Image To Text Encryption and Decryption Using Modified RSA Algorithm
Image To Text Encryption and Decryption Using Modified RSA Algorithm
Image To Text Encryption and Decryption Using Modified RSA Algorithm
1. Introduction
In the today’s era the internet provides communication between people and facilitates for
electronic payment, military communication and many others. This cause a major concern
for privacy, identify theft, security etc. cryptography is a standard way of safe the data over
the medium. Cryptography has been developed from the Greek word crypto which means is
hiding the information person who study and discover cryptography are called
cryptographers and study of cryptography is name by cryptanalysis. Cryptography is a part of
secret information,it is science and art of protecting theinformation over the medium. It is
process of convert readable text to unreadable text. By using the cryptography we can help
this fickle information by private document on over computer network. In a distributed
network cryptography become important part of secure communication,there are three type
of cryptography algorithm: symmetric key cryptography, Hashing, Asymmetric key
cryptography. An algorithm for cryptography that uses the same keys for both encryption of
normal text and decryption for cipher text is called symmetric key cryptography,e.g. Data
Encryption standard(DES) and Advance Encryption standard(AES).To solve the key
distribution problem Maryam Ahmed developed the concept of public key cryptography in
1976.
3. RSA Cryptosystem
RSA algorithm is the first practicable public-key cryptosystems and is mainly used for secure
data transmission. In cryptosystem, the encryption key is public and the decryption key is
secret. In RSA, this asymmetry is based on the factoring the product of two large prime
numbers that is called factoring problem. RSA stands for Ron Rivest, Adi Shamir and
Correspondence Leonard Adleman, who is the founder of this algorithm and discovered in 1977.
Charru Kalra
PG Student, Department of
Computer Science Engineering
(CSE) Prannath Panamá
Institute, Chaudharywas,
Hisar, Haryana, India
~ 170 ~
International Journal of Applied Research
Decryption
m≡ cd(mod n)
~ 171 ~
International Journal of Applied Research
as well as difficulty of detecting the private key. The RSA (India), Implementation of RSA algorithm and modified
and MREA parameters are changed one parameter at a time rsa algorithm 2017, 5.
and the others are kept fixed to study the relative importance 5. Hayder Raheem Hashima, Irtifaa Abdalkadum Neamaa.
[7]
. Image Encryption and Decryption in A Modification of
Rajan. S. Jamgekar [8] The algorithms (RSA & MREA) have ElGamal Cryptosystem in MATLAB
many important parameters affecting its level of security 6. Dipali B Khairnar, Sandeep Kadam, Dr. Patil DY.
and speed. By increasing the modulus length it is caused of College of Engineering, Ambi University of Pune,
increasing the complexity of decomposing it into its factors. Maharashtra, India, Secure RSA: Pair Wise Key
This also increases the length of private key and hence Distribution using Modified RSA Algorithm. 2016;
difficulty to detect the key. Another parameter is modular 6(4).
multiplicative inverse μ where the modular multiplicative 7. Ravi Shankar Dhakar, Amit Kumar Gupta, Prashant
inverse μ is new factor of private key, so it will be more Sharma. Modified RSA Encryption Algorithm
difficult to choose μ by trying all possible private keys (MREA), Second International Conference on
(brute force attack) hence the security also increases as well Advanced Computing & Communication Technologies,
as difficulty of detecting the private key. The RSA and 978-0-7695-4640- 7/12 $26.00 © 2012 IEEE, 2012.
MREA parameters are changed one parameter at a time and 8. Rajan S, Jamgekar, Geeta Shantanu Joshi. “File
the others are kept fixed to study the relative importance. Encryption and Decryption Using Secure RSA,
The results vary depending on type of file and size of file [11]. International Journal of Emerging Science and
A. Anagaw Ayele [9] RSA Encryption algorithm provide ngineering (IJESE) ISSN: 2319–6378, 2013; 1(4),
single public key, Less communication overload, More 9. Anagaw Ayele A, Dr. Vuda Sreenivasarao. A Modified
vulnerable to brute force attack, less security, The Public RSA Encryption Technique Based on Multiple public
key is sent once. As compare with RSA Modified RSA keys” International Journal of Innovative Research in
provide Use two public key, High communication overload, Computer and Communication Engineering. 2013; 1(4).
