Analysis of Encryption Algorithms (RSA, SRNN and 2 Key Pair) for Information Security

To transmit confidential information like e-mails, banking transactions, credit card details etc. over the unsecured network like internet Security is essential. There are more chances to read the information that is being transferred through network of computers or internet by other people. Now a d...

Full description

Saved in:
Bibliographic Details
Published in:2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA) pp. 1 - 5
Main Authors: Bonde, Sarika Y., Bhadade, U.S.
Format: Conference Proceeding
Language:English
Published: IEEE 01.08.2017
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract To transmit confidential information like e-mails, banking transactions, credit card details etc. over the unsecured network like internet Security is essential. There are more chances to read the information that is being transferred through network of computers or internet by other people. Now a days most of the countries are affected Ransomware attack. To avoid this we need a secure way to protect our data. So to protect information, we need to encrypt/decrypt information by using cryptography algorithms. In cryptography the data which is to be transmitted from sender to receiver in the network must be encrypted using the encryption algorithm and receiver can view the original data by using decryption technique. Mostly used asymmetric key encryption algorithm is RSA, which uses two keys one for encryption and another for decryption. Long time for the encryption process is the disadvantage of RSA algorithm. To overcome this problem, this paper performs comparative analysis of three algorithms: RSA, short range natural number (SRNN) and two key pair algorithm considering parameters encryption / decryption time. The programs are implemented using JAVA library function. The class BigInteger is used to hold large prime numbers and keys so that it difficult for hacker to guess the data. The algorithms are executed successfully on different size of text files. Comparing the encryption time results using normal RSA algorithm, SRNN and two key pair algorithm, it was proved that SRNN algorithm takes less time for encryption.
AbstractList To transmit confidential information like e-mails, banking transactions, credit card details etc. over the unsecured network like internet Security is essential. There are more chances to read the information that is being transferred through network of computers or internet by other people. Now a days most of the countries are affected Ransomware attack. To avoid this we need a secure way to protect our data. So to protect information, we need to encrypt/decrypt information by using cryptography algorithms. In cryptography the data which is to be transmitted from sender to receiver in the network must be encrypted using the encryption algorithm and receiver can view the original data by using decryption technique. Mostly used asymmetric key encryption algorithm is RSA, which uses two keys one for encryption and another for decryption. Long time for the encryption process is the disadvantage of RSA algorithm. To overcome this problem, this paper performs comparative analysis of three algorithms: RSA, short range natural number (SRNN) and two key pair algorithm considering parameters encryption / decryption time. The programs are implemented using JAVA library function. The class BigInteger is used to hold large prime numbers and keys so that it difficult for hacker to guess the data. The algorithms are executed successfully on different size of text files. Comparing the encryption time results using normal RSA algorithm, SRNN and two key pair algorithm, it was proved that SRNN algorithm takes less time for encryption.
Author Bhadade, U.S.
Bonde, Sarika Y.
