Improved key of RSA Algorithm Generated from The image based on SHA256 Algorithm
Keywords:RSA, SHA256, Cryptography, Decryption, Encryption
At the present time, information security has become very necessary and is considered a very difficult problem in the event that it is exposed by the attackers and becomes easy and available to them. Therefore, data protection and non-disclosure to unauthorized persons are required to do so. The solution is to encrypt it and there are a large number of encryption algorithms in use. In this paper, both the RSA generic encryption algorithm and the hash algorithm known as SHA256 were used, in which the RSA algorithm was improved by generating the algorithm keys from an image generated with the SHA256 hashing algorithm. Where two keys are formed, one of which is public for encryption and is available and the other is a private key that is not disclosed only to the person who has access to the message, and effective encryption of the data was produced in addition to the retrieval of the original text. The proposed method has been programmed in VisualBaic.Net 2012 language.
N. Bisht and S. Singh, “A Comparative Study of Some Symmetric and Asymmetric Key Cryptography Algorithms”, Int. J. Innovative Res. Sci. Eng. Technol., Vol. 4, no. 3, pp.1028-1031, Mar. 2015.
F. Maqsood, M. Ahmed, M. M. Ali, and M. A. Shah, “Cryptography: A Comparative Analysis for Modern Techniques”, Int. J. Adv. Comput. Sci. Appl., Vol. 8, no. 6, pp.442-448, 2017.
P. Verma, J. Shekhar, Preety, and A. Asthana, “A Survey for Performance Analysis Various Cryptography Techniques Digital Contents”, Int. J. Comput. Sci. Mobile Comput., Vol.4, no.1, pp. 522-531, Jan. 2015.
Verma, P. Guha, and S. Mishra, “Comparative Study of Different Cryptographic Algorithms”, Int. J. Emerg. Trends Technol. Comput. Sci., Vol. 5, no. 2, pp. 58-63, Mar-Apr 2016.
K. Uma, G. Karthik, and R. V. Prasath, “A comparative analysis of Symmetric and Asymmetric key cryptography”, J. Chem. Pharm. Sci., Vol. 10, no. 1, pp.324-326, Jan-Mar 2017.
E. Swathi, G. Vivek, and G. S. Rani, “Role of Hash Function in Cryptography”, in National Conference on Computer Security, Image Processing, Graphics, Mobility and Analytics, India, 2016, pp.10-13.
K. Keerthi and B. Surendiran, “Elliptic Curve Cryptography for Secured Text Encryption”, in International Conference on Circuits Power and Computing Technologies, India, 2017.
] A Shankar and G Ayappan, “ Medical Image Authentication Using RSA Algorithm with SVD Techniques”, International Journal of Trend in Research and Development, Volume 4(6), ISSN: 2394-9333 www.ijtrd.com, IJTRD | Nov-Dec 2017 Available Online@www.ijtrd.com
R. Roshdy1 , M. Fouad2 , M. Aboul-Dahab 3, “DESIGN AND IMPLEMENTATION A NEW SECURITY HASH ALGORITHM BASED ON MD5 AND SHA-256”, International Journal of Engineering Sciences & Emerging Technologies, August 2013. ISSN: 2231 – 6604 Volume 6, Issue 1, pp: 29-36 .
How to Cite
Copyright (c) 2021 Rasha Thamer Shawe
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.