Skip to main content

Enhancement of Security Using B-RSA Algorithm

  • Conference paper
  • First Online:
Inventive Communication and Computational Technologies

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 89))

Abstract

Cryptography is a scientific art which deals with the methods for changing over messages, data and information in some dynamically and haphazardly planned language of characters which are mixed up and not understandable for people or notwithstanding for a machine. While doing this, it is guaranteed that authorized frameworks and humans can recuperate the original message by validating their authentication. There are different calculations and strategies are proposed for cryptography purposes. This paper focuses on examination of two individual cryptographic calculation RSA and Blowfish, how they work and what will be the impact on security and speed if these two are converged into one hybrid calculation with appropriate modification. This paper presents the comparative analysis in terms of encryption and decryption time for individual as well as hybrid algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ekka D, Kumari M Yadav N (2019) Enrichment of security using hybrid algorithm. In: International conference on computer networks and communication technologies, Springer, Singapore

    Google Scholar 

  2. Quilala TFG, Sison AM, Medina RP (2018) Securing electronic medical records using modified blowfish algorithm. Indonesian J Electr Eng Inf (IJEEI) 6(3):309–316

    Google Scholar 

  3. Kaur A, Singh G (2018) A random selective block encryption technique for secure image cryptography using blowfish algorithm. In: Proceedings of the 2nd international conference on inventive communication and computational technologies (ICICCT 2018)

    Google Scholar 

  4. Manu and Goel A (2017) In: 3rd IEEE international conference on computational intelligence and communication technology (IEEE-CICT 2017), ABES engineering college Ghaziabad, India

    Google Scholar 

  5. Vasantha R, Prasad RS (2017) An advanced security analysis by using blowfish algorithm. Int J Sci Res Comput Sci Eng Inf Technol 2017

    Google Scholar 

  6. Panda PK, Chattopadhyay S (2017) A hybrid security algorithm for RSA cryptosystem. In: International conference on advanced computing and communication system (ICACCS-2017), Coimbatore, INDIA, 2017

    Google Scholar 

  7. Mathur S, Gupta D, Goar V, Kuri M (2017) Analysis and design of enhanced RSA algorithm to improve the security. In: 3rd IEEE international conference on computational intelligence and communication technology (IEEE-CICT 2017)

    Google Scholar 

  8. Suresh M, Neema M (2016) Hardware implementation of blowfish algorithm for the secure data transmission in internet of things. In: Global colloquium in recent advancement and effectual researches in engineering, science and technology (RAEREST 2016)

    Google Scholar 

  9. Bansal VP, Singh S (2015) A hybrid data encryption technique using RSA and blowfish for cloud computing on FPGAs. In: Proceedings of 2015 RAECS. UIET Panjab University Chandigarh 21–22nd December 2015

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aman Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gupta, A., Gupta, S., Yadav, N. (2020). Enhancement of Security Using B-RSA Algorithm. In: Ranganathan, G., Chen, J., Rocha, Á. (eds) Inventive Communication and Computational Technologies. Lecture Notes in Networks and Systems, vol 89. Springer, Singapore. https://doi.org/10.1007/978-981-15-0146-3_42

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0146-3_42

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0145-6

  • Online ISBN: 978-981-15-0146-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics