Abstract
Security is the concept of keeping information secret by protecting it from unauthorized users. In a distributed medium, cryptography becomes crucial part for secure communication. This chapter presents literature survey of the previous work done by various researchers in the field of cryptography and implementation of modified approach with a fair comparison between traditional RSA and modified approach. The text of different sizes was encrypted and decrypted using modified approach. The simulation results are also shown with graphical description simultaneously.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
M. Thangavel, P. Varalakshmi, Mukund Murrali, K. Nithya, “An Enhanced and Secured RSA Key Generation Scheme”, Department of Information Technology, Anna University, Chennai, 2014, Elsevier.
Amare Anagaw Ayele, Dr. Vuda Sreenivasarao, “A Modified RSA Encryption Technique Based on Multiple public keys”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, Issue 4, ISSN 2320-9798, June 2013.
Ammar Odeh, Khaled Elleithy, Muneer Alshowkan, Eman Abdelfattah, 2013, “Quantum Key Distribution by Using Public Key Algorithm (RSA)”, IEEE.
Norhidayah Muhammadi, Jasni Mohamad Zaini, Md Yazid Mohd Saman, “Loop-based RSA Key Generation Algorithm using String Identity”, 13th International Conference on Control, Automation and Systems (ICCAS 2013). International Journal of Computer Applications (0975 – 8887) Volume 114 – No. 7, March 2015 33.
Ms. Ritu Patidar, Mrs. Rupali Bhartiya, 2013, “Modified RSA Cryptosystem Based on Offline Storage and Prime Number”, IEEE.
Liang Wang, Yonggui Zhang, 2011, “A New Personal Information Protection Approach Based on RSA Cryptography”, IEEE.
Malek Jakob Kakish, “Enhancing The Security Of The RSA Cryptosystem”, IJRRAS August 2011.
Dr. D.I. George Amalarethinam, J. Sai Geetha, “Enhancing Security level for Public Key Cryptosystem using MRGA”, World Congress on Computing and Communication Technologies, 978-1-4799-2876-7/13/, 2014, IEEE.
Dr. Abdulameer K. Hussain, “A Modified RSA Algorithm for Security Enhancement and Redundant Messages Elimination Using K-Nearest Neighbor Algorithm”, IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 2, Issue 1, ISSN 2348-7968, January 2015.
Xianmeng Meng, Xuexin Zheng, “Cryptanalysis of RSA with a small parameter revisited”, Information Processing Letters 115, 858-862, 2015, Elsevier.
Ritu Tripathi, Sanjay Agrawal, “Critical Analysis of RSA Public Key Cryptosystem”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 7, ISSN 2277-128X, July 2014.
Shilpi Gupta, Jaya Sharma, “A Hybrid Encryption Algorithm based on RSA and Diffie-Hellman”, International Conference on Computational Intelligence and Computing Research, 978-1-4673-1344-5/12, 2012, IEEE.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mathur, S., Gupta, D., Goar, V., Choudhary, S. (2018). Implementation of Modified RSA Approach for Encrypting and Decrypting Text Using Multi-power and K-Nearest Neighbor Algorithm. In: Perez, G., Mishra, K., Tiwari, S., Trivedi, M. (eds) Networking Communication and Data Knowledge Engineering. Lecture Notes on Data Engineering and Communications Technologies, vol 4. Springer, Singapore. https://doi.org/10.1007/978-981-10-4600-1_21
Download citation
DOI: https://doi.org/10.1007/978-981-10-4600-1_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-4599-8
Online ISBN: 978-981-10-4600-1
eBook Packages: EngineeringEngineering (R0)