Prime Numbers and Modular Exponentiation in Encryption and Decryption

Abstract

The Number theory is one of purest branches of mathematics, but it is also becoming a powerful tool when it comes to computer security. When we shop online, the Number theory helps to protect sensitive data such as credit card numbers which is the result of mathematics research and is now being applied worldwide. In this paper, we have discussed the some concept of number theory like prime numbers, integer factorization and Modular Exponentiation and Roots which provide way to worldwide used RAS cryptosystem.

Authors and Affiliations

Babita Bist Ramola

Keywords

Related Articles

Liver Disease Prognosis Based on Clinical Parameters Using Machine Learning Approach

We are living in the era of Machine Learning. The use of Machine Learning in medical diagnosis of various diseases increases many fold in recent years. In this Paper we had made an attempt to demonstrate an analytical a...

Detection of Kidney Abnormalities in Noisy Ultrasound Image

Ultrasound imaging is a widely used and safe medical diagnostic technique, due to its non-invasive nature, low cost and capability of forming real time imaging. Ultrasound imaging uses high-frequency sound to image inte...

Responsive web development

This paper is based on Responsive web development which is aimed to provide optimal viewing experience. A website designed with Responsive Web Development adapts the layout to the user by using fluid, proportion-based g...

An Opinion Mining By Manhattan Clustering Using Decision Tree Feature Selection

In present era Opinion mining plays a major character in text mining applications, and people are more depend on the web for many actions like purchasing, investment, business markings, etc. These applications led to a...

Secure Communication in Physical Layer through Cooperative Relay Networks

Nowadays, increasing number of wireless users because of the mobility and comfort in the wireless communication leads to security issues. For security of wireless systems, cryptography techniques, which are higher layer...

Download PDF file
  • EP ID EP20940
  • DOI -
  • Views 281
  • Downloads 3

How To Cite

Babita Bist Ramola (2015). Prime Numbers and Modular Exponentiation in Encryption and Decryption. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 3(6), -. https://europub.co.uk/articles/-A-20940