Fast Implementation of the Rivest-Shamir-Adleman (RSA) Algorithm with Robust Packet Data Loss Detection Function

Authors

  • Issah Mubasir Department of Computer Science, University for Development Studies, Tamale, Ghana
  • Alhassan Abdul-Barik Department of Computer Science, University for Development Studies, Tamale, Ghana
  • Alhassan Salamudeen Department of Computer Science, University for Development Studies, Tamale, Ghana

DOI:

https://doi.org/10.51983/ajeat-2021.10.2.3058

Keywords:

Cryptography, Encryption, Decryption, Packet Loss, Public Key, Private Key, Modulus

Abstract

Encryption is the process of protecting information from unauthorized parties by converting such information into an unreadable form. Packet data is a method of transferring data, broken into bits called packets which travels over a network. Packet losses occur when packets fail to reach their destination devices as a result of network congestion, faulty routers or as a result of an attack. Encryption is the standard method for making a communication private. In sending a private message to another user, it is first encrypted (termed encipher), the intended recipient alone knows how to correctly decrypt (decipher) the message. There are several algorithms developed for the purpose of encryption which provides data security and integrity. This paper proposes the use of the Rivest-Shamir-Adleman (RSA) algorithm to implement a system for encrypting text files of any length (by breaking long messages into valid blocks and encrypting each block) capable of being transmitted using a Simple Mail Transfer Protocol (SMTP). Probable primes, 3048 bits in length are generated to be used in the generation of public, private key pairs for encryption and decryption. The proposed scheme is better because the route taken during transmission of data is recorded and packet losses are also checked for during transmission of encrypted files as compared to known state-of-the-art schemes.

References

RSA algorithm. November 2014. [Online]. Available: http://searchsecurity.target.com/definition/RSA

M. Thangavel, P. Varalakshmi, P. M. Murrali, and K. Nithya, "An Enhanced and Secured RSA Key Generation Scheme (ESRKGS)," Journal of Information Security and Applications, vol. 20, pp. 3-10, February 2015.

Y. Li, Q. Liu, and T. Li, "Design and Implementation of an Improved RSA Algorithm," in International Conference on E-Health Networking Digital Ecosystems and Technologies, 2010.

C. Sinjan, K. Vincent, "A Study and Implementation of RSA Cryptosystem," arXiv:1506.04265[cs: CR], 13 June 2015.

M. A. Islam, Md. A. Islam, N. Islam, and B. Shabnam, "A Modified and Secured RSA Public Key Cryptosystem Based On 'N' Prime Numbers," Journal of Computer and Communication, vol. 6, pp. 78-90, 2018. [Online]. Available: http://doi.org/10.4236/jcc. 2018.63006.

R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems," Communication of the Association for Computing Machinery, pp. 120-126, 1978.

B. Persis, U. Ivy and P. Mandiwa, "A Modified RSA Cryptosystem Based on 'n' Prime Numbers," International Journal of Engineering and Computer Science, vol. 1, no. 2, pp. 63-66, November 2012.

Packet loss, 6th July 2018, In Wikipedia. [Online]. Available: https://en.wikipedia.org/wiki/packet_loss.

H. Mike, "4 Causes of Packet Loss and How to Fix Them," April 28, 2015. [Online]. Available: https://www.annese.com/blog/what-causes-packet-loss.

P. Boyana, "What Is a Ping Test?," 18th April 2013. [Online]. Available: https://www.websitepulse.com/blog/what-is-ping-test.

A. B. Alhassan, K. A. Gbolade, and E. K. Bankas, "A Novel and Efficient LZN-RNS Scheme for Enhanced Information Compression and Security," International Journal of Advanced Research in Computer Engineering and Technology (IJARCET), vol. 4, no. 11, pp. 1450-4019, 2015.

Downloads

Published

06-08-2021

How to Cite

Mubasir, I., Abdul-Barik, A., & Salamudeen, A. (2021). Fast Implementation of the Rivest-Shamir-Adleman (RSA) Algorithm with Robust Packet Data Loss Detection Function. Asian Journal of Engineering and Applied Technology, 10(2), 19–24. https://doi.org/10.51983/ajeat-2021.10.2.3058