Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Algorithm for Protection of Key in Private Key Cryptography

Author : Neha Tyagi 1 Ashish Agarwal 2 Anurag Katiyar 3 Shubham Garg 4 Shudhanshu Yadav 5

Date of Publication :13th March 2017

Abstract: This paper is in reference with our previous paper entitled “Protection of Key in Private Key Cryptography” published by “International Journal of Advanced Research” in Feb 2017 edition... In this paper we have tried to devise an algorithm that would protect the key in transmission, as in the era of digitization, threats to information security instigate the concerned people to take proactive measures for communication between two communicating parties. Since our major focus is on the symmetric key cryptography, also called as private key cryptography, we have studied different techniques of securing a private key or shared key or secret key that are used to shield information in such systems. The different statistical data being published so far and recent phishing scam which plays with the information transfer by taking away the user’s identity highlights the need to make our security measures strong enough to counter such unwanted accesses. After looking into the functioning of widely accepted protocols and thinking of introducing a few changes to enhance their functionality, we here, are going to focus mainly on application of asymmetric key cryptographic algorithm named RSA algorithm. We have already referred to suggestions by means of several research papers being published so far related to our area of interest such as N-Prime RSA, magic rectangle, etc. We have tried to present a method taking one step ahead in the available sketch and without diminishing the basic essence of the algorithm. We also refer to some examples and its application as thought of in its modified form to further support our idea.

Reference :

    1. Neha Tyagi, Ashish Agarwal, Anurag Katiyar, Shubham Garg, Shudhanshu Yadav, “Protection of Key in Private Key Cryptography” published by “International Journal of Advanced Research”, Volume 5, Issue 2, Feb 2017.
    2. Hardik Gandhi, Vinit Gupta, “Research on enhancing public key by the use of MRGA with RSA and N-Prime RSA” paper published by “International Journal for Innovative Research in Science & Technology”, Volume 1, Issue 12, May 2015.
    3. Jyotirmoy Das “A Study on Modern Cryptography and their Security Issues” published by “International Journal of Emerging Technology and Advanced Engineering”, Volume 4, Issue 10, October 2014. 
    4. Mitali, Vijay Kumar, Arvind Sharma “A Survey on Various Cryptography Techniques” published by “International Journal of Emerging Trends & Technology in Computer Science” Volume 3, Issue 4, July-August 2014.
    5. Swati Kashyap, Er. Neeraj Madan, “A Review on: Network Security and Cryptographic Algorithm” published by “International Journal of Advanced Research in Computer Science and Software Engineering” Volume 5, Issue 4, April 2015

Recent Article