An amended RSA algorithm for secure communication

Nisha P. Shetty

Research output: Contribution to journalArticle

Abstract

One of the foremost challenges faced while communicating in this digitized world is security. The need for legitimate and accredited information exchange is so great that it has become one among the major research areas today. This study presents a three layer security model which expedites a safe and sound information exchange between the end users. The message from the sender is first scrambled using RSA algorithm and the cipher text is cloaked within an image. The correct stego-image is shared with the receiver only if he answers the previously shared (only between sender and receiver; undisclosed to others) question correctly. The receiver first gleans the cipher text from the stego-image and thenceforth proceeds to crack the extracted cipher text to obtain the original message.

Original languageEnglish
Pages (from-to)6189-6194
Number of pages6
JournalJournal of Engineering and Applied Sciences
Volume12
Issue numberSpecialissue2
DOIs
Publication statusPublished - 01-01-2017
Externally publishedYes

Fingerprint

Cracks
Secure communication

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Cite this

Shetty, Nisha P. / An amended RSA algorithm for secure communication. In: Journal of Engineering and Applied Sciences. 2017 ; Vol. 12, No. Specialissue2. pp. 6189-6194.
@article{8eaacf3f230643dd8d6b71566b4a4090,
title = "An amended RSA algorithm for secure communication",
abstract = "One of the foremost challenges faced while communicating in this digitized world is security. The need for legitimate and accredited information exchange is so great that it has become one among the major research areas today. This study presents a three layer security model which expedites a safe and sound information exchange between the end users. The message from the sender is first scrambled using RSA algorithm and the cipher text is cloaked within an image. The correct stego-image is shared with the receiver only if he answers the previously shared (only between sender and receiver; undisclosed to others) question correctly. The receiver first gleans the cipher text from the stego-image and thenceforth proceeds to crack the extracted cipher text to obtain the original message.",
author = "Shetty, {Nisha P.}",
year = "2017",
month = "1",
day = "1",
doi = "10.3923/jeasci.2017.6189.6194",
language = "English",
volume = "12",
pages = "6189--6194",
journal = "Journal of Engineering and Applied Sciences",
issn = "1816-949X",
publisher = "Medwell Journals",
number = "Specialissue2",

}

An amended RSA algorithm for secure communication. / Shetty, Nisha P.

In: Journal of Engineering and Applied Sciences, Vol. 12, No. Specialissue2, 01.01.2017, p. 6189-6194.

Research output: Contribution to journalArticle

TY - JOUR

T1 - An amended RSA algorithm for secure communication

AU - Shetty, Nisha P.

PY - 2017/1/1

Y1 - 2017/1/1

N2 - One of the foremost challenges faced while communicating in this digitized world is security. The need for legitimate and accredited information exchange is so great that it has become one among the major research areas today. This study presents a three layer security model which expedites a safe and sound information exchange between the end users. The message from the sender is first scrambled using RSA algorithm and the cipher text is cloaked within an image. The correct stego-image is shared with the receiver only if he answers the previously shared (only between sender and receiver; undisclosed to others) question correctly. The receiver first gleans the cipher text from the stego-image and thenceforth proceeds to crack the extracted cipher text to obtain the original message.

AB - One of the foremost challenges faced while communicating in this digitized world is security. The need for legitimate and accredited information exchange is so great that it has become one among the major research areas today. This study presents a three layer security model which expedites a safe and sound information exchange between the end users. The message from the sender is first scrambled using RSA algorithm and the cipher text is cloaked within an image. The correct stego-image is shared with the receiver only if he answers the previously shared (only between sender and receiver; undisclosed to others) question correctly. The receiver first gleans the cipher text from the stego-image and thenceforth proceeds to crack the extracted cipher text to obtain the original message.

UR - http://www.scopus.com/inward/record.url?scp=85038971291&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85038971291&partnerID=8YFLogxK

U2 - 10.3923/jeasci.2017.6189.6194

DO - 10.3923/jeasci.2017.6189.6194

M3 - Article

AN - SCOPUS:85038971291

VL - 12

SP - 6189

EP - 6194

JO - Journal of Engineering and Applied Sciences

JF - Journal of Engineering and Applied Sciences

SN - 1816-949X

IS - Specialissue2

ER -