Improvised Asymmetric Key Encryption Algorithm Using MATLAB
Improvised Asymmetric Key Encryption Algorithm Using MATLAB
e-ISSN: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 2, Ver. IV (Mar - Apr.2015), PP 31-36
www.iosrjournals.org
2,3, 4
Abstract: In this paper, A new technique is deployed to improve Asymmetric Key Encryption Technique with
multiple keys and Chinese remainder theorem(CRT) .The main aim of this Technique is to provide secure
transmission of data between any networks through a channel. The Scope of this paper deals with Multiple
Public and Private keys and its computation time. RSA algorithm is used to utilize asymmetric key encryption
technique .In proposed model RSA will be implemented using MATLAB with original RSA Algorithm
,Proposed RSA Algorithm and RSA using Chinese Remainder Theorem(CRT). The Computational time and its
mere effects are briefly dealt by varying the multiple number of keys .
Keywords: RSA, Multiple key, Chinese Remainder Theorem (CRT), Secure, MATLAB.
I.
Introduction
In Communications regardless of the platform such as email, Voice messages or direct messages the
end users ultimate motive is to send or receive the information without any intervention from the intruder. So a
mechanism is to be deployed such that only the users should understand the information and for others it should
be in the unreadable format .The process of encoding the plain text messages into cipher text is referred as
Encryption and the reverse transforming process is decryption. In a Computer to Computer communications, the
sender usually does the encryption and at the receiving end the decryption is done[1] .
Every encryption and decryption process has two primarily goals : Algorithm and the key generation .
Algorithm is made public to all the users an its the key which makes the communication secure
between the user domain. If the same key is used at both the ends then it is referred as Symmetric Key
Cryptography and if different keys(Public and private key ) are used at both the ends its Asymmetric key
Cryptography[16]. The above mentioned process is depicted in the figure.
In this paper we deal about the Asymmetric key cryptography[3] since it overcomes the disadvantages
of symmetric key cryptography such as key exchange and also digital signature can be deployed using this
technique .It also deals about doing the encryption and decryption using two keys at both the ends so that the
information can be sent more securely using the Modified RSA Algorithm and with Chinese Remainder
Theorem .
II.
The RSA Algorithm was developed by Ron Rivest, Adi Shamir and Leonard in 1978[17]. The original
RSA algorithm follows 4 phases: Key Generation, Encryption, Decryption and Digital signature [9].
DOI: 10.9790/2834-10243136
www.iosrjournals.org
31 | Page
DOI: 10.9790/2834-10243136
www.iosrjournals.org
32 | Page
III.
3.1Original RSA Algorithm Implemented Using Alphabetic Message and Numerical Message
DOI: 10.9790/2834-10243136
www.iosrjournals.org
33 | Page
DOI: 10.9790/2834-10243136
www.iosrjournals.org
34 | Page
IV.
Graphs
V.
Conclusion
The observed results from our work clearly mention that by using a single (public and private key)the
computational time required is less but problem is less secure. To have more secured transmission of
information we can use Chinese remainder theorem so that there will be reduction of time of evaluation. So to
have both secure transmission and time bound application we can use two key methods.
Acknowledgements
Authors like to express their deep gratitude to K Sony, Assistant Professor Department of ECE K L
University for her great support and encouragement during the implementation of this work and also we would
also like to thank our communications research members and also our friends for their help in completion of this
paper.
References
[1].
[2].
[3].
[4].
William Stallings, Cryptography and Network Security, ISBN 81-7758-011-6, Pearson Education, Third Edition
R.L.Rivest,A. Shamir, and L.Adleman, A method for obtaining digital signature and public key cryptosystem,
comm..ACM feb1978, 21(2):120-126
W.Diffie and M.E.Hellman, New directions in cryptography, IEEE Trans. Inform. Theory, Nov.1976,22: 644-654.
DOI: 10.9790/2834-10243136
www.iosrjournals.org
35 | Page
[21].
