Published June 6, 2017 | Version v1
Journal article Open

Function Codes for Protection of Key in Private Key Cryptography

Description

In order to check the applicability and correctness of any designed algorithm, it is must to write a code on any suitable platform that successfully implements the logic. The present work is actually an extension to what we have done in our previous works where we have tried to devise an algorithm which is based on the most popular and largely applied asymmetric key algorithm named RSA algorithm [1]. The basic idea of latter is not touched but modified only with a piece of further enhancement in its working. The flexibility of RSA algorithm to wide range of values has instigated us to choose it for our efforts to ensure secure communication between communicating parties with the probability of getting failed minimised to great level of its implementation.

Notes

International Journal of Emerging Technologies and Innovative Research (An International Open Access Journal) ISSN: 2349-5162 | Impact Factor: 5.87 JETIREXPLORE- Search Thousands of research papers Custom Search search

Files

JETIR1706008.pdf

Files (472.5 kB)

Name Size Download all
md5:4ba9e4737f6a815a694e834144b44b72
472.5 kB Preview Download