Abstract

Cryptography is used for secretly sending information. The information or given data is protected by cryptographic technique. The technique is used in Text and images. The technique is supported by a lot of algorithms. RSA is a better encryption technique for smart cards. In this paper, an image in the Aadhaar card is encrypted using the RK-RSA algorithm for better protection and confidentiality. The proposed RK-RSA algorithm is very secure for smart cards and Aadhaar cards. The better performance of the RK-RSA is evaluated based on the Avalanche Effect, Speed, Throughput, and Power Consumption. The improved performance of the RK-RSA algorithm’s experimental results is reported. The mathematical justification supporting the RK-RSA algorithm is also detailed.

Highlights

  • In the cryptosystem, two distinctive kinds of keys are used

  • The data encrypted utilizingthe usage of public-key can solely be decrypted through the private key

  • The symmetric encryption adjustments plaintext into cipher-text using a secret key and an encryption algorithm

Read more

Summary

Introduction

Two distinctive kinds of keys are used. One is the public-key and the other is a private key. Private Key is stored secretly and the public-key is recognized to all. This process is referred to as an uneven system. The data encrypted utilizingthe usage of public-key can solely be decrypted through the private key. In a public-key cryptosystem, the data are saved in secret, with no want to share the data, and no want to share the facts between two parties so that the facts are very tightly closed with lessdanger to be stolen. One essential element of the encryption process is that it nearly constantly includes both an algorithm and a key. A key is justsome other piece of facts nearly constantly a wide variety that specifies how the algorithm is applied to the plaintext to encrypt it. Even if you be aware of the method by way of which some message is encrypted, it‟s hard or impossible to decrypt it except this key

Literature Survey
Existing RSA Algorithm
Existing RK Method
Encryption Time
Decryption Time
Encryption Throughput
Execution Throughput
Avalanche effect
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call