersStream ciphers
Stream ciphersdegarden
 
Slideshare cost of ignoring network security presentation v4
Slideshare   cost of ignoring network security presentation v4Slideshare   cost of ignoring network security presentation v4
Slideshare cost of ignoring network security presentation v4Sergio Loureiro
 
Network Security
Network SecurityNetwork Security
Network SecurityJaya sudha
 
Computer Graphics Introduction
Computer Graphics IntroductionComputer Graphics Introduction
Computer Graphics IntroductionGhaffar Khan
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical HackingSripati Mahapatra
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphicsPartnered Health
 
Network security policies
Network security policiesNetwork security policies
Network security policiesUsman Mukhtar
 
Presentation network security
Presentation network securityPresentation network security
Presentation network securitycegonsoft1999
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmVinayak Raja
 
An Introduction to Kerberos
An Introduction to KerberosAn Introduction to Kerberos
An Introduction to KerberosShumon Huque
 

Andere mochten auch (20)

Rsa Algorithm
Rsa AlgorithmRsa Algorithm
Rsa Algorithm
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Why Computational/Applied Mathematics?
Why Computational/Applied Mathematics?Why Computational/Applied Mathematics?
Why Computational/Applied Mathematics?
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA Encryption
 
Stream ciphers
Stream ciphersStream ciphers
Stream ciphers
 
Slideshare cost of ignoring network security presentation v4
Slideshare   cost of ignoring network security presentation v4Slideshare   cost of ignoring network security presentation v4
Slideshare cost of ignoring network security presentation v4
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network security
Network securityNetwork security
Network security
 
Computer Graphics Introduction
Computer Graphics IntroductionComputer Graphics Introduction
Computer Graphics Introduction
 
Network Security
Network SecurityNetwork Security
Network Security
 
Network Security & Ethical Hacking
Network Security & Ethical HackingNetwork Security & Ethical Hacking
Network Security & Ethical Hacking
 
SSL
SSLSSL
SSL
 
Introduction to computer graphics
Introduction to computer graphicsIntroduction to computer graphics
Introduction to computer graphics
 
Network security policies
Network security policiesNetwork security policies
Network security policies
 
Presentation network security
Presentation network securityPresentation network security
Presentation network security
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
An Introduction to Kerberos
An Introduction to KerberosAn Introduction to Kerberos
An Introduction to Kerberos
 

Ähnlich wie A NETWORK SECURITY APPROACH USING RSA.

State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches forijcsa
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys IJECEIAES
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Ramesh Nagappan
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuIJNSA Journal
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGIJNSA Journal
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsIRJET Journal
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsaMohsin Ali
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithmsijsrd.com
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption StandardAmirul Wiramuda
 

Ähnlich wie A NETWORK SECURITY APPROACH USING RSA. (20)

State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
 
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsa
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
Analysis of Cryptographic Algorithms
Analysis of Cryptographic AlgorithmsAnalysis of Cryptographic Algorithms
Analysis of Cryptographic Algorithms
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
 
Cryptography & Security
Cryptography & SecurityCryptography & Security
Cryptography & Security
 
Nwc rsa
Nwc rsaNwc rsa
Nwc rsa
 

Mehr von Tuhin_Das

Workshop Assembler
Workshop AssemblerWorkshop Assembler
Workshop AssemblerTuhin_Das
 
Operating System
Operating SystemOperating System
Operating SystemTuhin_Das
 
Operating System
Operating SystemOperating System
Operating SystemTuhin_Das
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver PresentationTuhin_Das
 
Presentation
PresentationPresentation
PresentationTuhin_Das
 
Malware Trends Developments
Malware Trends DevelopmentsMalware Trends Developments
Malware Trends DevelopmentsTuhin_Das
 
GPS DOCUMENT
GPS DOCUMENTGPS DOCUMENT
GPS DOCUMENTTuhin_Das
 
Presentation On Gps
Presentation On GpsPresentation On Gps
Presentation On GpsTuhin_Das
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYTuhin_Das
 
