Das 2016 Ijca 909789
Das 2016 Ijca 909789
Das 2016 Ijca 909789
10
International Journal of Computer Applications (0975 – 8887)
Volume 141 – No.9, May 2016
more security then you take more no bits like 2048,4096, etc. of our own choice. Initializing the bit length by 1024 bit, a
But 2048 bit size is used for best security. It is used random value has been created and two prime no’s has been
worldwide for best security purpose. It is too slow because it taken and then a function called Prime() function has been
takes large amount of bit and data, so calculation takes more called of Big Integer class by passing bit length and random
time for encryption. value then it returns 309 digits prime no and we have stored in
variable A and B. After multiplying A and B and storing the
In RSA algorithm two key is used, private and public key. result invariable N, by using multiply function of Big. After
Public key is used to encrypt the data which is in cipher text that the calculation (A-1)*(B-1) is done and stored it in M and
or finger print, public keys are stored in database where then random and by probable Prime function is created again,
everyone can see these, while private key is used to crack or and prime no is generated and stored it in I (public). Then the
decrypt the data. Private Key is with the person who will calculation of D (private) is done by using the mod Inverse
decrypt the message. It is very difficult to create secret key function and then it also returns big integer after calculating
from public key therefore RSA is prevalent choice for data (I^-1 mod M). Finally input is taken from the user and
encryption. This algorithm is used in email, remote login, e- converted them into bytes and call encrypt method. Under this
banking etc. method I and N has been used to encrypt data (P^I mod N) for
A. RSA Algorithm Logic this Mod POW has been used. This function calculates power
STEP 1: START and after calculating power it calculates mod and return big
integer and return the data in byte array format (encrypted
STEP 2: Select two prime numbers randomly. (Let A and B) data) and (P^D mod N) has been used for decrypting the
STEP 3: Multiply prime numbers (A*B), store in another message after getting the original message. The execution
variable (Let N) result of the java program is shown in figure 3:
11
International Journal of Computer Applications (0975 – 8887)
Volume 141 – No.9, May 2016
12
International Journal of Computer Applications (0975 – 8887)
Volume 141 – No.9, May 2016
IJCATM : www.ijcaonline.org
13