Skip to main content

A RSA-Based Efficient Dynamic Secure Algorithm for Ensuring Data Security

  • Conference paper
  • First Online:

Part of the book series: Algorithms for Intelligent Systems ((AIS))

Abstract

The development of technology has become faster and more people are engaging with technology for various purposes. As a result, the usage of data is increasing with the rapid growth of technology. Nowadays,’s ensuring data security has become a major challenging factor for the service providers. Various techniques are implemented to increase performance and security for data communication. In this paper, a method is proposed using Ron Rivest, Shamir, and Adleman (RSA) algorithm and Diffie–Hellman (DH) algorithm. RSA algorithm is used for encryption and decryption purpose. DH is used for exchanging generated keys. Also, a password protection mechanism is applied in the proposed algorithm. The interesting part in password system is that for every decryption password, there will be a decrypted text. The system won’t tell you that you have entered wrong password. Decrypted correct text will appear only if anyone enters the correct password, which was used during encryption. The proposed algorithm is simulated and the results are presented, which represent the evaluation of algorithm within a secure and efficient way for ensuring secure data communication.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Abdalla M, Bellare M, Rogaway P (2001) The oracle Diffie-Hellman assumptions and an analysis of DHIES. In: Cryptographers track at the RSA conference. Springer, pp 143–158

    Google Scholar 

  2. Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: International conference on the theory and application of cryptology and information security. Springer, pp 452–473

    Google Scholar 

  3. Barani PS, Elizabeth NE (2015) Registration and verification of vehicles in VANET’s. In: 2015 International conference on communications and signal processing (ICCSP). IEEE, pp.1087–1092

    Google Scholar 

  4. Biryukov A, Daemen J, Lucks S, Vaudenay S (2017) Topics and research directions for symmetric cryptography. In: Proceedings of early symmetric crypto workshop, 2017. University of Luxembourg, p 4

    Google Scholar 

  5. Chaudhury P, Dhang S, Roy M, Deb S, Saha J, Mallik A, Bal S, Roy S, Sarkar MK, Kumar S et al (2017) ACAFP: asymmetric key based cryptographic algorithm using four prime numbers to secure message communication. A review on RSA algorithm. In: 2017 8th Annual industrial automation and electromechanical engineering conference (IEMECON). IEEE, pp 332–337

    Google Scholar 

  6. Choi J, Shin Y, Cho S (2018) Study on information security sharing system among the industrial IoT service and product provider. In: 2018 International conference on information networking (ICOIN). IEEE, pp 551–555

    Google Scholar 

  7. Chow S, Eisen P, Johnson H, Van Oorschot PC (2002) A white-box des implementation for DRM applications. In: ACM workshop on digital rights management. Springer, pp 1–15

    Google Scholar 

  8. Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654

    Article  MathSciNet  Google Scholar 

  9. Escala A, Herold G, Kiltz E, Rafols C, Villar J (2017) An algebraic framework for Diffie-Hellman assumptions. J Cryptol 30(1):242–288

    Article  MathSciNet  Google Scholar 

  10. Fraley JB, Cannady J (2017) The promise of machine learning in cybersecurity. In: SoutheastCon, 2017. IEEE, pp 1–6

    Google Scholar 

  11. Gonzalez C, Ben-Asher N, Morrison D (2017) Dynamics of decision making in cyber defense: using multi-agent cognitive modeling to understand cyberwar. In: Theory and models for cyber situation awareness. Springer, pp 113–127

    Google Scholar 

  12. Leu FY, Chen MH, Huang YL, Lin CC (2012) Controlling traffic lights for ambulances. In: 2012 Seventh international conference on broadband, wireless computing, communication and applications (BWCCA). IEEE, pp 462–467

    Google Scholar 

  13. Lüy E, Karatas ZY, Ergin H (2016) Comment on an enhanced and secured RSA key generation scheme (ESRKGS). J Inf Secur Appl 30:1–2

    Google Scholar 

  14. Mittal H (2014) Diffie-Hellman based smart-card multi-server authentication scheme. In: 2014 International conference on computational intelligence and communication networks (CICN). IEEE, pp 808–812

    Google Scholar 

  15. Rivest RL (1990) Cryptography. In: Algorithms and complexity. Elsevier, pp 717–755

    Google Scholar 

  16. Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126

    Article  MathSciNet  Google Scholar 

  17. Tourani R, Misra S, Mick T, Panwar G (2017) Security, privacy, and access control in information-centric networking: A survey. IEEE Commun Surv Tutor

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Himadri Shekhar Mondal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shekhar Mondal, H., Tariq Hasan, M., Mahbub Hossain, M., Mashrur Arifin, M., Saha, R. (2020). A RSA-Based Efficient Dynamic Secure Algorithm for Ensuring Data Security. In: Uddin, M., Bansal, J. (eds) Proceedings of International Joint Conference on Computational Intelligence. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-13-7564-4_54

Download citation

Publish with us

Policies and ethics