SlideShare a Scribd company logo
1 of 37
Md. Ariful Hoque 
Roll No: MSc 140202 
Discipline : CSE 
Khulna University
Data communication. 
Vital role of Cryptography. 
Phone communication. 
E-commerce. 
Pay-TV. 
Transmitting financial information. 
Video Conferencing. 
2
Cryptosystem. 
Encryption 
Decryption 
Symmetric cryptosystem. 
RSA cryptographic algorithm. 
Uses a pair of related keys - 
Private key 
Public key 
3
Record 500 Bangla speech words. 
Extract data. 
Stored in a text file as integer data. 
Encrypt and decrypt. 
4
Speech 
Word 
5 
Recording of Bangla speech words. 
Recorded as wav file. 
Sampling rate 8.00 KHz. 
Coded in 8 bits PCM.
Speech 
Word 
Preprocessing 
and 
Data 
Extraction 
6 
Discard 58 bytes from beginning. 
Extract require voiced data. 
Contain silence, unvoiced and voice. 
Stored in a text file.
Speech 
Word 
Preprocessing 
and 
Data 
Extraction 
Public 
key 
{e, n} 
7
Speech 
Word 
Preprocessing 
and 
Data 
Extraction 
Encryption 
Process 
8 
Public 
key 
{e, n}
Speech 
Word 
Preprocessing 
and 
Data 
Extraction 
Encryption 
Process 
Private 
key 
{d, n} 
Public 
key 
{e, n} 
9
Speech 
Word 
Preprocessing 
and 
Data 
Extraction 
Encryption 
Process 
Decryption 
Process 
Public 
key 
{e, n} 
10 
Private 
key 
{d, n}
Speech 
Word 
Preprocessing 
and 
Data 
Extraction 
Encryption 
Process 
Decryption 
Process 
Original 
Speech 
Word 
Private 
key 
{d, n} 
Public 
key 
{e, n} 
11
12
13 
Random 
Number 
Generator
14 
Random 
Number 
Generator 
Rand FIFO
15 
Random 
Number 
Generator 
Rand FIFO 
Primality 
Tester
16 
Random 
Number 
Generator 
Rand FIFO 
Primality 
Tester 
Prime FIFO
17 
Random 
Number 
Generator 
Rand FIFO 
Primality 
Tester 
Prime FIFO 
N=p*q 
∅(n)=(p-1)(q-1)
18 
Random 
Number 
Generator 
Rand FIFO 
Primality 
Tester 
Prime FIFO 
N=p*q 
∅(n)=(p-1)(q-1) 
n
19 
Random 
Number 
Generator 
Rand FIFO 
Primality 
Tester 
Prime FIFO 
N=p*q 
∅(n)=(p-1)(q-1) 
gcd(e, ∅(n))=1 
1<e< ∅(n) 
n
20 
Random 
Number 
Generator 
Rand FIFO 
Primality 
Tester 
Prime FIFO 
N=p*q 
∅(n)=(p-1)(q-1) 
gcd(e, ∅(n))=1 
1<e< ∅(n) 
e n
21 
Random 
Number 
Generator 
Rand FIFO 
Primality 
Tester 
Prime FIFO 
N=p*q 
∅(n)=(p-1)(q-1) 
gcd(e, ∅(n))=1 
1<e< ∅(n) 
e.d =1mod ∅(n 
0 ≤d ≤n 
e n
22 
Random 
Number 
Generator 
Rand FIFO 
Primality 
Tester 
Prime FIFO 
N=p*q 
∅(n)=(p-1)(q-1) 
gcd(e, ∅(n))=1 
1<e< ∅(n) 
e.d =1mod ∅(n 
0 ≤d ≤n 
d e n
23 
 Public key e n
24 
e n 
d 
n 
 Public key 
 Private key
25 
M
26 
M 
e 
n
27 
M 
e 
n 
Modular Exponentiation 
Me mod n
28 
M 
e 
n 
Modular Exponentiation C 
Me mod n
29 
C
30 
C 
d 
n
31 
C 
d 
n 
Modular Exponentiation 
Cd mod n
32 
C 
d 
n 
Modular Exponentiation M 
Cd mod n
33 
Input: A, B, n 
Output: E = AB mod n 
LR binary method 
E <= 1; 
for i = k-1 to 0 
If Bi =1 
E <= A*E mod n 
end if 
if i ≠ 0 
E <= E*E mod n; 
end if 
end for 
return E;
34
Objective. 
500 speech words recorded. 
Saved as .wav format. 
Extracted integer data. 
Taken txt file as input. 
Produce unreadable message. 
35
RSA algorithm used to encrypt and decrypt. 
M lies in the range . 
Encrypt 500 word at a time. 
Limitations. 
36
Thanks To All 
37

More Related Content

What's hot (20)

Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
RSA Algorithm report
RSA Algorithm reportRSA Algorithm report
RSA Algorithm report
 
Public Key Algorithms
Public Key AlgorithmsPublic Key Algorithms
Public Key Algorithms
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2
 
Rsa
RsaRsa
Rsa
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
rsa-1
rsa-1rsa-1
rsa-1
 
Rsa
RsaRsa
Rsa
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
 
Information and Network Security
Information and Network SecurityInformation and Network Security
Information and Network Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 

Viewers also liked

Introduction to Django REST Framework, an easy way to build REST framework in...
Introduction to Django REST Framework, an easy way to build REST framework in...Introduction to Django REST Framework, an easy way to build REST framework in...
Introduction to Django REST Framework, an easy way to build REST framework in...Zhe Li
 
Real time web_apps_pycon2012-v1
Real time web_apps_pycon2012-v1Real time web_apps_pycon2012-v1
Real time web_apps_pycon2012-v1Avinash Prasad
 
DJANGO-REST-FRAMEWORK: AWESOME WEB-BROWSABLE WEB APIS
DJANGO-REST-FRAMEWORK: AWESOME WEB-BROWSABLE WEB APISDJANGO-REST-FRAMEWORK: AWESOME WEB-BROWSABLE WEB APIS
DJANGO-REST-FRAMEWORK: AWESOME WEB-BROWSABLE WEB APISFernando Rocha
 
PyConMY 2016 Django Channels
PyConMY 2016 Django ChannelsPyConMY 2016 Django Channels
PyConMY 2016 Django ChannelsKok Hoor Chew
 
Django Introduction & Tutorial
Django Introduction & TutorialDjango Introduction & Tutorial
Django Introduction & Tutorial之宇 趙
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA AlgorithmRitu Agarwal
 
The State of WebSockets in Django
The State of WebSockets in DjangoThe State of WebSockets in Django
The State of WebSockets in DjangoRami Sayar
 
Django REST Framework
Django REST FrameworkDjango REST Framework
Django REST FrameworkLoad Impact
 
Async Tasks with Django Channels
Async Tasks with Django ChannelsAsync Tasks with Django Channels
Async Tasks with Django ChannelsAlbert O'Connor
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
Django channels
Django channelsDjango channels
Django channelsAndy Dai
 
Python RESTful webservices with Python: Flask and Django solutions
Python RESTful webservices with Python: Flask and Django solutionsPython RESTful webservices with Python: Flask and Django solutions
Python RESTful webservices with Python: Flask and Django solutionsSolution4Future
 
Introduction to Genetic Algorithms
Introduction to Genetic AlgorithmsIntroduction to Genetic Algorithms
Introduction to Genetic AlgorithmsAhmed Othman
 
Djangocon 2014 - Django REST Framework - So Easy You Can Learn it in 25 Minutes
Djangocon 2014 - Django REST Framework - So Easy You Can Learn it in 25 MinutesDjangocon 2014 - Django REST Framework - So Easy You Can Learn it in 25 Minutes
Djangocon 2014 - Django REST Framework - So Easy You Can Learn it in 25 MinutesNina Zakharenko
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets LayerNascenia IT
 
Genetic Algorithm by Example
Genetic Algorithm by ExampleGenetic Algorithm by Example
Genetic Algorithm by ExampleNobal Niraula
 

Viewers also liked (20)

Introduction to Django REST Framework, an easy way to build REST framework in...
Introduction to Django REST Framework, an easy way to build REST framework in...Introduction to Django REST Framework, an easy way to build REST framework in...
Introduction to Django REST Framework, an easy way to build REST framework in...
 