Brain Machine Interfacenew
Brain Machine InterfacenewBrain Machine Interfacenew
Brain Machine InterfacenewTuhin_Das
 
Laser & Its Application
Laser & Its ApplicationLaser & Its Application
Laser & Its ApplicationTuhin_Das
 

Mehr von Tuhin_Das (14)

Workshop Assembler
Workshop AssemblerWorkshop Assembler
Workshop Assembler
 
Aop2007
Aop2007Aop2007
Aop2007
 
SQL
SQLSQL
SQL
 
Operating System
Operating SystemOperating System
Operating System
 
Operating System
Operating SystemOperating System
Operating System
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
 
Presentation
PresentationPresentation
Presentation
 
Malware Trends Developments
Malware Trends DevelopmentsMalware Trends Developments
Malware Trends Developments
 
Malware
MalwareMalware
Malware
 
GPS DOCUMENT
GPS DOCUMENTGPS DOCUMENT
GPS DOCUMENT
 
Presentation On Gps
Presentation On GpsPresentation On Gps
Presentation On Gps
 
DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITY
 
Brain Machine Interfacenew
Brain Machine InterfacenewBrain Machine Interfacenew
Brain Machine Interfacenew
 
Laser & Its Application
Laser & Its ApplicationLaser & Its Application
Laser & Its Application
 

A NETWORK SECURITY APPROACH USING RSA.

  • 1. SMT.BHAGWATI CHATURVEDI COLLEGE OF ENGG.LokmanyaTilakJankalyanShikshanSanstha PAPER PRESENTATION A NETWORK SECURITY APPROACH : RSA ALGORITHM GUIDED BY – PROF. MANOJ CHAUDARY SIR Presented By : TUHIN DAS IV SEM C.S.E
  • 2.
  • 3. Method of Encryption & Decryption .
  • 4. Introduction to RSA    . 
  • 5. Example of RSA algorithm .
  • 7. RSA currently in use today. 
  • 8. Advantages & limitations.   
  • 10.
  • 11. Decryption : The process of turning ciphertext back into the original plaintext.
  • 12. Encryption algorithm : Algorithm that performs various transformation operation on plaintext.
  • 13. Decryption algorithm : Accepts the ciphertext ,matching key and produce plaintext.
  • 14. Cryptology : Branch of mathematics which deals with both cryptography and cryptoanalysis.
  • 15.
  • 16.
  • 17. In RSA algorithm plaintext and ciphertext are integers between 0 and n-1 for some n.
  • 18. There are two types of keys public & private keys which is a pair of keys that have been selected so that if one is used for encryption , the other is used for decryption.
  • 19. Both sender and receiver must know the value of n.
  • 20.
  • 21. Calculate n = p*q = 17*11 = 187.
  • 22. Calculate phi (n) = (p-1)*(q-1) = 16 * 10 =160.
  • 23. Select e such that GCD(phi (n) ,e)=1 ; 1
  • 24.
  • 25. SECURITY OF RSA The security of the system depends on two critical assumptions: 1) Factoring is required to break the system, and Factoring is `inherently computationally intractable', or, alternatively, `factoring is hard‘ and `any approach that can be used to break the system is at least as hard as factoring'.
  • 26.
  • 27. It is found in many commercial software products. It is built into current operating systems by Microsoft, Apple and etc.
  • 28. In hardware, RSA can be found in secure telephones, on Ethernet network cards, and on smart cards. In addition, RSA is incorporated into all of the major protocols for secured Internet communication.
  • 29.
  • 30.
  • 31. no reporting arithmetic bits are needed.
  • 32. Programming can be done with a polynomial structure.
  • 33.
  • 34. RSA is one of the standard algorithms that is used in most of the encryptions and decryption tasks.REFERENCES Cryptography And Network Security - By William Stallings.Principles Of Key Management - By W .Fumy And P. Landrock.A Comparative Study Of RSA Encryption And Decryption – By R.E Ting And S.T. Barnum.
  • 35. THANK YOU .....