Implementation of Secured Message Transmission using DES and RSA Cryptosystem

In the past, Cryptography was used in keeping military information, diplomatic correspondence secure and in protection of national security. Nowadays, the range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against penetrations. This is used to ensure that the contents of a message are confidentially transmitted and would not be altered. In this paper, we have implemented a cryptosystem (encrypting/decryption) for text data using both Data Encryption Standard (DES) and Rivest-Shamir-Adleman (RSA) cryptosystem. The asymmetric algorithm was used for the key encryption and decryption process because it provides a means to deliver keys on a secure channel, while the data to be sent will be encrypted and decrypted using the symmetric algorithm. This system was designed to accomplish a number of security features such as authentication, confidentiality, integrity, and non-repudiation. Also the combination of the speed and strength of the symmetric algorithm with the robustness and key management capability of the asymmetric algorithm, thereby producing an enhanced encryption algorithm and we employed text data as our experimental data. Key words: Cryptography, encrypion, decryption, cryptosystem

[1]  Hugo Krawczyk,et al.  A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) , 1998, STOC '98.

[2]  H. F. Gaines,et al.  Cryptanalysis: A Study of Ciphers and Their Solution , 1956 .

[3]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[4]  Mousa Farajallah,et al.  Survey Paper: Cryptography Is The Science Of Information Security , 2011 .

[5]  Vincenzo Morabito,et al.  A Survey of Critical Success Factors in e-Banking , 2005 .

[6]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[7]  Mihir Bellare,et al.  Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..

[8]  S. Subasree,et al.  DESIGN OF A NEW SECURITY PROTOCOL USING HYBRID CRYPTOGRAPHY ALGORITHMS , 2010 .

[9]  곽병재,et al.  Secure communication using error correction codes , 2010 .

[10]  Asif Irshad Khan,et al.  Secure Communication using Symmetric and Asymmetric Cryptographic Techniques , 2012 .

[11]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[12]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[13]  V. N. Sastry,et al.  Cluster based multihop security protocol in MANET using ECC , 2008, TENCON 2008 - 2008 IEEE Region 10 Conference.

[14]  Paul Reid,et al.  Biometrics for Network Security , 2003 .

[15]  Donald W. Davies Advances in cryptology--EUROCRYPT '91 : Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, April 8-11, 1991 : proceedings , 1991 .

[16]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .