z-logo
open-access-imgOpen Access
RSA Encryption and Decryption System
Author(s) -
Neelam Bansal,
Sukhdeep Singh
Publication year - 2020
Publication title -
international journal of scientific research in computer science, engineering and information technology
Language(s) - English
Resource type - Journals
ISSN - 2456-3307
DOI - 10.32628/cseit206520
Subject(s) - encryption , computer science , public key cryptography , cryptography , id based cryptography , communication source , key (lock) , computer network , computer security , key generation , symmetric key algorithm , on the fly encryption , key distribution
For communication in the wireless networking, transmission of data over network sometimes is not safe. In such case security of network is one of the essential aspect in computer networking. Cryptography is antechnique of transforming an plaindata into encrypted one, and then retransform that encrypted data back to its plain (original) form. In this we authenticate the sender to whom you want to send that data file. There are two different techniques of cryptography, symmetric key cryptography (called public-key cryptography) algorithms and asymmetric key cryptography (called public-key cryptography) algorithms. There are also various algorithms for encrypted data using either public or private key or both. This paper describes RSA algorithm which first convert our data into other form and then encrypt it using RSA public key encryption at sender side & at receiver side, first it authenticate the receiver then decrypt the data/ file and convert into original form.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here