Modified Rabin Cryptosystem through Advanced Key Distribution System
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: In this paper, an asymmetric cryptosystem Rabin Cryptosystem has been modified by adding an advanced message authentication system with it. The proposed modified Rabin Cryptosystem is a combination of symmetric and asymmetric key cryptosystem that is hybrid cryptosystem. In the symmetric part, the sender and the receiver share a secret key between themselves which is added with the plaintext to change the plaintext. The shared secret key is fixed for a session between two users. It can be different for different sessions and different users. In the asymmetric part, the modified plaintext is encrypted using Rabin Cryptosystem. Two extra values will be sent along with the cipher text to the receiver. In the decryption process, Chinese Remainder Theorem will be applied along with the two extra values which were received with the cipher text to decipher it. Then the shared secret key between the sender and the receiver will have to be applied to get the original plaintext. Even if any intruder succeeds to decipher the cipher text, he would get the modified plaintext. As he doesn’t have the shared secret key, he would not be able to retrieve the original plaintext
Authors and Affiliations
Rajdeep Chakraborty1 , Sibendu Biswas1 , JK Mandal2
Intrusion Detection System using Apache Spark Analytic System
In this study, an Intrusion Detection System (IDS) is proposed based on the use of machine learning and distributed computing. The proposed system uses classification techniques that are implemented in the built-in machi...
Auto Finding and Resolving Distributed Firewall Policy
Abstract: In the network environment firewall is one of the protection layers. A firewall policy defines how an organization’s firewalls should handle inbound and outbound network traffic for specifi c IP addresses...
Methods Migration from On-premise to Cloud
Abstract: Cloud computing is evolving as a key computing platform for sharing resources that includeinfrastructures, software, applications, and business. An increasing number of companies are expected tomigrate th...
W-LEACH Decentralized: Weighted LEACH with a Decentralized way
Abstract: A mobile WSN is considered as a collection of wireless mobile nodes and a base station forming an ad-hoc network. This type of network is used in various areas; such as underwater and underground. Each no...
An Efficient implementation of PKI architecture based Digital Signature using RSA and various hash functions (MD5 and SHA variants
Digital Signature technique is widely being used to detect unauthorized modification to data and to authenticate the identity of the signatory. It is essential for secure transaction over unsecure/ open networks....