RSA algorithm with a new approach encryption and decryption message text by ascii

نویسندگان

  • Ahmad Steef
  • M. N. Shamma
  • A. Alkhatib
چکیده

In many research works, there has been an orientation to studying and developing many of the applications of public-key cryptography to secure the data while transmitting in the systems, In this paper we present an approach to encrypt and decrypt the message text according to the ASCII(American Standard Code for Information Interchange) and RSA algorithm by converting the message text into binary representation and dividing this representation to bytes(8s of 0s and 1s) and applying a bijective function between the group of those bytes and the group of characters of ASCII and then using this mechanism to be compatible with using RSA algorithm, finally, Java application was built to apply this approach directly.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Vertex Magic Total Labeling of Complete Graphs and their application for Public-Key Cryptosystem

Achieving higher level of security in message transfer over networked environment and the efficiency of a cryptographic algorithm is based on its time taken for encryption / decryption and the way it produces different cipher text from a clear text. The RSA, the widely used public key algorithm and other public key algorithms may not guarantee that the cipher text is fully secured. As an altern...

متن کامل

Knapsack Based ECC Encryption and Decryption

Elliptic Curve Cryptography provides a secure means of exchanging keys among communicating hosts using the Diffie Hellman Key Exchange algorithm. Encryption and Decryption of texts and messages have also been attempted. This paper presents the implementation of ECC by first transforming the message into an affine point on the EC, and then applying the knapsack algorithm on ECC encrypted message...

متن کامل

IJSRP, Volume 2, Issue 7, July 2012 Edition

The main target of this research paper is to propose an algorithm to implement data security using encryption and decryption method in binary sequence of original text message. The binary sequence of message is converted into DNA sequence, which consists of nucleotide letter A,T,G,C., then by using random function, which generates the sequence of random numbers for each nucleotide. The generate...

متن کامل

A New Approach of Image Steganography Technique for Information Hiding using Nearest Filling Technique

Steganography is an art that involves secret communication by using encryption and decryption from sender to receiver through message, images, videos etc. In this work, A new Approach of image Steganography technique is proposed, This proposed Work aims to, The secret information can be concealed in 0 to N Blocks of image. Hence the user can be achieved high Secure communication. This proposed ...

متن کامل

Implementation of Secured Message Transmission using DES and RSA Cryptosystem

In the past, Cryptography was used in keeping military information, diplomatic correspondence secure and in protection of national security. Nowadays, the range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against penetrations. This is used to ensure t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1610.08832  شماره 

صفحات  -

تاریخ انتشار 2016