Software to Encrypt Messages Using Public- Key Cryptography

In this paper the development of a software to encrypt messages with asymmetric cryptography is presented. In particular, is used the RSA (Rivest, Shamir and Adleman) algorithm to encrypt alphanumeric information. The software allows to generate different public keys from two prime numbers provided by the user, the user must then select a public-key to generate the corresponding private-key. To encrypt the information, the user must provide the public-key of the recipient as well as the message to be encrypted. The generated ciphertext can be sent through an insecure channel, so that would be very difficult to be interpreted by an intruder or attacker. At the end of the communication, the recipient can decrypt the original message if provide his/her public-key and his/her corresponding private-key. Keywords—Asymmetric cryptography, Prime number, Publickey, Private-key, Software.

[1]  Leon O. Chua,et al.  Cryptography based on chaotic systems , 1997 .

[2]  Johannes A. Buchmann,et al.  Introduction to Cryptography , 2001 .

[3]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[4]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[5]  César Cruz-Hernández,et al.  Synchronization of discrete-time hyperchaotic systems: An application in communications , 2009 .

[6]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[7]  William Stallings,et al.  Cryptography and network security - principles and practice (3. ed.) , 2014 .

[8]  Jaime Muñoz Masqué,et al.  Técnicas criptográficas de protección de datos , 2004 .

[9]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[10]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[11]  César Cruz-Hernández,et al.  CRYPTOSYSTEMS BASED ON SYNCHRONIZED CHUA’S CIRCUITS , 2005 .

[12]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[13]  E. E. García-Guerrero,et al.  Synchronization of Chua’s circuits with multi-scroll attractors: Application to communication , 2009 .

[14]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[15]  R. M. López-Gutiérrez,et al.  Synchronization of chaotic solid-state Nd:YAG lasers: Application to secure communication , 2008 .