Open Access   Article Go Back

Encrypted RSA Public Key Sharing By Using Image Pixel Color Value

Sarika Khatarkar1 , Rachana Kamble2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-5 , Page no. 231-235, May-2015

Online published on May 30, 2015

Copyright © Sarika Khatarkar , Rachana Kamble . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sarika Khatarkar , Rachana Kamble, “Encrypted RSA Public Key Sharing By Using Image Pixel Color Value,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.231-235, 2015.

MLA Style Citation: Sarika Khatarkar , Rachana Kamble "Encrypted RSA Public Key Sharing By Using Image Pixel Color Value." International Journal of Computer Sciences and Engineering 3.5 (2015): 231-235.

APA Style Citation: Sarika Khatarkar , Rachana Kamble, (2015). Encrypted RSA Public Key Sharing By Using Image Pixel Color Value. International Journal of Computer Sciences and Engineering, 3(5), 231-235.

BibTex Style Citation:
@article{Khatarkar_2015,
author = {Sarika Khatarkar , Rachana Kamble},
title = {Encrypted RSA Public Key Sharing By Using Image Pixel Color Value},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2015},
volume = {3},
Issue = {5},
month = {5},
year = {2015},
issn = {2347-2693},
pages = {231-235},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=510},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=510
TI - Encrypted RSA Public Key Sharing By Using Image Pixel Color Value
T2 - International Journal of Computer Sciences and Engineering
AU - Sarika Khatarkar , Rachana Kamble
PY - 2015
DA - 2015/05/30
PB - IJCSE, Indore, INDIA
SP - 231-235
IS - 5
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2446 2388 downloads 2585 downloads
  
  
           

Abstract

RSA algorithm is extensively used in the popular implementations of Public Key Infrastructures. In such a cryptosystem, the encryption key is public and differs from the decryption key which is kept secret. One key is used for encryption and the other corresponding key is used for decryption. No other key can decrypt the message. In this paper an approach which is more secure than original RSA algorithm has presented, which is used for digital signatures and encryption in public key cryptography. This approach eliminates the need to transfer e. because in this approach before transfer e is encrypting with any pixel color value of any image.

Key-Words / Index Term

RSA, Public Key, Pixel color value

References

[1]. Amare Anagaw Ayele, Dr. Vuda Sreenivasarao, June 2013, “A Modified RSA Encryption Technique Based on Multiple public keys”, International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 4.
[2]. Liang Wang, Yonggui Zhang, 2011, “A New Personal Information Protection Approach Based on RSA Cryptography”, IEEE.
[3]. Ammar Odeh, Khaled Elleithy, Muneer Alshowkan, Eman Abdelfattah, 2013, “Quantum Key Distribution by Using Public Key Algorithm(RSA)”, IEEE.
[4]. Norhidayah Muhammadi, Jasni Mohamad Zaini, Md Yazid Mohd Saman, “Loop-based RSA Key Generation Algorithm using String Identity”, 13th International Conference on Control, Automation and Systems (ICCAS 2013).
[5]. Ms. Ritu Patidar, Mrs. Rupali Bhartiya, 2013, “Modified RSA Cryptosystem Based on Offline Storage and Prime Number”, IEEE.
[6]Malek Jakob Kakish, “Enhancing The Security Of The Rsa Cryptosystem”, Ijrras August 2011.
[7] KetuFile White Papers “Symmetric vs. Asymmetric Encryption “, a division of Midwest research corporation.
[8] RSA Laboratories : Technical Notes and Papers.
[9] A fast implementation of the RSA algorithm using the GNU MP library. By Rajorshi Biswas,Shibdas Bandyopadhyay,Anirban Banerjee, IIIT – Calcutta.
[10] Sensitivity of Changing the RSA Parameters on the Complexity and Performance of the Algorithm By Allam Mousa ;Journal of Applied Science 5 (1) :60-63,2005 ISSN 1607 – 8926.Asian Network for Scientific Information.