Function Codes for Protection of Key in Private Key Cryptography
Description
In order to check the applicability and correctness of any designed algorithm, it is must to write a code on any suitable platform that successfully implements the logic. The present work is actually an extension to what we have done in our previous works where we have tried to devise an algorithm which is based on the most popular and largely applied asymmetric key algorithm named RSA algorithm [1]. The basic idea of latter is not touched but modified only with a piece of further enhancement in its working. The flexibility of RSA algorithm to wide range of values has instigated us to choose it for our efforts to ensure secure communication between communicating parties with the probability of getting failed minimised to great level of its implementation.
Notes
Files
JETIR1706008.pdf
Files
(472.5 kB)
Name | Size | Download all |
---|---|---|
md5:4ba9e4737f6a815a694e834144b44b72
|
472.5 kB | Preview Download |