Modified Rabin Cryptosystem through Advanced Key Distribution System
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: In this paper, an asymmetric cryptosystem Rabin Cryptosystem has been modified by adding an advanced message authentication system with it. The proposed modified Rabin Cryptosystem is a combination of symmetric and asymmetric key cryptosystem that is hybrid cryptosystem. In the symmetric part, the sender and the receiver share a secret key between themselves which is added with the plaintext to change the plaintext. The shared secret key is fixed for a session between two users. It can be different for different sessions and different users. In the asymmetric part, the modified plaintext is encrypted using Rabin Cryptosystem. Two extra values will be sent along with the cipher text to the receiver. In the decryption process, Chinese Remainder Theorem will be applied along with the two extra values which were received with the cipher text to decipher it. Then the shared secret key between the sender and the receiver will have to be applied to get the original plaintext. Even if any intruder succeeds to decipher the cipher text, he would get the modified plaintext. As he doesn’t have the shared secret key, he would not be able to retrieve the original plaintext
Authors and Affiliations
Rajdeep Chakraborty1 , Sibendu Biswas1 , JK Mandal2
Concomitant use of Dopamine agonist Bromocriptine with Glimepride Improves Insulin Sensitivity in Type II Diabetic Patients
Type -2 diabetes mellitus (T2DM) is a complex syndrome originated by a multifactorial pathogenesis. Restoration of a normal glycaemia is very difficult and requires a multiple medication with different mechanismsof actio...
Finger Vein Based Licensing And Authentication Scheme Using GSM
Finger vein authentication scheme is a non imitable biometric authentication scheme. By using this biometric authentication, we can prevent the non license from driving. So we will avoid accidents. The proposed &...
Analysis of Data Mining Tasks, Techniques, Tools, Applications And Trend
Data mining is a process which finds useful patterns from huge amount of data. It is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. It u...
Embedded Speech in Mobile Devices
Abstract: This paper is aimed in developing an Embedded Speech in mobile devices for recognizing words which will convert to voice or it can be considered as a voice activated assistant on the phone which will gone help...
Anti-spam Filter Based on Machine Learning Algorithm
We building one of the filter which help the user relief from the unwanted mails in his inbox of the mail account which is develop using the machine learning algorithm and which also contain the filter.In this we c...