SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
Project Summary
Title: Evaluation and performance analysis of RSA
algorithm as security policy
Objective
This work contains following parts of objective:
 Analyze the conventional security policies.
 Evaluate the RSA algorithm as security policy.
 Consider the performance analysis and measurement.
Honorable Supervisor,
Dr. M. Mahbubur Rahman,
Professor,
Department of Information & Communication Engineering,
Islamic University, Kushtia.
Submitted by,
S.M. Nazmus Salehin,
smrubel04ice@gmail.com
Cell: 008801198056349
Abstract
Human beings, most significant and evoluted in universe, are being systematized on
digital cross platform. Already we have developed tools and technologies to
confirm the conversation pathway between conventional or manual system to actual
or automated system. So all of resources in conventional world should have to be
migrated to be on digital module or digital identification (DID). Rather, the security
policy is needed to ensure the authentication, integrity and confidentiality of
information as well as digital resources.
Thus, reliable and complete security consideration is to be dealt and no doubt. But
question here is the expected level of completeness and reliability.
Conventional security protocols must have some form of vulnerabilities that result
in a violation of confidentiality. To minimize such vulnerabilities, here in this thesis
work, we utilize the robustness of RSA (Rivest, Samir and Adleman) algorithm that
is approximately unbreakable.
Firstly we conduct an analysis on conventional security policy of various
communication reference models and existing RSA works. After that we
approximate our proposed RSA security policy and finally we consider the
performance criterion and measurements.
Methodology
There are two key points to be dealt on and focused over this work:
1. We would use Random Padding Scheme (RPS) as outer layer
protection of core RSA policy to make it ever unbreakable.
2. We would minimize the computational complexity of RSA policy
through the use of an Algorithm.
In this thesis work, basically we would optimize following resource pools as stages:
Analysis
Design
Implementation
Validation
To develop this resource, we follow the waterfall (iteration) software development
model as shown in fig ().
In analysis and design, we use three strategies to simulate the activity:
 Structured or functional
 Modular decomposition
 Object Oriented Programming (OOP)
Requirements
Feasibility Study
Analysis
Design
Implementation
Validation
Maintenance
Languages
Here in this project, we use four languages of interest:
C++
C++ is the base language of this project. We first implement here the command
line or DOS interface that is attested with exemplary I/O file. Below we insert some
work shots:
 We performs two basic operations as shown below:
 For example we choose option 1 and input message with RPS length 5.
After that have to input two primes:
 If any problem in input: no doubt , we would try this work be strongly fault
tolerant as shown above.
 Select encryption keys: A list of keys are shown programmatically to facilitate
user .
 Encryption done and shown here cipher stream to be sent over media.
 Decryption process: Possible Decryption is shown.
 Now Decryption is done .
This version of work just released for only research purpose . Our commercial
version now also available with C# interface.
C#
We implement the Graphical User Interface (GUI) through the use of C#.NET for
example in fig (1) and (2).
Mat Lab
Mat lab is used to simulate performance analysis
UML 2.2
Unified Modeling Language (UML) is used to model the project activity.
Tools
We use here RSA (Rivest, Samir, Adlman) algorithm as basic security tool, therefore two
portion in qwork:
 Encryption
 Decryption
Design
RSA encryption algorithm
1. Input message.
2. Encode using integers.
3. Select two primes p and q.
4. Calculate n=p*q, phi=(p-1)*(q-1).
5. Select encryption key e as
 Relatively prime to phi.
 Between ranges 1<e<phi
6. Calculate c = me
(mod n).
Start
Input message M
Encode M
Input p and q
Calculate: n=p*q, phi=(p-1)*(q-1)
Input e
Phi and e
relatively
prime?
Calculate:
c = me
(mod n).
End
RSA decryption algorithm
1. Select decryption key d as
 Range 1<d<phi
 d*e % phi=1.
2. Calculate m = cd
(mod n).
A worked example
Here is an example of RSA encryption and decryption. The parameters used here are artificially
small, but one can also use OpenSSL to generate and examine a real keypair.
1. Choose two distinct prime numbers, such as
p = 61 and q = 53.
Start
Input d
d*e%phi=1?
Calculate:
. m = cd
(mod n).
End
2. Compute n = pq giving
n = 61(53) = 3233.
3. Compute the totient of the product as φ(n) = (p − 1)(q − 1) giving
φ(3233) = (61 − 1)(53 − 1) = 3120.
4. Choose any number 1 < e < 3120 that is coprime to 3120. Choosing a prime number for e
leaves you only to check that e is not a divisor of 3120.
Let e = 17.
5. Compute d, the modular multiplicative inverse of e(mod φ(n)) yielding
d = 2753.
The public key is (n = 3233, e = 17). For a padded plaintext message m, the encryption function
is m17
(mod 3233).
The private key is (n = 3233, d = 2753). For an encrypted ciphertext c, the decryption function
is c2753
(mod 3233).
For instance, in order to encrypt m = 65, we calculate
c = 6517
(mod 3233) = 2790.
To decrypt c = 2790, we calculate
m = 27902753
(mod 3233) = 65.
Both of these calculations can be computed efficiently using the square-and-multiply algorithm
for modular exponentiation. In real life situations the primes selected would be much larger; in
our example it would be relatively trivial to factor n, 3233, obtained from the freely available
public key back to the primes p and q. Given e, also from the public key, we could then
compute d and so acquire the private key.
Flow Diagram
Decrypt
Start
End
Input Message
Encrypt
Encrypt or
Decrypt?
Processing
More?
Finite State Machine (FSM) Diagram
OOP Analysis
In this analysis we have two general classes:
Start
Option
Selection
Decryption
End
Encryption
Example in C++ illustration
class encryption
{
public:
long n, phi;
long p,q,e;
long l, m, cipher[500],ascii[500], ptrn[100];
void input(void);
void encode(void);
void generation(void);
int test(void);
void processor(void);
void display(void); friend void exchangemsg(encryption &,decryption &);
friend void exchangecodeptrn(encryption &,decryption &);
friend void exchangekey(encryption &,decryption &);
};
Attributes:
Methods:
Encryption Class
Attributes:
Methods:
Decryption Class
class decryption
{
public:
long n, phi;
long e,d;
long l, m, ptrn[100], cipher[500];
void generation(void);
void processor(void);
void decode(void);
void display(void);
friend void exchangemsg(encryption &,decryption &);
friend void exchangemsg(encryption &,decryption &);
friend void exchangemsg(encryption &,decryption &);
};
Future Work
In future we would try to design the methodology of security cross platform as
general derivation for world.

Weitere Àhnliche Inhalte

Was ist angesagt?

Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperNithin Cv
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYQualcomm
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa CrptosystemAmlan Patel
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilogijcncs
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storageShivam Singh
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithmKomal Singh
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemIAEME Publication
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystemSamdish Arora
 
Cloud computing and security 03
Cloud computing and security 03Cloud computing and security 03
Cloud computing and security 03Akash Kamble
 
RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2Fahad Layth
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptographySuresh Thammishetty
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsdaxesh chauhan
 
RSA Algorithm report
RSA Algorithm reportRSA Algorithm report
RSA Algorithm reportMohamed Ramadan
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)ArthyR3
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSASrilal Buddika
 
Homomorphic encryption in_cloud
Homomorphic encryption in_cloudHomomorphic encryption in_cloud
Homomorphic encryption in_cloudShivam Singh
 

Was ist angesagt? (20)

Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
F010243136
F010243136F010243136
F010243136
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 
Enhancing security in cloud storage
Enhancing security in cloud storageEnhancing security in cloud storage
Enhancing security in cloud storage
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystem
 
Ijetcas14 336
Ijetcas14 336Ijetcas14 336
Ijetcas14 336
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
Cloud computing and security 03
Cloud computing and security 03Cloud computing and security 03
Cloud computing and security 03
 
RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Rsa and diffie hellman algorithms
Rsa and diffie hellman algorithmsRsa and diffie hellman algorithms
Rsa and diffie hellman algorithms
 
RSA Algorithm report
RSA Algorithm reportRSA Algorithm report
RSA Algorithm report
 
Ch09
Ch09Ch09
Ch09
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
Homomorphic encryption in_cloud
Homomorphic encryption in_cloudHomomorphic encryption in_cloud
Homomorphic encryption in_cloud
 

Andere mochten auch

Walt disney2
Walt disney2Walt disney2
Walt disney2nirmal0302
 
Proposed Role Of Artificial Programmers (APs), perspective digital era
Proposed Role Of Artificial Programmers (APs), perspective digital eraProposed Role Of Artificial Programmers (APs), perspective digital era
Proposed Role Of Artificial Programmers (APs), perspective digital eraSM NAZMUS SALEHIN
 
Poland
PolandPoland
Polandasza72
 
Lava lamp
Lava lampLava lamp
Lava lampasza72
 
Yeast air balloon
Yeast air balloonYeast air balloon
Yeast air balloonasza72
 
開ç™șç”Ÿç”Łæ€§ă€ă‚ąăƒ—ăƒȘă‚±ăƒŒă‚·ăƒ§ăƒłăźäŸĄć€€ć‘äžŠă«ć‘ă‘ăŠă‚€ăƒłăƒ•ăƒ©ă‚žă‚čティックă‚čăŒăŠæ‰‹äŒă„ă•ă›ăŠă„ăŸă ă‘ă‚‹ă“ăš
開ç™șç”Ÿç”Łæ€§ă€ă‚ąăƒ—ăƒȘă‚±ăƒŒă‚·ăƒ§ăƒłăźäŸĄć€€ć‘äžŠă«ć‘ă‘ăŠă‚€ăƒłăƒ•ăƒ©ă‚žă‚čティックă‚čăŒăŠæ‰‹äŒă„ă•ă›ăŠă„ăŸă ă‘ă‚‹ă“ăšé–‹ç™șç”Ÿç”Łæ€§ă€ă‚ąăƒ—ăƒȘă‚±ăƒŒă‚·ăƒ§ăƒłăźäŸĄć€€ć‘äžŠă«ć‘ă‘ăŠă‚€ăƒłăƒ•ăƒ©ă‚žă‚čティックă‚čăŒăŠæ‰‹äŒă„ă•ă›ăŠă„ăŸă ă‘ă‚‹ă“ăš
開ç™șç”Ÿç”Łæ€§ă€ă‚ąăƒ—ăƒȘă‚±ăƒŒă‚·ăƒ§ăƒłăźäŸĄć€€ć‘äžŠă«ć‘ă‘ăŠă‚€ăƒłăƒ•ăƒ©ă‚žă‚čティックă‚čăŒăŠæ‰‹äŒă„ă•ă›ăŠă„ăŸă ă‘ă‚‹ă“ăšă‚€ăƒłăƒ•ăƒ©ă‚žă‚čティックă‚čăƒ»ă‚žăƒŁăƒ‘ăƒłæ ȘćŒäŒšç€Ÿ
 
Red cabbage ph indicator
Red cabbage ph indicatorRed cabbage ph indicator
Red cabbage ph indicatorasza72
 
DiĂĄrio Oficial LOTTONET
DiĂĄrio Oficial LOTTONETDiĂĄrio Oficial LOTTONET
Diårio Oficial LOTTONETRogério Cbrubao
 
Diseño de interfaces WEB
Diseño de interfaces WEBDiseño de interfaces WEB
Diseño de interfaces WEBherneyeduardo
 
Planos catalogo 13 2013
Planos catalogo 13 2013Planos catalogo 13 2013
Planos catalogo 13 2013Nuno Silva
 
Medios de pagos_electronicos
Medios de pagos_electronicosMedios de pagos_electronicos
Medios de pagos_electronicosheidy Argueta
 

Andere mochten auch (20)

Walt disney2
Walt disney2Walt disney2
Walt disney2
 
Proposed Role Of Artificial Programmers (APs), perspective digital era
Proposed Role Of Artificial Programmers (APs), perspective digital eraProposed Role Of Artificial Programmers (APs), perspective digital era
Proposed Role Of Artificial Programmers (APs), perspective digital era
 
Poland
PolandPoland
Poland
 
Lava lamp
Lava lampLava lamp
Lava lamp
 
DevSumi é–ąè„ż 2013 #kansumiC4 ăȘăœăƒ‡ăƒă‚€ă‚č搑けケプăƒȘ開ç™șが ć€±æ•—ă™ă‚‹ăźă‹ïŒŸ
DevSumi é–ąè„ż 2013 #kansumiC4 ăȘăœăƒ‡ăƒă‚€ă‚č搑けケプăƒȘ開ç™șがć€±æ•—ă™ă‚‹ăźă‹ïŒŸDevSumi é–ąè„ż 2013 #kansumiC4 ăȘăœăƒ‡ăƒă‚€ă‚č搑けケプăƒȘ開ç™șがć€±æ•—ă™ă‚‹ăźă‹ïŒŸ
DevSumi é–ąè„ż 2013 #kansumiC4 ăȘăœăƒ‡ăƒă‚€ă‚č搑けケプăƒȘ開ç™șが ć€±æ•—ă™ă‚‹ăźă‹ïŒŸ
 
Yeast air balloon
Yeast air balloonYeast air balloon
Yeast air balloon
 
Osi layers
Osi layersOsi layers
Osi layers
 
ă‚€ăƒłăƒ•ăƒ©ă‚žă‚čティックă‚čèŁœć“ă‚”ăƒ–ă‚čクăƒȘăƒ—ă‚·ăƒ§ăƒłïŒă‚”ăƒăƒŒăƒˆă«ă€ă„ăŠ
ă‚€ăƒłăƒ•ăƒ©ă‚žă‚čティックă‚čèŁœć“ă‚”ăƒ–ă‚čクăƒȘăƒ—ă‚·ăƒ§ăƒłïŒă‚”ăƒăƒŒăƒˆă«ă€ă„ăŠă‚€ăƒłăƒ•ăƒ©ă‚žă‚čティックă‚čèŁœć“ă‚”ăƒ–ă‚čクăƒȘăƒ—ă‚·ăƒ§ăƒłïŒă‚”ăƒăƒŒăƒˆă«ă€ă„ăŠ
ă‚€ăƒłăƒ•ăƒ©ă‚žă‚čティックă‚čèŁœć“ă‚”ăƒ–ă‚čクăƒȘăƒ—ă‚·ăƒ§ăƒłïŒă‚”ăƒăƒŒăƒˆă«ă€ă„ăŠ
 
ăŠćźąæ§˜ăŒæœ›ă‚“ă§ă„ă‚‹ăƒąăƒ€ăƒłăƒ‡ă‚čクトップケプăƒȘăšăŻïŒŸïŒć‚Ÿć‘ăšćŻŸç­– Part1
ăŠćźąæ§˜ăŒæœ›ă‚“ă§ă„ă‚‹ăƒąăƒ€ăƒłăƒ‡ă‚čクトップケプăƒȘăšăŻïŒŸïŒć‚Ÿć‘ăšćŻŸç­– Part1ăŠćźąæ§˜ăŒæœ›ă‚“ă§ă„ă‚‹ăƒąăƒ€ăƒłăƒ‡ă‚čクトップケプăƒȘăšăŻïŒŸïŒć‚Ÿć‘ăšćŻŸç­– Part1
ăŠćźąæ§˜ăŒæœ›ă‚“ă§ă„ă‚‹ăƒąăƒ€ăƒłăƒ‡ă‚čクトップケプăƒȘăšăŻïŒŸïŒć‚Ÿć‘ăšćŻŸç­– Part1
 
ăŠćźąæ§˜ăŒæœ›ă‚“ă§ă„ă‚‹ăƒąăƒ€ăƒłăƒ‡ă‚čクトップケプăƒȘăšăŻïŒŸïŒć‚Ÿć‘ăšćŻŸç­– Part2
ăŠćźąæ§˜ăŒæœ›ă‚“ă§ă„ă‚‹ăƒąăƒ€ăƒłăƒ‡ă‚čクトップケプăƒȘăšăŻïŒŸïŒć‚Ÿć‘ăšćŻŸç­– Part2ăŠćźąæ§˜ăŒæœ›ă‚“ă§ă„ă‚‹ăƒąăƒ€ăƒłăƒ‡ă‚čクトップケプăƒȘăšăŻïŒŸïŒć‚Ÿć‘ăšćŻŸç­– Part2
ăŠćźąæ§˜ăŒæœ›ă‚“ă§ă„ă‚‹ăƒąăƒ€ăƒłăƒ‡ă‚čクトップケプăƒȘăšăŻïŒŸïŒć‚Ÿć‘ăšćŻŸç­– Part2
 
開ç™șç”Ÿç”Łæ€§ă€ă‚ąăƒ—ăƒȘă‚±ăƒŒă‚·ăƒ§ăƒłăźäŸĄć€€ć‘äžŠă«ć‘ă‘ăŠă‚€ăƒłăƒ•ăƒ©ă‚žă‚čティックă‚čăŒăŠæ‰‹äŒă„ă•ă›ăŠă„ăŸă ă‘ă‚‹ă“ăš
開ç™șç”Ÿç”Łæ€§ă€ă‚ąăƒ—ăƒȘă‚±ăƒŒă‚·ăƒ§ăƒłăźäŸĄć€€ć‘äžŠă«ć‘ă‘ăŠă‚€ăƒłăƒ•ăƒ©ă‚žă‚čティックă‚čăŒăŠæ‰‹äŒă„ă•ă›ăŠă„ăŸă ă‘ă‚‹ă“ăšé–‹ç™șç”Ÿç”Łæ€§ă€ă‚ąăƒ—ăƒȘă‚±ăƒŒă‚·ăƒ§ăƒłăźäŸĄć€€ć‘äžŠă«ć‘ă‘ăŠă‚€ăƒłăƒ•ăƒ©ă‚žă‚čティックă‚čăŒăŠæ‰‹äŒă„ă•ă›ăŠă„ăŸă ă‘ă‚‹ă“ăš
開ç™șç”Ÿç”Łæ€§ă€ă‚ąăƒ—ăƒȘă‚±ăƒŒă‚·ăƒ§ăƒłăźäŸĄć€€ć‘äžŠă«ć‘ă‘ăŠă‚€ăƒłăƒ•ăƒ©ă‚žă‚čティックă‚čăŒăŠæ‰‹äŒă„ă•ă›ăŠă„ăŸă ă‘ă‚‹ă“ăš
 
Red cabbage ph indicator
Red cabbage ph indicatorRed cabbage ph indicator
Red cabbage ph indicator
 
ă‚Șăƒłăƒ©ă‚€ăƒł ă‚»ăƒŸăƒŠăƒŒ Infragistics ultimate 2015 vol.1 æœ€æ–°æ©Ÿèƒœăƒă‚€ăƒ©ă‚€ăƒˆ(慬開版)
ă‚Șăƒłăƒ©ă‚€ăƒł ă‚»ăƒŸăƒŠăƒŒ Infragistics ultimate 2015 vol.1 æœ€æ–°æ©Ÿèƒœăƒă‚€ăƒ©ă‚€ăƒˆ(慬開版)ă‚Șăƒłăƒ©ă‚€ăƒł ă‚»ăƒŸăƒŠăƒŒ Infragistics ultimate 2015 vol.1 æœ€æ–°æ©Ÿèƒœăƒă‚€ăƒ©ă‚€ăƒˆ(慬開版)
ă‚Șăƒłăƒ©ă‚€ăƒł ă‚»ăƒŸăƒŠăƒŒ Infragistics ultimate 2015 vol.1 æœ€æ–°æ©Ÿèƒœăƒă‚€ăƒ©ă‚€ăƒˆ(慬開版)
 
ă‚šăƒłă‚żăƒŒăƒ—ăƒ©ă‚€ă‚ș ヱビăƒȘăƒ†ă‚ŁćźŸè·”æŽ»ç”š
ă‚šăƒłă‚żăƒŒăƒ—ăƒ©ă‚€ă‚ș ヱビăƒȘăƒ†ă‚ŁćźŸè·”æŽ»ç”šă‚šăƒłă‚żăƒŒăƒ—ăƒ©ă‚€ă‚ș ヱビăƒȘăƒ†ă‚ŁćźŸè·”æŽ»ç”š
ă‚šăƒłă‚żăƒŒăƒ—ăƒ©ă‚€ă‚ș ヱビăƒȘăƒ†ă‚ŁćźŸè·”æŽ»ç”š
 
Developers Summit 2013【15-B-6】開ç™șè€…ăź "èł‡ç”Łćœąæˆ" に぀ăȘがる Action ずは?
Developers Summit 2013【15-B-6】開ç™șè€…ăź "èł‡ç”Łćœąæˆ" に぀ăȘがる Action ずは?Developers Summit 2013【15-B-6】開ç™șè€…ăź "èł‡ç”Łćœąæˆ" に぀ăȘがる Action ずは?
Developers Summit 2013【15-B-6】開ç™șè€…ăź "èł‡ç”Łćœąæˆ" に぀ăȘがる Action ずは?
 