Rsa Algorithm
Rsa AlgorithmRsa Algorithm
Rsa Algorithm
 
Real time web_apps_pycon2012-v1
Real time web_apps_pycon2012-v1Real time web_apps_pycon2012-v1
Real time web_apps_pycon2012-v1
 
DJANGO-REST-FRAMEWORK: AWESOME WEB-BROWSABLE WEB APIS
DJANGO-REST-FRAMEWORK: AWESOME WEB-BROWSABLE WEB APISDJANGO-REST-FRAMEWORK: AWESOME WEB-BROWSABLE WEB APIS
DJANGO-REST-FRAMEWORK: AWESOME WEB-BROWSABLE WEB APIS
 
PyConMY 2016 Django Channels
PyConMY 2016 Django ChannelsPyConMY 2016 Django Channels
PyConMY 2016 Django Channels
 
Django Introduction & Tutorial
Django Introduction & TutorialDjango Introduction & Tutorial
Django Introduction & Tutorial
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
The State of WebSockets in Django
The State of WebSockets in DjangoThe State of WebSockets in Django
The State of WebSockets in Django
 
Django Celery
Django Celery Django Celery
Django Celery
 
Django REST Framework
Django REST FrameworkDjango REST Framework
Django REST Framework
 
Async Tasks with Django Channels
Async Tasks with Django ChannelsAsync Tasks with Django Channels
Async Tasks with Django Channels
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Django channels
Django channelsDjango channels
Django channels
 
Python RESTful webservices with Python: Flask and Django solutions
Python RESTful webservices with Python: Flask and Django solutionsPython RESTful webservices with Python: Flask and Django solutions
Python RESTful webservices with Python: Flask and Django solutions
 
Introduction to Genetic Algorithms
Introduction to Genetic AlgorithmsIntroduction to Genetic Algorithms
Introduction to Genetic Algorithms
 
Djangocon 2014 - Django REST Framework - So Easy You Can Learn it in 25 Minutes
Djangocon 2014 - Django REST Framework - So Easy You Can Learn it in 25 MinutesDjangocon 2014 - Django REST Framework - So Easy You Can Learn it in 25 Minutes
Djangocon 2014 - Django REST Framework - So Easy You Can Learn it in 25 Minutes
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
Genetic Algorithm by Example
Genetic Algorithm by ExampleGenetic Algorithm by Example
Genetic Algorithm by Example
 

Similar to Implementation of RSA Algorithm for Speech Data Encryption and Decryption

The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA EncryptionNathan F. Dunn
 
Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...FahmiOlayah
 
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...CSCJournals
 
Big Data Day LA 2016/ Hadoop/ Spark/ Kafka track - Data Provenance Support in...
Big Data Day LA 2016/ Hadoop/ Spark/ Kafka track - Data Provenance Support in...Big Data Day LA 2016/ Hadoop/ Spark/ Kafka track - Data Provenance Support in...
Big Data Day LA 2016/ Hadoop/ Spark/ Kafka track - Data Provenance Support in...Data Con LA
 
Surrey dl-4
Surrey dl-4Surrey dl-4
Surrey dl-4ozzie73
 
RSA Algorithm.ppt
RSA Algorithm.pptRSA Algorithm.ppt
RSA Algorithm.pptArchanaT30
 
Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate providerKishankant Yadav
 
Asymmetric Encryption with RSA
Asymmetric Encryption with RSAAsymmetric Encryption with RSA
Asymmetric Encryption with RSAAaftabKhan14
 
cp467_12_lecture14_image compression1.pdf
cp467_12_lecture14_image compression1.pdfcp467_12_lecture14_image compression1.pdf
cp467_12_lecture14_image compression1.pdfshaikmoosa2003
 
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docxHW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docxwellesleyterresa
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithmSiva Rushi
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA EncryptionNathan F. Dunn
 
Fourier project presentation
Fourier project  presentationFourier project  presentation
Fourier project presentation志璿 楊
 

Similar to Implementation of RSA Algorithm for Speech Data Encryption and Decryption (20)

PKC&RSA
PKC&RSAPKC&RSA
PKC&RSA
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA Encryption
 
Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...
 
EEG, MEG and FieldTrip
EEG, MEG and FieldTripEEG, MEG and FieldTrip
EEG, MEG and FieldTrip
 
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
 
Ntewrok secuirty cs7
Ntewrok secuirty cs7Ntewrok secuirty cs7
Ntewrok secuirty cs7
 
Big Data Day LA 2016/ Hadoop/ Spark/ Kafka track - Data Provenance Support in...
Big Data Day LA 2016/ Hadoop/ Spark/ Kafka track - Data Provenance Support in...Big Data Day LA 2016/ Hadoop/ Spark/ Kafka track - Data Provenance Support in...
Big Data Day LA 2016/ Hadoop/ Spark/ Kafka track - Data Provenance Support in...
 
Rsa algorithm
Rsa algorithmRsa algorithm
Rsa algorithm
 
Surrey dl-4
Surrey dl-4Surrey dl-4
Surrey dl-4
 
rsa-1
rsa-1rsa-1
rsa-1
 
rsa-1
rsa-1rsa-1
rsa-1
 
RSA Algorithm.ppt
RSA Algorithm.pptRSA Algorithm.ppt
RSA Algorithm.ppt
 
3320 cyclic codes.ppt
3320 cyclic codes.ppt3320 cyclic codes.ppt
3320 cyclic codes.ppt
 
Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate provider
 
Asymmetric Encryption with RSA
Asymmetric Encryption with RSAAsymmetric Encryption with RSA
Asymmetric Encryption with RSA
 
cp467_12_lecture14_image compression1.pdf
cp467_12_lecture14_image compression1.pdfcp467_12_lecture14_image compression1.pdf
cp467_12_lecture14_image compression1.pdf
 
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docxHW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA Encryption
 
Fourier project presentation
Fourier project  presentationFourier project  presentation
Fourier project presentation
 

More from Md. Ariful Hoque

More from Md. Ariful Hoque (8)

Automated Payment Gateway for small shops
Automated Payment Gateway for small shopsAutomated Payment Gateway for small shops
Automated Payment Gateway for small shops
 
µIP (micro IP)
µIP (micro IP)µIP (micro IP)
µIP (micro IP)
 
Poz Software
Poz SoftwarePoz Software
Poz Software
 
Show me
Show meShow me
Show me
 
Decision Tree Learning
Decision Tree LearningDecision Tree Learning
Decision Tree Learning
 
EIMS software for schools
EIMS software for schoolsEIMS software for schools
EIMS software for schools
 
Cost effective arena active protection system
Cost effective arena active protection systemCost effective arena active protection system
Cost effective arena active protection system
 
Amazon ec2cluster
Amazon ec2clusterAmazon ec2cluster
Amazon ec2cluster
 

Recently uploaded

Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPirithiRaju
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.Nitya salvi
 
DIFFERENCE IN BACK CROSS AND TEST CROSS
DIFFERENCE IN  BACK CROSS AND TEST CROSSDIFFERENCE IN  BACK CROSS AND TEST CROSS
DIFFERENCE IN BACK CROSS AND TEST CROSSLeenakshiTyagi
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsAArockiyaNisha
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxAArockiyaNisha
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisDiwakar Mishra
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxgindu3009
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoSérgio Sacani
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksSérgio Sacani
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfSumit Kumar yadav
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000Sapana Sha
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINsankalpkumarsahoo174
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsSumit Kumar yadav
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSérgio Sacani
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsSérgio Sacani
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)Areesha Ahmad
 

Recently uploaded (20)

Pests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdfPests of cotton_Sucking_Pests_Dr.UPR.pdf
Pests of cotton_Sucking_Pests_Dr.UPR.pdf
 
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
❤Jammu Kashmir Call Girls 8617697112 Personal Whatsapp Number 💦✅.
 
DIFFERENCE IN BACK CROSS AND TEST CROSS
DIFFERENCE IN  BACK CROSS AND TEST CROSSDIFFERENCE IN  BACK CROSS AND TEST CROSS
DIFFERENCE IN BACK CROSS AND TEST CROSS
 
Natural Polymer Based Nanomaterials
Natural Polymer Based NanomaterialsNatural Polymer Based Nanomaterials
Natural Polymer Based Nanomaterials
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptxPhysiochemical properties of nanomaterials and its nanotoxicity.pptx
Physiochemical properties of nanomaterials and its nanotoxicity.pptx
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
Isotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on IoIsotopic evidence of long-lived volcanism on Io
Isotopic evidence of long-lived volcanism on Io
 
CELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdfCELL -Structural and Functional unit of life.pdf
CELL -Structural and Functional unit of life.pdf
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdf
 
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 60009654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
9654467111 Call Girls In Raj Nagar Delhi Short 1500 Night 6000
 
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATINChromatin Structure | EUCHROMATIN | HETEROCHROMATIN
Chromatin Structure | EUCHROMATIN | HETEROCHROMATIN
 
