Data Privacy and key based security using SH256

Abstract : Information security means protecting data, such as a database, from destructive forces and from the unwanted actions of unauthorized users. Information Security can be achieved by using cryptographic techniques. It is now very much demanding to develop a system to ensure better long lasting security services for message transaction over the Internet. Thus in this research paper RSA is used as Two key based cryptographic technique with a hash function SHA-2. At first, the key pairs have been generated for the users to perform the encryption and decryption.
 ? I tried to design and develop such a system based on existing technique that will help any organization for secured information sharing with message confidentiality, user authentication and data integrity ? Cryptography is the most ancient and fascinating mechanism to handle data communication over an insecure channel. Among various types of cryptography, RSA is most popular asymmetric-key cryptography and a hash function SHA-2
 ? The Internet as an open forum has created some security problems like confidentiality, integrity, and authentication. ? It may be used to provide both secrecy and digital signatures and its security is based on the intractability of the integer factorization problem. ? RSA uses exponentiation modulo a product of two large primes to encrypt and decrypt, performing both public key encryption and public key digital signature, and its security is connected to the presumed difficulty of factoring large integers, a problem for which there is no known efficient general technique
 ? The proposed information security system is composed of two parts: one is data encryption and another is data decryption. Hence assume two users namely A and B wish to communicate. ? Let A is the sender who wish to send a secured message to a specific user B. Both the transaction parties have their own key pair provided by KDC (Key Distribution Centre). ? Here RSA is used to generate this keys. Their private key should remain private but their public key is distributed by means of some method like Public key Distribution Centre (KDC), Public key Authority etc.
 ? Public key pair (e, n) is used for encryption and for decryption corresponding private key pair (d, n) is used. ? For key generation, first select two large primes: p, q, and compute the modulo factor, n = p x q and, calculate the totient factor, ? (n) = (p-1) x (q-1) ? RSA is widely used in electronic commerce protocols, and is believedto be secure given sufficiently long keys and the use of up-todate implementations
Download DOC Download PPT

We have more than 145000 Documents , PPT and Research Papers

Have a question ?

Mail us :