Abstract

In this paper, an asymmetric cryptosystem Rabin Cryptosystem has been modified by adding an advanced message authentication system with it. The proposed modified Rabin Cryptosystem is a combination of symmetric and asymmetric key cryptosystem that is hybrid cryptosystem. In the symmetric part, the sender and the receiver share a secret key between themselves which is added with the plaintext to change the plaintext. The shared secret key is fixed for a session between two users. It can be different for different sessions and different users. In the asymmetric part, the modified plaintext is encrypted using Rabin Cryptosystem. Two extra values will be sent along with the cipher text to the receiver. In the decryption process, Chinese Remainder Theorem will be applied along with the two extra values which were received with the cipher text to decipher it. Then the shared secret key between the sender and the receiver will have to be applied to get the original plaintext. Even if any intruder succeeds to decipher the cipher text, he would get the modified plaintext. As he I. Introduction Technology around us is growing very fast, and security has become the major issue in this fast growing technical world. Every moment a new threat is being produced to disrupt the security of both data and network, and to guard us against these security threats, many new security mechanisms are also being produced. Cryptography is one very ancient yet strong mechanism that saves our data from the hands of the attackers. In this paper, we have proposed a new cryptographic mechanism which is a fine combination of symmetric and asymmetric cryptosystem. Section 1 contains the detailed description of the algorithm proposed, along with the flowchart and example of encryption and decryption process. Section 2 contains some results of the encryption and decryption procedure of the Modified Rabin Cryptosystem. It also shows the performance analysis and comparisons of the Modified Rabin Cryptosystem with RSA and Rabin Cryptosystem using several parameters. Section 3 describes the contribution of this paper in the field of cryptography. In section 4 we have drawn the conclusion of this paper. Section 5 shows the acknowledgement, and in the last section we have listed the references.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call