Simple Search:

Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security


H. Belgassem, Seddeq (2004) Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security. Masters thesis, Universiti Putra Malaysia.

Abstract / Synopsis

The Internet is a powerful tool in today's ever-growing society. Computer Information and Internet security has recently become a popular subject due to the explosive growth of the Internet and the migration of commerce practices to the electronic medium. We use the Internet for many things, such as research, banking, and commercial sales. In each of this business, their needs to be save haven for which security is not compromised while companies run its business online. Thus the authenticity and privacy of the information transmitted and the data received on networked computers is of utmost importance. The deployment of network security procedures requires the implementation of Cryptographic algorithms. To facilitate this security issue, it is best to define a problem and advice a solution. The problem is computer crime via hackers,crackers, and thieves. The solution is to apply a security system upon the online system. The Science of cryptography provides one means to combat these attacks. These include encryption, decryption, authentication, and digital signature. Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. A large encryption and decryption key sizes ranging from 1024 bit to 3072 bit have been generated and used in order to provide a high level of security. The computation results show that the key generation process using the modified algorithm is around three times faster than the old implementation. Both old and new implementations are used to encrypt and decrypt different sizes and types of files using different generated key sizes. The results show that the most time lagging comes from image files, followed by PDF files, and then text files Moreover the encryption and decryption process using the modified system is around twice faster than the old system.

Download File


Download (713kB)

Additional Metadata

Item Type: Thesis (Masters)
Subject: Internet - Security measures - Case studies
Subject: Computer networks - Security measures - Case studies
Call Number: FK 2004 67
Chairman Supervisor: Associate Professor Abd Rahman Ramli, PhD
Divisions: Faculty of Engineering
Depositing User: Nur Izyan Mohd Zaki
Date Deposited: 06 May 2010 09:35
Last Modified: 27 May 2013 07:26
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item