Analysis of Encryption Algorithms (RSA, SRNN and 2 Key Pair) for Information Security
To transmit confidential information like e-mails, banking transactions, credit card details etc. over the unsecured network like internet Security is essential. There are more chances to read the information that is being transferred through network of computers or internet by other people. Now a d...
Saved in:
| Published in: | 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA) pp. 1 - 5 |
|---|---|
| Main Authors: | , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
01.08.2017
|
| Subjects: | |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | To transmit confidential information like e-mails, banking transactions, credit card details etc. over the unsecured network like internet Security is essential. There are more chances to read the information that is being transferred through network of computers or internet by other people. Now a days most of the countries are affected Ransomware attack. To avoid this we need a secure way to protect our data. So to protect information, we need to encrypt/decrypt information by using cryptography algorithms. In cryptography the data which is to be transmitted from sender to receiver in the network must be encrypted using the encryption algorithm and receiver can view the original data by using decryption technique. Mostly used asymmetric key encryption algorithm is RSA, which uses two keys one for encryption and another for decryption. Long time for the encryption process is the disadvantage of RSA algorithm. To overcome this problem, this paper performs comparative analysis of three algorithms: RSA, short range natural number (SRNN) and two key pair algorithm considering parameters encryption / decryption time. The programs are implemented using JAVA library function. The class BigInteger is used to hold large prime numbers and keys so that it difficult for hacker to guess the data. The algorithms are executed successfully on different size of text files. Comparing the encryption time results using normal RSA algorithm, SRNN and two key pair algorithm, it was proved that SRNN algorithm takes less time for encryption. |
|---|---|
| AbstractList | To transmit confidential information like e-mails, banking transactions, credit card details etc. over the unsecured network like internet Security is essential. There are more chances to read the information that is being transferred through network of computers or internet by other people. Now a days most of the countries are affected Ransomware attack. To avoid this we need a secure way to protect our data. So to protect information, we need to encrypt/decrypt information by using cryptography algorithms. In cryptography the data which is to be transmitted from sender to receiver in the network must be encrypted using the encryption algorithm and receiver can view the original data by using decryption technique. Mostly used asymmetric key encryption algorithm is RSA, which uses two keys one for encryption and another for decryption. Long time for the encryption process is the disadvantage of RSA algorithm. To overcome this problem, this paper performs comparative analysis of three algorithms: RSA, short range natural number (SRNN) and two key pair algorithm considering parameters encryption / decryption time. The programs are implemented using JAVA library function. The class BigInteger is used to hold large prime numbers and keys so that it difficult for hacker to guess the data. The algorithms are executed successfully on different size of text files. Comparing the encryption time results using normal RSA algorithm, SRNN and two key pair algorithm, it was proved that SRNN algorithm takes less time for encryption. |
| Author | Bhadade, U.S. Bonde, Sarika Y. |
| Author_xml | – sequence: 1 givenname: Sarika Y. surname: Bonde fullname: Bonde, Sarika Y. organization: Research Scholar North Maharashtra University Jalgaon, (M.S), INDIA – sequence: 2 givenname: U.S. surname: Bhadade fullname: Bhadade, U.S. organization: S. S. B. T. College of Engineering & Technology Bambhori, Head of IT department, Jalgaon, (M.S), INDIA |
| BookMark | eNotj81Kw0AYRUdQ0NY-gS5mqWDjN7-ZLGOoWixVGrMu-flGR9JJmaSLvL1Fuzl3dS6cCTn3nUdCbhlEjEHyuMyy4mmRRhxYHBmpRczhjEyYEkZLAMMvyazvfwCAayONEFekSH3Zjr3raWfpwtdh3A-u8zRtv7rghu9dT-82efpA8816TUvfUE7fcKQfpQv31HaBLv2Ru_LPyrE-HK3xmlzYsu1xdtopKZ4Xn9nrfPX-sszS1dyxWA1zq2KDoG1lUCqogCtIuGYKpWlYE1e1hUQLWyusLMNaJtIwqYFXookbTKSYkpv_X4eI231wuzKM21O5-AWGBU_F |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICCUBEA.2017.8463720 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 1538640082 9781538640081 |
| EndPage | 5 |
| ExternalDocumentID | 8463720 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IL 6IN AAJGR AAWTH ABLEC ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK OCL RIE RIL |
| ID | FETCH-LOGICAL-i175t-f578e06fb8e450b025092615e48d1d7bcf0963fc5ebf1ec494814602b3d7de943 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 4 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000446156500059&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| IngestDate | Wed Aug 27 02:54:43 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-f578e06fb8e450b025092615e48d1d7bcf0963fc5ebf1ec494814602b3d7de943 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_8463720 |
| PublicationCentury | 2000 |
| PublicationDate | 2017-Aug. |
| PublicationDateYYYYMMDD | 2017-08-01 |
| PublicationDate_xml | – month: 08 year: 2017 text: 2017-Aug. |
| PublicationDecade | 2010 |
| PublicationTitle | 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA) |
| PublicationTitleAbbrev | ICCUBEA |
| PublicationYear | 2017 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0002684833 |
| Score | 1.7003603 |
| Snippet | To transmit confidential information like e-mails, banking transactions, credit card details etc. over the unsecured network like internet Security is... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | BigInteger Ciphers Cryptography decryption Encryption Java Key pair Libraries Public key RSA SRNN |
| Title | Analysis of Encryption Algorithms (RSA, SRNN and 2 Key Pair) for Information Security |
| URI | https://ieeexplore.ieee.org/document/8463720 |
| WOSCitedRecordID | wos000446156500059&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Na8JAEB1UeuipLVr6zR56aMFoPjZu9mhFaSkE0QreJLs72wo1KVEL_vvuJqml0EtvS2AITHZ2Zjbz3gO4TRLuUk2pIxXzHYp-6CSJYJbGNTI2XHhuKTbB4jiaz_m4Bu09FgYRi-Ez7Nhl8S9fZXJrr8q6JldaUZU61BnrlVit_X2KZS2JgqBCx3ku7z4NBrOHYd-Ob7FOZfpLQ6VIIaOj_738GFo_WDwy3meZE6hh2oTZN5cIyTQZpjLfFZFP-u-vmen231ZrcjeZ9ttkOoljkqSK-OQZd2ScLPN7YupUUsGQCqtppWHXgtlo-DJ4dCqBBGdpsv7G0Sbc0O1pESENXWHLGW46ohBppDzFhNSmQQm0DFFoD6VlgjEHo-uLQDGFnAan0EizFM-AaD9SOjDVmynQqC-ZYD2pfE7NRmOeCOU5NK1LFh8lB8ai8sbF348v4dB6vRyUu4LGJt_iNRzIz81ynd8UH-4LEMiYlg |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB5qFfSk0opvc_Cg0G33kW12j7W0tLQupQ_orWySiRZ0V_oQ-u9NtmtF8OItBIZAXjOTzPd9APdxHNpUUWoJyVyLoutbccyZoXENtE3IHXsrNsGiKJhOw0EBKjssDCJmxWdYNc3sL1-mYm2eymraVxpRlT3YN8pZOVpr96JieEsCz8vxcY4d1rrN5uSp1TAFXKyaG_9SUcmcSPv4f8OfQPkHjUcGOz9zCgVMSjD5ZhMhqSKtRCw22dknjbeXVOf7r-9L8jAcNSpkNIwiEieSuKSHGzKI54tHoiNVkgORMqtRrmJXhkm7NW52rFwiwZprv7-ylD5waNcVD5D6NjcBTahzIh9pIB3JuFA6RfGU8JErB4XhgtFXo-1yTzKJIfXOoJikCZ4DUW4glafjNx2iUVcwzupCuiHVW4053BcXUDJTMvvYsmDM8tm4_Lv7Dg474-f-rN-NeldwZFZgWzZ3DcXVYo03cCA-V_Pl4jZbxC82XJvf |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2017+International+Conference+on+Computing%2C+Communication%2C+Control+and+Automation+%28ICCUBEA%29&rft.atitle=Analysis+of+Encryption+Algorithms+%28RSA%2C+SRNN+and+2+Key+Pair%29+for+Information+Security&rft.au=Bonde%2C+Sarika+Y.&rft.au=Bhadade%2C+U.S.&rft.date=2017-08-01&rft.pub=IEEE&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FICCUBEA.2017.8463720&rft.externalDocID=8463720 |