DiĂĄrio Oficial LOTTONET
DiĂĄrio Oficial LOTTONETDiĂĄrio Oficial LOTTONET
DiĂĄrio Oficial LOTTONET
 
Diseño de interfaces WEB
Diseño de interfaces WEBDiseño de interfaces WEB
Diseño de interfaces WEB
 
Planos catalogo 13 2013
Planos catalogo 13 2013Planos catalogo 13 2013
Planos catalogo 13 2013
 
Instalar magento
Instalar magentoInstalar magento
Instalar magento
 
Medios de pagos_electronicos
Medios de pagos_electronicosMedios de pagos_electronicos
Medios de pagos_electronicos
 

Ähnlich wie An implementation of RSA policy

Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuIJNSA Journal
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGIJNSA Journal
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Mumbai Academisc
 
Performance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithmPerformance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithmeSAT Journals
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Mumbai Academisc
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Mumbai Academisc
 
Cryptography based chat system
Cryptography based chat systemCryptography based chat system
Cryptography based chat systemJagsir Singh
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET Journal
 
CRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfCRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfBhuvanaR13
 
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...CSCJournals
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.pptChandraB15
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidIRJET Journal
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithmSiva Rushi
 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys IJECEIAES
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...ijsrd.com
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches forijcsa
 

Ähnlich wie An implementation of RSA policy (20)

Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)
 
Performance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithmPerformance evaluation of modified modular exponentiation for rsa algorithm
Performance evaluation of modified modular exponentiation for rsa algorithm
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
 
Cryptography based chat system
Cryptography based chat systemCryptography based chat system
Cryptography based chat system
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
 
CRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfCRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdf
 
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 
D017433134
D017433134D017433134
D017433134
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
 
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
 

KĂŒrzlich hochgeladen

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂșjo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

KĂŒrzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

An implementation of RSA policy

  • 1. Project Summary Title: Evaluation and performance analysis of RSA algorithm as security policy Objective This work contains following parts of objective:  Analyze the conventional security policies.  Evaluate the RSA algorithm as security policy.  Consider the performance analysis and measurement. Honorable Supervisor, Dr. M. Mahbubur Rahman, Professor, Department of Information & Communication Engineering, Islamic University, Kushtia. Submitted by, S.M. Nazmus Salehin, smrubel04ice@gmail.com Cell: 008801198056349
  • 2. Abstract Human beings, most significant and evoluted in universe, are being systematized on digital cross platform. Already we have developed tools and technologies to confirm the conversation pathway between conventional or manual system to actual or automated system. So all of resources in conventional world should have to be migrated to be on digital module or digital identification (DID). Rather, the security policy is needed to ensure the authentication, integrity and confidentiality of information as well as digital resources. Thus, reliable and complete security consideration is to be dealt and no doubt. But question here is the expected level of completeness and reliability. Conventional security protocols must have some form of vulnerabilities that result in a violation of confidentiality. To minimize such vulnerabilities, here in this thesis work, we utilize the robustness of RSA (Rivest, Samir and Adleman) algorithm that is approximately unbreakable. Firstly we conduct an analysis on conventional security policy of various communication reference models and existing RSA works. After that we approximate our proposed RSA security policy and finally we consider the performance criterion and measurements.
  • 3. Methodology There are two key points to be dealt on and focused over this work: 1. We would use Random Padding Scheme (RPS) as outer layer protection of core RSA policy to make it ever unbreakable. 2. We would minimize the computational complexity of RSA policy through the use of an Algorithm. In this thesis work, basically we would optimize following resource pools as stages: Analysis Design Implementation Validation
  • 4. To develop this resource, we follow the waterfall (iteration) software development model as shown in fig (). In analysis and design, we use three strategies to simulate the activity:  Structured or functional  Modular decomposition  Object Oriented Programming (OOP) Requirements Feasibility Study Analysis Design Implementation Validation Maintenance
  • 5. Languages Here in this project, we use four languages of interest: C++ C++ is the base language of this project. We first implement here the command line or DOS interface that is attested with exemplary I/O file. Below we insert some work shots:  We performs two basic operations as shown below:  For example we choose option 1 and input message with RPS length 5. After that have to input two primes:
  • 6.  If any problem in input: no doubt , we would try this work be strongly fault tolerant as shown above.  Select encryption keys: A list of keys are shown programmatically to facilitate user .
  • 7.  Encryption done and shown here cipher stream to be sent over media.  Decryption process: Possible Decryption is shown.
  • 8.  Now Decryption is done . This version of work just released for only research purpose . Our commercial version now also available with C# interface. C# We implement the Graphical User Interface (GUI) through the use of C#.NET for example in fig (1) and (2).
  • 9. Mat Lab Mat lab is used to simulate performance analysis UML 2.2 Unified Modeling Language (UML) is used to model the project activity. Tools We use here RSA (Rivest, Samir, Adlman) algorithm as basic security tool, therefore two portion in qwork:  Encryption  Decryption
  • 10. Design RSA encryption algorithm 1. Input message. 2. Encode using integers. 3. Select two primes p and q. 4. Calculate n=p*q, phi=(p-1)*(q-1). 5. Select encryption key e as  Relatively prime to phi.  Between ranges 1<e<phi 6. Calculate c = me (mod n). Start Input message M Encode M Input p and q Calculate: n=p*q, phi=(p-1)*(q-1) Input e Phi and e relatively prime? Calculate: c = me (mod n). End
  • 11. RSA decryption algorithm 1. Select decryption key d as  Range 1<d<phi  d*e % phi=1. 2. Calculate m = cd (mod n). A worked example Here is an example of RSA encryption and decryption. The parameters used here are artificially small, but one can also use OpenSSL to generate and examine a real keypair. 1. Choose two distinct prime numbers, such as p = 61 and q = 53. Start Input d d*e%phi=1? Calculate: . m = cd (mod n). End
  • 12. 2. Compute n = pq giving n = 61(53) = 3233. 3. Compute the totient of the product as φ(n) = (p − 1)(q − 1) giving φ(3233) = (61 − 1)(53 − 1) = 3120. 4. Choose any number 1 < e < 3120 that is coprime to 3120. Choosing a prime number for e leaves you only to check that e is not a divisor of 3120. Let e = 17. 5. Compute d, the modular multiplicative inverse of e(mod φ(n)) yielding d = 2753. The public key is (n = 3233, e = 17). For a padded plaintext message m, the encryption function is m17 (mod 3233). The private key is (n = 3233, d = 2753). For an encrypted ciphertext c, the decryption function is c2753 (mod 3233). For instance, in order to encrypt m = 65, we calculate c = 6517 (mod 3233) = 2790. To decrypt c = 2790, we calculate m = 27902753 (mod 3233) = 65. Both of these calculations can be computed efficiently using the square-and-multiply algorithm for modular exponentiation. In real life situations the primes selected would be much larger; in our example it would be relatively trivial to factor n, 3233, obtained from the freely available public key back to the primes p and q. Given e, also from the public key, we could then compute d and so acquire the private key.
  • 14. Finite State Machine (FSM) Diagram OOP Analysis In this analysis we have two general classes: Start Option Selection Decryption End Encryption
  • 15. Example in C++ illustration class encryption { public: long n, phi; long p,q,e; long l, m, cipher[500],ascii[500], ptrn[100]; void input(void); void encode(void); void generation(void); int test(void); void processor(void); void display(void); friend void exchangemsg(encryption &,decryption &); friend void exchangecodeptrn(encryption &,decryption &); friend void exchangekey(encryption &,decryption &); }; Attributes: Methods: Encryption Class Attributes: Methods: Decryption Class
  • 16. class decryption { public: long n, phi; long e,d; long l, m, ptrn[100], cipher[500]; void generation(void); void processor(void); void decode(void); void display(void); friend void exchangemsg(encryption &,decryption &); friend void exchangemsg(encryption &,decryption &); friend void exchangemsg(encryption &,decryption &); }; Future Work In future we would try to design the methodology of security cross platform as general derivation for world.