Author_xml – sequence: 1
  givenname: Sarika Y.
  surname: Bonde
  fullname: Bonde, Sarika Y.
  organization: Research Scholar North Maharashtra University Jalgaon, (M.S), INDIA
– sequence: 2
  givenname: U.S.
  surname: Bhadade
  fullname: Bhadade, U.S.
  organization: S. S. B. T. College of Engineering & Technology Bambhori, Head of IT department, Jalgaon, (M.S), INDIA
BookMark eNotj81Kw0AYRUdQ0NY-gS5mqWDjN7-ZLGOoWixVGrMu-flGR9JJmaSLvL1Fuzl3dS6cCTn3nUdCbhlEjEHyuMyy4mmRRhxYHBmpRczhjEyYEkZLAMMvyazvfwCAayONEFekSH3Zjr3raWfpwtdh3A-u8zRtv7rghu9dT-82efpA8816TUvfUE7fcKQfpQv31HaBLv2Ru_LPyrE-HK3xmlzYsu1xdtopKZ4Xn9nrfPX-sszS1dyxWA1zq2KDoG1lUCqogCtIuGYKpWlYE1e1hUQLWyusLMNaJtIwqYFXookbTKSYkpv_X4eI231wuzKM21O5-AWGBU_F
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICCUBEA.2017.8463720
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1538640082
9781538640081
EndPage 5
ExternalDocumentID 8463720
Genre orig-research
GroupedDBID 6IE
6IF
6IL
6IN
AAJGR
AAWTH
ABLEC
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-f578e06fb8e450b025092615e48d1d7bcf0963fc5ebf1ec494814602b3d7de943
IEDL.DBID RIE
ISICitedReferencesCount 4
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000446156500059&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
IngestDate Wed Aug 27 02:54:43 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-f578e06fb8e450b025092615e48d1d7bcf0963fc5ebf1ec494814602b3d7de943
PageCount 5
ParticipantIDs ieee_primary_8463720
PublicationCentury 2000
PublicationDate 2017-Aug.
PublicationDateYYYYMMDD 2017-08-01
PublicationDate_xml – month: 08
  year: 2017
  text: 2017-Aug.
PublicationDecade 2010
PublicationTitle 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA)
PublicationTitleAbbrev ICCUBEA
PublicationYear 2017
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0002684833
Score 1.7003603
Snippet To transmit confidential information like e-mails, banking transactions, credit card details etc. over the unsecured network like internet Security is...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms BigInteger
Ciphers
Cryptography
decryption
Encryption
Java
Key pair
Libraries
Public key
RSA
SRNN
Title Analysis of Encryption Algorithms (RSA, SRNN and 2 Key Pair) for Information Security
URI https://ieeexplore.ieee.org/document/8463720
WOSCitedRecordID wos000446156500059&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1Na8JAEB1UeuipLVr6zR56aMFoPjZu9mhFaSkE0QreJLs72wo1KVEL_vvuJqml0EtvS2AITHZ2Zjbz3gO4TRLuUk2pIxXzHYp-6CSJYJbGNTI2XHhuKTbB4jiaz_m4Bu09FgYRi-Ez7Nhl8S9fZXJrr8q6JldaUZU61BnrlVit_X2KZS2JgqBCx3ku7z4NBrOHYd-Ob7FOZfpLQ6VIIaOj_738GFo_WDwy3meZE6hh2oTZN5cIyTQZpjLfFZFP-u-vmen231ZrcjeZ9ttkOoljkqSK-OQZd2ScLPN7YupUUsGQCqtppWHXgtlo-DJ4dCqBBGdpsv7G0Sbc0O1pESENXWHLGW46ohBppDzFhNSmQQm0DFFoD6VlgjEHo-uLQDGFnAan0EizFM-AaD9SOjDVmynQqC-ZYD2pfE7NRmOeCOU5NK1LFh8lB8ai8sbF348v4dB6vRyUu4LGJt_iNRzIz81ynd8UH-4LEMiYlg
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB5qFfSk0opvc_Cg0G33kW12j7W0tLQupQ_orWySiRZ0V_oQ-u9NtmtF8OItBIZAXjOTzPd9APdxHNpUUWoJyVyLoutbccyZoXENtE3IHXsrNsGiKJhOw0EBKjssDCJmxWdYNc3sL1-mYm2eymraVxpRlT3YN8pZOVpr96JieEsCz8vxcY4d1rrN5uSp1TAFXKyaG_9SUcmcSPv4f8OfQPkHjUcGOz9zCgVMSjD5ZhMhqSKtRCw22dknjbeXVOf7r-9L8jAcNSpkNIwiEieSuKSHGzKI54tHoiNVkgORMqtRrmJXhkm7NW52rFwiwZprv7-ylD5waNcVD5D6NjcBTahzIh9pIB3JuFA6RfGU8JErB4XhgtFXo-1yTzKJIfXOoJikCZ4DUW4glafjNx2iUVcwzupCuiHVW4053BcXUDJTMvvYsmDM8tm4_Lv7Dg474-f-rN-NeldwZFZgWzZ3DcXVYo03cCA-V_Pl4jZbxC82XJvf
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2017+International+Conference+on+Computing%2C+Communication%2C+Control+and+Automation+%28ICCUBEA%29&rft.atitle=Analysis+of+Encryption+Algorithms+%28RSA%2C+SRNN+and+2+Key+Pair%29+for+Information+Security&rft.au=Bonde%2C+Sarika+Y.&rft.au=Bhadade%2C+U.S.&rft.date=2017-08-01&rft.pub=IEEE&rft.spage=1&rft.epage=5&rft_id=info:doi/10.1109%2FICCUBEA.2017.8463720&rft.externalDocID=8463720