Botany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questionsBotany krishna series 2nd semester Only Mcq type questions
Botany krishna series 2nd semester Only Mcq type questions
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroidsHubble Asteroid Hunter III. Physical properties of newly found asteroids
Hubble Asteroid Hunter III. Physical properties of newly found asteroids
 
GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)GBSN - Microbiology (Unit 1)
GBSN - Microbiology (Unit 1)
 

Implementation of RSA Algorithm for Speech Data Encryption and Decryption

  • 1. Md. Ariful Hoque Roll No: MSc 140202 Discipline : CSE Khulna University
  • 2. Data communication. Vital role of Cryptography. Phone communication. E-commerce. Pay-TV. Transmitting financial information. Video Conferencing. 2
  • 3. Cryptosystem. Encryption Decryption Symmetric cryptosystem. RSA cryptographic algorithm. Uses a pair of related keys - Private key Public key 3
  • 4. Record 500 Bangla speech words. Extract data. Stored in a text file as integer data. Encrypt and decrypt. 4
  • 5. Speech Word 5 Recording of Bangla speech words. Recorded as wav file. Sampling rate 8.00 KHz. Coded in 8 bits PCM.
  • 6. Speech Word Preprocessing and Data Extraction 6 Discard 58 bytes from beginning. Extract require voiced data. Contain silence, unvoiced and voice. Stored in a text file.
  • 7. Speech Word Preprocessing and Data Extraction Public key {e, n} 7
  • 8. Speech Word Preprocessing and Data Extraction Encryption Process 8 Public key {e, n}
  • 9. Speech Word Preprocessing and Data Extraction Encryption Process Private key {d, n} Public key {e, n} 9
  • 10. Speech Word Preprocessing and Data Extraction Encryption Process Decryption Process Public key {e, n} 10 Private key {d, n}
  • 11. Speech Word Preprocessing and Data Extraction Encryption Process Decryption Process Original Speech Word Private key {d, n} Public key {e, n} 11
  • 12. 12
  • 13. 13 Random Number Generator
  • 14. 14 Random Number Generator Rand FIFO
  • 15. 15 Random Number Generator Rand FIFO Primality Tester
  • 16. 16 Random Number Generator Rand FIFO Primality Tester Prime FIFO
  • 17. 17 Random Number Generator Rand FIFO Primality Tester Prime FIFO N=p*q ∅(n)=(p-1)(q-1)
  • 18. 18 Random Number Generator Rand FIFO Primality Tester Prime FIFO N=p*q ∅(n)=(p-1)(q-1) n
  • 19. 19 Random Number Generator Rand FIFO Primality Tester Prime FIFO N=p*q ∅(n)=(p-1)(q-1) gcd(e, ∅(n))=1 1<e< ∅(n) n
  • 20. 20 Random Number Generator Rand FIFO Primality Tester Prime FIFO N=p*q ∅(n)=(p-1)(q-1) gcd(e, ∅(n))=1 1<e< ∅(n) e n
  • 21. 21 Random Number Generator Rand FIFO Primality Tester Prime FIFO N=p*q ∅(n)=(p-1)(q-1) gcd(e, ∅(n))=1 1<e< ∅(n) e.d =1mod ∅(n 0 ≤d ≤n e n
  • 22. 22 Random Number Generator Rand FIFO Primality Tester Prime FIFO N=p*q ∅(n)=(p-1)(q-1) gcd(e, ∅(n))=1 1<e< ∅(n) e.d =1mod ∅(n 0 ≤d ≤n d e n
  • 23. 23  Public key e n
  • 24. 24 e n d n  Public key  Private key
  • 25. 25 M
  • 26. 26 M e n
  • 27. 27 M e n Modular Exponentiation Me mod n
  • 28. 28 M e n Modular Exponentiation C Me mod n
  • 29. 29 C
  • 30. 30 C d n
  • 31. 31 C d n Modular Exponentiation Cd mod n
  • 32. 32 C d n Modular Exponentiation M Cd mod n
  • 33. 33 Input: A, B, n Output: E = AB mod n LR binary method E <= 1; for i = k-1 to 0 If Bi =1 E <= A*E mod n end if if i ≠ 0 E <= E*E mod n; end if end for return E;
  • 34. 34
  • 35. Objective. 500 speech words recorded. Saved as .wav format. Extracted integer data. Taken txt file as input. Produce unreadable message. 35
  • 36. RSA algorithm used to encrypt and decrypt. M lies in the range . Encrypt 500 word at a time. Limitations. 36