Skip to main content

Implementation of Modified RSA Approach for Encrypting and Decrypting Text Using Multi-power and K-Nearest Neighbor Algorithm

  • Conference paper
  • First Online:
Networking Communication and Data Knowledge Engineering

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 4))

  • 683 Accesses

Abstract

Security is the concept of keeping information secret by protecting it from unauthorized users. In a distributed medium, cryptography becomes crucial part for secure communication. This chapter presents literature survey of the previous work done by various researchers in the field of cryptography and implementation of modified approach with a fair comparison between traditional RSA and modified approach. The text of different sizes was encrypted and decrypted using modified approach. The simulation results are also shown with graphical description simultaneously.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. M. Thangavel, P. Varalakshmi, Mukund Murrali, K. Nithya, “An Enhanced and Secured RSA Key Generation Scheme”, Department of Information Technology, Anna University, Chennai, 2014, Elsevier.

    Google Scholar 

  2. Amare Anagaw Ayele, Dr. Vuda Sreenivasarao, “A Modified RSA Encryption Technique Based on Multiple public keys”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, Issue 4, ISSN 2320-9798, June 2013.

    Google Scholar 

  3. Ammar Odeh, Khaled Elleithy, Muneer Alshowkan, Eman Abdelfattah, 2013, “Quantum Key Distribution by Using Public Key Algorithm (RSA)”, IEEE.

    Google Scholar 

  4. Norhidayah Muhammadi, Jasni Mohamad Zaini, Md Yazid Mohd Saman, “Loop-based RSA Key Generation Algorithm using String Identity”, 13th International Conference on Control, Automation and Systems (ICCAS 2013). International Journal of Computer Applications (0975 – 8887) Volume 114 – No. 7, March 2015 33.

    Google Scholar 

  5. Ms. Ritu Patidar, Mrs. Rupali Bhartiya, 2013, “Modified RSA Cryptosystem Based on Offline Storage and Prime Number”, IEEE.

    Google Scholar 

  6. Liang Wang, Yonggui Zhang, 2011, “A New Personal Information Protection Approach Based on RSA Cryptography”, IEEE.

    Google Scholar 

  7. Malek Jakob Kakish, “Enhancing The Security Of The RSA Cryptosystem”, IJRRAS August 2011.

    Google Scholar 

  8. Dr. D.I. George Amalarethinam, J. Sai Geetha, “Enhancing Security level for Public Key Cryptosystem using MRGA”, World Congress on Computing and Communication Technologies, 978-1-4799-2876-7/13/, 2014, IEEE.

    Google Scholar 

  9. Dr. Abdulameer K. Hussain, “A Modified RSA Algorithm for Security Enhancement and Redundant Messages Elimination Using K-Nearest Neighbor Algorithm”, IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 2, Issue 1, ISSN 2348-7968, January 2015.

    Google Scholar 

  10. Xianmeng Meng, Xuexin Zheng, “Cryptanalysis of RSA with a small parameter revisited”, Information Processing Letters 115, 858-862, 2015, Elsevier.

    Google Scholar 

  11. Ritu Tripathi, Sanjay Agrawal, “Critical Analysis of RSA Public Key Cryptosystem”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 7, ISSN 2277-128X, July 2014.

    Google Scholar 

  12. Shilpi Gupta, Jaya Sharma, “A Hybrid Encryption Algorithm based on RSA and Diffie-Hellman”, International Conference on Computational Intelligence and Computing Research, 978-1-4673-1344-5/12, 2012, IEEE.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shikha Mathur .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mathur, S., Gupta, D., Goar, V., Choudhary, S. (2018). Implementation of Modified RSA Approach for Encrypting and Decrypting Text Using Multi-power and K-Nearest Neighbor Algorithm. In: Perez, G., Mishra, K., Tiwari, S., Trivedi, M. (eds) Networking Communication and Data Knowledge Engineering. Lecture Notes on Data Engineering and Communications Technologies, vol 4. Springer, Singapore. https://doi.org/10.1007/978-981-10-4600-1_21

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4600-1_21

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4599-8

  • Online ISBN: 978-981-10-4600-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics