Skip to main content
Top

2018 | OriginalPaper | Chapter

Advanced RSA Cryptographic Algorithm for Improving Data Security

Author : Mukesh Kumar

Published in: Cyber Security

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Data security is a method which is used to cover the important information. Data security methods control the privacy and integrity of the important information. The access to the database of the companies has improved. Now companies store their business data more on computer than before. Most of the company data is for internal use and not for the general public because business data is highly confidential. At present, cryptographic block cipher is being used with some logical operation and the main drawback in this method is the generation of the secret key which is totally based on the alphabets. So with the help of loop concept, there is a chance for the hackers to find out the secret key. But I propose advanced algorithm for cryptography which is totally dependent on hashing function technique to generate a secret key which is further used to encrypt and decrypt the important information. The secret key will be generated by using different key generation algorithms which will be of higher sets of alphanumeric characters. I am using a hashing technique for cryptography along with a new quantum-bit generation method.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference A Text book by William Stallings, data and computer communications, 6e William 6e 2005 A Text book by William Stallings, data and computer communications, 6e William 6e 2005
2.
go back to reference Chatterjee D, Nath J, Dasgupta S, Nath A (2005) A new symmetric key cryptography algorithm using extended MSA method: DJSA symmetric key algorithm, accepted for publication in IEEE CSNT2011 to be held at SMVDU (Jammu) 03–06 June 2011 Chatterjee D, Nath J, Dasgupta S, Nath A (2005) A new symmetric key cryptography algorithm using extended MSA method: DJSA symmetric key algorithm, accepted for publication in IEEE CSNT2011 to be held at SMVDU (Jammu) 03–06 June 2011
3.
go back to reference Nath A, Das S, Chakrabarti A (2010) Data hiding and retrieval. In: Proceedings of IEEE international conference on computer intelligence and computer network held at Bhopal from 26–28 Nov 2010 Nath A, Das S, Chakrabarti A (2010) Data hiding and retrieval. In: Proceedings of IEEE international conference on computer intelligence and computer network held at Bhopal from 26–28 Nov 2010
4.
go back to reference Muhammad F, Chowdhury I, Matin MA Effect of security increment to symmetric data encryption through AES methodology, 9th ACIS international conference on software engineering, artificial intelligence, networking, and parallel/distributed computing. Phuket, Thailand. 6–8 Aug 2008. https://doi.org/10.1109/SNPD.2008.101 Muhammad F, Chowdhury I, Matin MA Effect of security increment to symmetric data encryption through AES methodology, 9th ACIS international conference on software engineering, artificial intelligence, networking, and parallel/distributed computing. Phuket, Thailand. 6–8 Aug 2008. https://​doi.​org/​10.​1109/​SNPD.​2008.​101
5.
go back to reference Felten K An algorithm for symmetric cryptography with a wide range of scalability. In published by 2nd international workshop on embedded systems, internet programming and industial IT Felten K An algorithm for symmetric cryptography with a wide range of scalability. In published by 2nd international workshop on embedded systems, internet programming and industial IT
7.
go back to reference Nath A, Ghosh S, Malik MA Symmetric key cryptography using random key generator, vol 2, pp 239–244 Nath A, Ghosh S, Malik MA Symmetric key cryptography using random key generator, vol 2, pp 239–244
Metadata
Title
Advanced RSA Cryptographic Algorithm for Improving Data Security
Author
Mukesh Kumar
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8536-9_2

Premium Partner