Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Algorithm for Protection of Key in Private Key Cryptography

Author : Neha Tyagi 1 Ashish Agarwal 2 Anurag Katiyar 3 Shubham Garg 4 Shudhanshu Yadav 5

Date of Publication :13th March 2017

Abstract: This paper is in reference with our previous paper entitled “Protection of Key in Private Key Cryptography” published by “International Journal of Advanced Research” in Feb 2017 edition... In this paper we have tried to devise an algorithm that would protect the key in transmission, as in the era of digitization, threats to information security instigate the concerned people to take proactive measures for communication between two communicating parties. Since our major focus is on the symmetric key cryptography, also called as private key cryptography, we have studied different techniques of securing a private key or shared key or secret key that are used to shield information in such systems. The different statistical data being published so far and recent phishing scam which plays with the information transfer by taking away the user’s identity highlights the need to make our security measures strong enough to counter such unwanted accesses. After looking into the functioning of widely accepted protocols and thinking of introducing a few changes to enhance their functionality, we here, are going to focus mainly on application of asymmetric key cryptographic algorithm named RSA algorithm. We have already referred to suggestions by means of several research papers being published so far related to our area of interest such as N-Prime RSA, magic rectangle, etc. We have tried to present a method taking one step ahead in the available sketch and without diminishing the basic essence of the algorithm. We also refer to some examples and its application as thought of in its modified form to further support our idea.

Reference :

Will Updated soon

Recent Article