Abstract
The development of technology has become faster and more people are engaging with technology for various purposes. As a result, the usage of data is increasing with the rapid growth of technology. Nowadays,’s ensuring data security has become a major challenging factor for the service providers. Various techniques are implemented to increase performance and security for data communication. In this paper, a method is proposed using Ron Rivest, Shamir, and Adleman (RSA) algorithm and Diffie–Hellman (DH) algorithm. RSA algorithm is used for encryption and decryption purpose. DH is used for exchanging generated keys. Also, a password protection mechanism is applied in the proposed algorithm. The interesting part in password system is that for every decryption password, there will be a decrypted text. The system won’t tell you that you have entered wrong password. Decrypted correct text will appear only if anyone enters the correct password, which was used during encryption. The proposed algorithm is simulated and the results are presented, which represent the evaluation of algorithm within a secure and efficient way for ensuring secure data communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abdalla M, Bellare M, Rogaway P (2001) The oracle Diffie-Hellman assumptions and an analysis of DHIES. In: Cryptographers track at the RSA conference. Springer, pp 143–158
Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In: International conference on the theory and application of cryptology and information security. Springer, pp 452–473
Barani PS, Elizabeth NE (2015) Registration and verification of vehicles in VANET’s. In: 2015 International conference on communications and signal processing (ICCSP). IEEE, pp.1087–1092
Biryukov A, Daemen J, Lucks S, Vaudenay S (2017) Topics and research directions for symmetric cryptography. In: Proceedings of early symmetric crypto workshop, 2017. University of Luxembourg, p 4
Chaudhury P, Dhang S, Roy M, Deb S, Saha J, Mallik A, Bal S, Roy S, Sarkar MK, Kumar S et al (2017) ACAFP: asymmetric key based cryptographic algorithm using four prime numbers to secure message communication. A review on RSA algorithm. In: 2017 8th Annual industrial automation and electromechanical engineering conference (IEMECON). IEEE, pp 332–337
Choi J, Shin Y, Cho S (2018) Study on information security sharing system among the industrial IoT service and product provider. In: 2018 International conference on information networking (ICOIN). IEEE, pp 551–555
Chow S, Eisen P, Johnson H, Van Oorschot PC (2002) A white-box des implementation for DRM applications. In: ACM workshop on digital rights management. Springer, pp 1–15
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654
Escala A, Herold G, Kiltz E, Rafols C, Villar J (2017) An algebraic framework for Diffie-Hellman assumptions. J Cryptol 30(1):242–288
Fraley JB, Cannady J (2017) The promise of machine learning in cybersecurity. In: SoutheastCon, 2017. IEEE, pp 1–6
Gonzalez C, Ben-Asher N, Morrison D (2017) Dynamics of decision making in cyber defense: using multi-agent cognitive modeling to understand cyberwar. In: Theory and models for cyber situation awareness. Springer, pp 113–127
Leu FY, Chen MH, Huang YL, Lin CC (2012) Controlling traffic lights for ambulances. In: 2012 Seventh international conference on broadband, wireless computing, communication and applications (BWCCA). IEEE, pp 462–467
Lüy E, Karatas ZY, Ergin H (2016) Comment on an enhanced and secured RSA key generation scheme (ESRKGS). J Inf Secur Appl 30:1–2
Mittal H (2014) Diffie-Hellman based smart-card multi-server authentication scheme. In: 2014 International conference on computational intelligence and communication networks (CICN). IEEE, pp 808–812
Rivest RL (1990) Cryptography. In: Algorithms and complexity. Elsevier, pp 717–755
Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
Tourani R, Misra S, Mick T, Panwar G (2017) Security, privacy, and access control in information-centric networking: A survey. IEEE Commun Surv Tutor
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Shekhar Mondal, H., Tariq Hasan, M., Mahbub Hossain, M., Mashrur Arifin, M., Saha, R. (2020). A RSA-Based Efficient Dynamic Secure Algorithm for Ensuring Data Security. In: Uddin, M.S., Bansal, J.C. (eds) Proceedings of International Joint Conference on Computational Intelligence. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-13-7564-4_54
Download citation
DOI: https://doi.org/10.1007/978-981-13-7564-4_54
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-7563-7
Online ISBN: 978-981-13-7564-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)