SlideShare a Scribd company logo
SMT.BHAGWATI CHATURVEDI               COLLEGE OF ENGG.LokmanyaTilakJankalyanShikshanSansthaPAPERPRESENTATIONA  NETWORK  SECURITY  APPROACH :  RSA  ALGORITHMGUIDED BY –PROF. MANOJ    CHAUDARY  SIRPresented  By :TUHIN  DAS IV SEMC.S.E
CONTENTSOverview of encryption and decryption.
  Method of   Encryption &  Decryption .
  Introduction to RSA    . 
  Example of  RSA     algorithm .
  Security of RSA.
  RSA currently in use today. 
  Advantages & limitations.   
  Conclusion.
  References  .                                 Overview of encryption and decryptionEncryption : The process of converting plaintext into ciphertext.
Decryption : The process of turning ciphertext back into the original plaintext.
Encryption algorithm : Algorithm that performs various transformation operation on plaintext.

More Related Content

PPT
Data encryption, Description, DES
PPTX
Encryption algorithms
PPTX
Cryptography and network security
DOCX
Data encryption standard
PPTX
Cryptography and network security
PPTX
Presentation
PPTX
Different types of Symmetric key Cryptography
Data encryption, Description, DES
Encryption algorithms
Cryptography and network security
Data encryption standard
Cryptography and network security
Presentation
Different types of Symmetric key Cryptography

What's hot (20)

PPTX
Cryptography and network security
PPTX
Symmetric and asymmetric key
PDF
computer-security-and-cryptography-a-simple-presentation
PPTX
Cryptography and network security Nit701
PPTX
Cryptographic Algorithms: DES and RSA
PPTX
cryptography
PPTX
Cryptography
PDF
Introduction to Cryptography
PPTX
Public key Cryptography & RSA
PPTX
Information and network security 31 public key cryptography
PPTX
PPT
Data security in data communication
PDF
Information Security Cryptography ( L02- Types Cryptography)
PPTX
Encryption
PPT
Cryptography and Network Security
PPT
Network Security & Cryptography
PPTX
Introduction to Cryptography
PPTX
Data encryption
PPT
Network security
PPSX
Cryptography
Cryptography and network security
Symmetric and asymmetric key
computer-security-and-cryptography-a-simple-presentation
Cryptography and network security Nit701
Cryptographic Algorithms: DES and RSA
cryptography
Cryptography
Introduction to Cryptography
Public key Cryptography & RSA
Information and network security 31 public key cryptography
Data security in data communication
Information Security Cryptography ( L02- Types Cryptography)
Encryption
Cryptography and Network Security
Network Security & Cryptography
Introduction to Cryptography
Data encryption
Network security
Cryptography
Ad

Viewers also liked (20)

DOC
Rsa Algorithm
PDF
RSA ALGORITHM
PPT
Network Security
PDF
Network Security Applications
PPT
Network Security and Cryptography
PDF
Why Computational/Applied Mathematics?
PPTX
The Mathematics of RSA Encryption
PDF
Stream ciphers
PDF
Slideshare cost of ignoring network security presentation v4
PPT
Network Security
PPTX
Network security
PPT
Computer Graphics Introduction
PPT
Network Security
PPTX
Network Security & Ethical Hacking
PPT
PPT
Introduction to computer graphics
PPT
Network security policies
PPTX
Presentation network security
PPT
Digital Signature Recognition using RSA Algorithm
PDF
An Introduction to Kerberos
Rsa Algorithm
RSA ALGORITHM
Network Security
Network Security Applications
Network Security and Cryptography
Why Computational/Applied Mathematics?
The Mathematics of RSA Encryption
Stream ciphers
Slideshare cost of ignoring network security presentation v4
Network Security
Network security
Computer Graphics Introduction
Network Security
Network Security & Ethical Hacking
Introduction to computer graphics
Network security policies
Presentation network security
Digital Signature Recognition using RSA Algorithm
An Introduction to Kerberos
Ad

Similar to A NETWORK SECURITY APPROACH USING RSA. (20)

PDF
State of the art parallel approaches for
PPTX
Rsa Crptosystem
PDF
A Survey on Generation and Evolution of Various Cryptographic Techniques
PDF
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
PPTX
Data security using rsa
PDF
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
PPTX
Unit 7 : Network Security
PDF
Ijetcas14 355
PDF
Ch34508510
PDF
Analysis of rsa algorithm using gpu
PDF
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
PDF
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
PDF
Analysis of symmetric key cryptographic algorithms
PPTX
RSA Algorithem and information about rsa
PDF
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
PDF
Analysis of Cryptographic Algorithms
PDF
Data Encryption Standard
PPTX
Public key algorithm
PDF
Cryptography & Security
PPT
Nwc rsa
State of the art parallel approaches for
Rsa Crptosystem
A Survey on Generation and Evolution of Various Cryptographic Techniques
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Data security using rsa
Analysis of Security and Compliance using Oracle SPARC T-Series Servers: Emph...
Unit 7 : Network Security
Ijetcas14 355
Ch34508510
Analysis of rsa algorithm using gpu
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
Analysis of symmetric key cryptographic algorithms
RSA Algorithem and information about rsa
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Analysis of Cryptographic Algorithms
Data Encryption Standard
Public key algorithm
Cryptography & Security
Nwc rsa

More from Tuhin_Das (14)

PPTX
Workshop Assembler
PPT
Aop2007
DOC
PDF
Operating System
PDF
Operating System
PPTX
Clientserver Presentation
PPT
Presentation
PDF
Malware Trends Developments
PPT
Malware
DOCX
GPS DOCUMENT
PPTX
Presentation On Gps
DOC
DOCS ON NETWORK SECURITY
PPTX
Brain Machine Interfacenew
PPTX
Laser & Its Application
Workshop Assembler
Aop2007
Operating System
Operating System
Clientserver Presentation
Presentation
Malware Trends Developments
Malware
GPS DOCUMENT
Presentation On Gps
DOCS ON NETWORK SECURITY
Brain Machine Interfacenew
Laser & Its Application

A NETWORK SECURITY APPROACH USING RSA.

  • 1. SMT.BHAGWATI CHATURVEDI COLLEGE OF ENGG.LokmanyaTilakJankalyanShikshanSansthaPAPERPRESENTATIONA NETWORK SECURITY APPROACH : RSA ALGORITHMGUIDED BY –PROF. MANOJ CHAUDARY SIRPresented By :TUHIN DAS IV SEMC.S.E
  • 3. Method of Encryption & Decryption .
  • 4. Introduction to RSA    . 
  • 5. Example of RSA algorithm .
  • 7. RSA currently in use today. 
  • 8. Advantages & limitations.   
  • 10. References  .                                 Overview of encryption and decryptionEncryption : The process of converting plaintext into ciphertext.
  • 11. Decryption : The process of turning ciphertext back into the original plaintext.
  • 12. Encryption algorithm : Algorithm that performs various transformation operation on plaintext.
  • 13. Decryption algorithm : Accepts the ciphertext ,matching key and produce plaintext.
  • 14. Cryptology : Branch of mathematics which deals with both cryptography and cryptoanalysis.
  • 15. Cryptography : Branch of cryptology which deals with making communications secure.   METHOD OF ENCRYPTION & DESCRYPTIONKEY GENERATORENCRYPTEDMESSAGE
  • 16. R S ARSA is invented by Ron Rivest , AdiShamir and Leonard Adleman in 1977.
  • 17. In RSA algorithm plaintext and ciphertext are integers between 0 and n-1 for some n.
  • 18. There are two types of keys public & private keys which is a pair of keys that have been selected so that if one is used for encryption , the other is used for decryption.
  • 19. Both sender and receiver must know the value of n.
  • 20. The sender knows the value of e and only receiver knows the value of d.Example of RSA algorithm Select two prime nos. , p=17 and q=11.
  • 21. Calculate n = p*q = 17*11 = 187.
  • 22. Calculate phi (n) = (p-1)*(q-1) = 16 * 10 =160.
  • 23. Select e such that GCD(phi (n) ,e)=1 ; 1
  • 24. Determine d such that d*e ~ 1 (mod 160) and dOUTPUT:-
  • 25. SECURITY OF RSA The security of the system depends on two critical assumptions:1) Factoring is required to break the system, and Factoring is `inherently computationally intractable', or, alternatively, `factoring is hard‘ and `any approach that can be used to break the system is at least as hard as factoring'.
  • 26. RSA Currently in Use Today RSA is currently used in a wide variety of products, platforms, and industries around the world.
  • 27. It is found in many commercial software products. It is built into current operating systems by Microsoft, Apple and etc.
  • 28. In hardware, RSA can be found in secure telephones, on Ethernet network cards, and on smart cards. In addition, RSA is incorporated into all of the major protocols for secured Internet communication.
  • 29. It is also used internally in many institutions, major corporations, national laboratories, and universities. ADVANTAGES :Provides security from unauthorized user/access.
  • 30. This technique can be used in various fields 0f banking and National Security Service (NSS) .TECHNICAL ADVANTAGES & BENEFITS :ClassicSys is easy to implement in integrated circuits because:it uses only XOR and branching functions.
  • 31. no reporting arithmetic bits are needed.
  • 32. Programming can be done with a polynomial structure.
  • 33. The length of the blocks of key and data are identical and equal to 128 bits (16 bytes). CONCLUSIONIt is most popular and most efficiently used algorithm due to its stability and reliability.
  • 34. RSA is one of the standard algorithms that is used in most of the encryptions and decryption tasks.REFERENCESCryptography And Network Security - By William Stallings.Principles Of Key Management - By W .Fumy And P. Landrock.A Comparative Study Of RSA Encryption And Decryption – By R.E Ting And S.T. Barnum.
  • 35. THANK YOU .....