Skip to main content

2018 | OriginalPaper | Buchkapitel

Advanced RSA Cryptographic Algorithm for Improving Data Security

verfasst von : Mukesh Kumar

Erschienen in: Cyber Security

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Data security is a method which is used to cover the important information. Data security methods control the privacy and integrity of the important information. The access to the database of the companies has improved. Now companies store their business data more on computer than before. Most of the company data is for internal use and not for the general public because business data is highly confidential. At present, cryptographic block cipher is being used with some logical operation and the main drawback in this method is the generation of the secret key which is totally based on the alphabets. So with the help of loop concept, there is a chance for the hackers to find out the secret key. But I propose advanced algorithm for cryptography which is totally dependent on hashing function technique to generate a secret key which is further used to encrypt and decrypt the important information. The secret key will be generated by using different key generation algorithms which will be of higher sets of alphanumeric characters. I am using a hashing technique for cryptography along with a new quantum-bit generation method.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat A Text book by William Stallings, data and computer communications, 6e William 6e 2005 A Text book by William Stallings, data and computer communications, 6e William 6e 2005
2.
Zurück zum Zitat Chatterjee D, Nath J, Dasgupta S, Nath A (2005) A new symmetric key cryptography algorithm using extended MSA method: DJSA symmetric key algorithm, accepted for publication in IEEE CSNT2011 to be held at SMVDU (Jammu) 03–06 June 2011 Chatterjee D, Nath J, Dasgupta S, Nath A (2005) A new symmetric key cryptography algorithm using extended MSA method: DJSA symmetric key algorithm, accepted for publication in IEEE CSNT2011 to be held at SMVDU (Jammu) 03–06 June 2011
3.
Zurück zum Zitat Nath A, Das S, Chakrabarti A (2010) Data hiding and retrieval. In: Proceedings of IEEE international conference on computer intelligence and computer network held at Bhopal from 26–28 Nov 2010 Nath A, Das S, Chakrabarti A (2010) Data hiding and retrieval. In: Proceedings of IEEE international conference on computer intelligence and computer network held at Bhopal from 26–28 Nov 2010
4.
Zurück zum Zitat Muhammad F, Chowdhury I, Matin MA Effect of security increment to symmetric data encryption through AES methodology, 9th ACIS international conference on software engineering, artificial intelligence, networking, and parallel/distributed computing. Phuket, Thailand. 6–8 Aug 2008. https://doi.org/10.1109/SNPD.2008.101 Muhammad F, Chowdhury I, Matin MA Effect of security increment to symmetric data encryption through AES methodology, 9th ACIS international conference on software engineering, artificial intelligence, networking, and parallel/distributed computing. Phuket, Thailand. 6–8 Aug 2008. https://​doi.​org/​10.​1109/​SNPD.​2008.​101
5.
Zurück zum Zitat Felten K An algorithm for symmetric cryptography with a wide range of scalability. In published by 2nd international workshop on embedded systems, internet programming and industial IT Felten K An algorithm for symmetric cryptography with a wide range of scalability. In published by 2nd international workshop on embedded systems, internet programming and industial IT
7.
Zurück zum Zitat Nath A, Ghosh S, Malik MA Symmetric key cryptography using random key generator, vol 2, pp 239–244 Nath A, Ghosh S, Malik MA Symmetric key cryptography using random key generator, vol 2, pp 239–244
Metadaten
Titel
Advanced RSA Cryptographic Algorithm for Improving Data Security
verfasst von
Mukesh Kumar
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8536-9_2