Planned intervention: On Wednesday April 3rd 05:30 UTC Zenodo will be unavailable for up to 2-10 minutes to perform a storage cluster upgrade.
Published February 29, 2020 | Version v1
Journal article Open

An OTP Integrated Optimal Key RSA Based Secure Data Communication

  • 1. ECE, Bankura Unnayani Institute of Engineering, Bankura, W.B.
  • 2. ECE, Name MCKV Institute of Engineering, Howrah,W.B.
  • 3. ECE, NIT, Durgapur, India.
  • 1. Publisher

Description

System security is a basic aspect of data sharing. Aspires have been made to exhaust particular defects over the web. For this, different creative usage and security methods have been made. The measure of information exchange isn't a factor. The major factor is, how much it's secure, the channel gives while transmitting information. Cryptography is one such structure, which grants secure information transmission without losing its protection and uprightness. In light of the key circulation, cryptography is also assembled into two critical forms Symmetric Key Cryptography as well as Asymmetric Key Cryptography. RSA is one of the best conspicuous public-key cryptography based algorithms is unequivocally utilized for encryption/decryption. It's far based on the logical arrangement of factorization of strongly enormous whole numbers which is a compute-intensive way. In this paper, we have provided a novel, secure and profitable information communication system dependent on the RSA algorithm. Mystery updating signal dealing with systems have been proposed in the exploration for the two data transmission and the channel estimation stages. The proposed one facilitates the advantages of both RSA calculation and One Time Password (OTP) produced by the sender and got just by the endorsed customer. Despite that not at all like conventional RSA algorithm, in this work we embrace perfect key assurance by particle swarm optimization (PSO) during both encryption and decryption. The use of PSO for perfect key decision makes the general technique proficient by extending the security level and making the computation procedure very easy.

Files

C5471029320.pdf

Files (537.5 kB)

Name Size Download all
md5:b8cb92ee798ab57f59d9b767e7baf9e2
537.5 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2249-8958 (ISSN)

Subjects

ISSN
2249-8958
Retrieval Number
C5471029320/2020©BEIESP