Chung-Hsien Wu; Jin-Hua Hong; Cheng-Wen Wu, "RSA cryptosystem design based on the Chinese remainder theorem," Design
Automation Conference, 2001. Proceedings of the ASP-DAC 2001. Asia and South Pacific , vol., no., pp.391,395, 2001
H. Ren-Junn, S. Feng-Fu, Y. Yi-Shiung and C. Chia-Yao An efficient decryption method for RSA cryptosystem Advanced
Information Networking and Applications, 2005 (AINA 2005). 19th International Conference on, 2005, pp. 585 -590 vol.1.
Z. Shao. Security of a new digital signature scheme based on factoring and discrete logarithms. International Journal of Computer
Mathematics, 82(10):1215-1219,2005.
D. Poulakis. A variant of Digital Signature Algorithm. Designs, Codes and Cryptography, 51(1):99-104, 2009
C. Kaufman, R. Perlman, M. Speciner, Network security, Prentice Hall 1995
Ronald L. Rivest, Adi Shamir, Len Adelman, "On Digital Signatures and Public Key Cryptosystems," MIT Laboratory for
Computer Science Technical Memorandum82 (April 1977).
Behrouz A. Forouzen, Cryptography and Network Security, Tata McGraw-Hill Publishing Company Ltd, New Delhi, ISBN-13:
987-0-07-066046-5, 2010.
http://www.rsa.com/rsalabs/node.asp?id=2167
Niven, I., and Zuckerman, H.S. An Introduction to the Theory of Numbers. Wile , New York, 1972.
http://www.scribd.com/doc/55154238/31/DISADVANTAGES-OF-RSA
Atul Kahate Cryptography and Network Security 3rd edition.
Gagandeep shahi Charanjit Singh Cryptography and its Implementation Approaches International Journal of Innovative Research
in Computer and communication Engineering, Vol.1,Issue 3,May 2013,PP 668-672
M. Bellare and P. Rogaway. Optimal Asymmetric Encryption. In A. De Santis, ed., Proceedings of Eurocrypt 1994, vol. 950 of
LNCS, pp.92-111. Spinger-Verlag, May 1994
http://en.wikipedia.org/wiki/RSA
M. Wiener. Cryptanalysis of Short RSA Secret Exponents. IEEE Transactions on Information Theory, Vol. 36, No. 3, pp,553558, 1990
M.J.Hinek, M.K.Low, and E.Teske. On some attacks on multi prime RSA. In K.Nyberg and H.M.Heys, editors, Selected areas in
Cryptography, volume 2595 of Lecture Notes in Computer Science ,pages 385-404. Springer, 2002.
N. Ojha and S. Padhye," Cryptanalysis of Multi Prime RSA with Secret Key Greater than Public Key", International Journal of
Network Security, Vol.16, No.1, PP.53-57, Jan, 2014
Authors Profile
K.SONY is Assistant Professor in KL University. She Completed M.Tech Electronics and Communication
Engineering from ANNA University. He is getting his specialization in Signal processing
applications.. He is member of IETE. Her interest in research areas includes Optical
Communication and Image processing applications
DESOWJA SHAIK was born in India, A.P, in 1994.He is pursuing her B.Tech in Electronics and
Communication Engineering from K L University. He is getting his specialization in
communication. He presented 3 papers in International technical fests at reputed engineering
colleges. He is member of IETE. His interest in research areas includes Networking and
Cryptography and Communication.
B.DIVYA SRI was born in India, A.P, in 1994. She is pursuing her B.Tech in Electronics and Communication
Engineering from K L University. She is getting her specialization in communication. She is
member of IETE. Her interest in research includes VLSI and Image processing.
G.ANITHA was born in India, A.P, in 1994. She is pursuing her B.Tech in Electronics and Communication
Engineering from K L University. She is getting her specialization in communication. She is
member of IETE. Her interest in research includes Antennas and Networking.
DOI: 10.9790/2834-10243136
www.iosrjournals.org
36 | Page