less vulnerable to brute force attack, more security, The 10. Sheela K, George E, Dharma Prakash Raj. InKeSi-
Public key is sent separately twice [6]. Increased Key Size Method in SRNN Public Key
Allam Mousa [10] The 1024bit InKeSi SRNN Cryptography Algorithm, IJCSMC, 2013; 2(8).
implementation the methodology for computing the modular 11. Maryam Ahmed, Baharan Sanjabi, Difo Aldiaz,
exponentiation is used. This is chosen because it can achieve Amirhossein Rezaei, Habeeb. “Diffie- Hellman and Its
an appreciable decrease of covered area and sometimes Application in Security Protocols” International Journal
increase the time- performance comparing with other of Engineering Science and Innovative Technology
methodologies. The senders encrypt the message with (IJESIT) 2012; 1(2).
Public Key of InKeSi SRNN algorithm and then the data is 12. Golle P, Staddon J, Gagne M, Rasmussen P. A Content-
signed with the Private Key of InKeSi SRNN algorithm. Driven Access Control System, Proc. Symp. Identity
The verification of digital signature is started after this and Trust on the Internet, 2008, 26-35.
process with the help of Public key at the recipient side. The 13. Rangarajan A Vasudevan, Sugata Sanyal. Jigsaw-based
decryption of the digital signature is done in this process Secure Data Transfer over Computer Networks
which eventually results in the generation of message [5]. Information Technology: Coding and Computing,.
Proceedings. ITCC 2004. International Conference on
Conclusion 2004, 1
With the implementation of RSA algorithm using 2 bit 14. Wuling Ren, Zhiqian Miao. College of Computer and
rotation, we reach a conclusion that for better security of any Information Engineering, Zhejiang Gongshang
text or image. In this work there choose an image and apply University, A Hybrid Encryption Algorithm Based on
RSA algorithm on it. Then we got encrypted image and DES and RSA in Bluetooth Communication Second
applies the 2 bit rotation algorithm on encrypted image and International Conference on Modeling, Simulation and
after that we apply Hill Cipher algorithm for better security. Visualization Methods, 2010.
Then got an encrypted image which is very difficult to 15. Neal R Wagner. The Laws of Cryptography with Java
decrypt by any other person. So, the conclusion is that the, Code, Technical Report, 2003, 78-112.
image is more secure. 16. Allam Mousa. Sensitivity of Changing the RSA
Parameters on the Complexity and Performance of the
References Algorithm, ISSN 1607 – 8926, Journal of Applied
1. Kapoor V. Institute of Engineering and Technology, Science, Asian Network for Scientific Information,
DAVV, Indore, India,” Data Encryption and 2005, 60-63.
Decryption Using Modified RSA Cryptography Based 17. Atul Kahate. Cryptography and Network Security,
on Multiple Public Keys and ‘n’prime, 1(2) ISBN-10:0-07-064823-9, Tata McGraw- Hill
2. Sunita Bhagat Phool Singh Mahila Vishwavidhalaya, Publishing Company Limited, India, Second Edition,
Khanpur Kalan, Sonepat, Image Encryption/Decryption pages 38-62,152-165,205-240.
using RSA Algorithm. 2017; 5(5):1-14. 18. Gagandeep Shahi, Charanjit Singh. Cryptography and
3. Karrar Dheiaa Mohammed Al Sabti. University Of its two Implementation Approaches International
Kufa, Iraq. A New Approach for Image Encryption in Journal of Innovative Research in Computer and
the Modified RSA Cryptosystem Using MATLAB” Communication Engineering. 2013; 1(3):668-672.
ISSN 0973-1768 2016; 12(4):3631-3640 19. Rupali Verma, Maitreyee Dutta, Renu Vig. FPGA
4. Sarika Y Bonde, Dr. Bhadade US, SSBT. College of Implementation of RSA based on Carry Save
Engineering & Technology Bambhori, Jalgaon, (M.S) Montgomery Modular Multiplication‖, IEEE
International Conference on Computational Techniques
~ 173 ~
International Journal of Applied Research
~ 174 ~