SlideShare a Scribd company logo
1 of 33
DATA SECURITY IN CLOUD USING
RSAALGORITHM
-Lakshmi Teja .S
CONTENTS
 OBJECTIVE
 INTRODUCTION
 WHAT IS RSA?
 BLOCK DIAGRAM
 LITERATURE REVIEW
 CRITICAL ANALYSIS
 PROBLEM IDENTIFICATION
 PROPOSED METHOD
 PROGRESS OF THE WORK
OBJECTIVE
To ensure the security and to
optimize the time of execution of the encryption
and decryption of the cloud based data using
RSA algorithm.
INTRODUCTION
 Cloud computing is emerging technology which
gives open sources on the internet, it denotes
sharing of resources rather than having local
servers to handle applications.
 The major drawback is security in providing data
over the internet, So as to enhance the security
we use an algorithm called RSA
WHAT IS CLOUD ?
 Common implies multi-tenancy, not single or isolated tenancy
 Location-independent
 Online
 Utility implies pay-for-use pricing
 Demand implies ~infinite, ~immediate, ~invisible scalability
WHAT IS CLOUD AND ITS PROS AND CONS
LITERATURE REVIEW
S.NO Title of the paper Name of Authors Year Remarks
1
A Study And
Performance Analysis
Of RSAAlgorithm
M. Preetha,
Computer Science
& Application &
Periyar University,
India.
M. Nithya, CSA,
Periyar University,
India
2013
security aspects are
addressed.
2
RSA Public Key
Cryptography
Algorithm – A
Review
Shireen Nisha,
Mohammed Farik
2015
Strengths and
weaknesses are
addressed.
3
Data Encryption
and Decryption
Using RSA
Algorithm in a
Network
Dheeb Al Bashish,
Malik Braik,
Sulieman Bani-
Ahmad. Deot. Of
IT,
2017
Emphasizes on data
security between
computers sharing
some resources and
their private and
CLASSIFICATION OF ENCRYPTION ALGORITHMS
Encryption
Algorithms
Symmetric or
Secret Key
Encryption
Asymmetric or
Public Key
Encryption
DES
RSA
WHAT IS RSA..?
• RSA is an algorithm used by modern computers to encrypt
and decrypt messages
• It is an asymmetric cryptographic algorithm.
• It is included as a part of the web browsers from Microsoft and
Netscape.
• It is also part of Lotus Notes ,Intuit’s Quicken and many other
products
RSA CONTD
 RSA is the first practical public-key cryptosystems and is
widely used for secure data transmission
 Every number has a prime factorization and it is hard to
find if the number is very large. The time complexity is
also very high. But on the other hand the multiplication
is easy and time complexity is also not very high.
 The RSA algorithm involves three steps: key generation,
encryption and decryption
BLOCK DIAGRAM
RSA KEY SETUP
 each user generates a public/private key pair by:
 selecting two large primes at random - p, q
 computing their system modulus N=p*q
 note ø(N)=(p-1)(q-1)
 selecting at random the encryption key e
 where 1<e<ø(N), gcd(e,ø(N))=1
 solve following equation to find decryption key d
 e.d=1 mod ø(N) and 0≤d≤N
 publish their public encryption key: KU={e,N}
 keep secret private decryption key: KR={d,p,q}
RSA BLOCK DIAGRAM
CONFIDENTIALITY
 protecting the information from disclosure to
unauthorized parties
 ensures that only the right people (people
who knows the key) can read the information.
AUTHENTICATION
 The sender and receiver can confirm each other’s identity
and origin/destination of the information
RSA EXAMPLE
1. Select primes: p=17 & q=11
2. Compute n = pq =17×11=187
3. Compute ø(n)=(p–1)(q-1)=16×10=160
4. Select e : gcd(e,160)=1; choose e=7
5. Determine d: de=1 mod 160 and d < 160 Value is d=23
since 23×7=161= 10×160+1
6. Publish public key KU={7,187}
7. Keep secret private key KR={23,17,11}
RSA EXAMPLE CONTD
 Sample RSA encryption/decryption is:
 Given message M = 88 (nb. 88<187)
 Encryption:
C = 887 mod 187 = 11
 Decryption:
M = 1123 mod 187 = 88
HOW RSA WORKS
 because of Euler's Theorem:
 aø(n)mod N = 1
 where gcd(a,N)=1
 in RSA have:
 N=p.q
 ø(N)=(p-1)(q-1)
 carefully chosen e & d to be inverses mod ø(N)
 hence e.d=1+k.ø(N) for some k
 hence :
Cd = (Me)d = M1+k.ø(N) = M1.(Mø(N))q =
M1.(1)q = M1 = M mod N
PUBLIC KEY CRYPTOGRAPHY
PUBLIC KEY CHARACTERISTICS
 computationally infeasible to find private key knowing
only algorithm & public key
 computationally easy to en/decrypt messages when the
relevant (private/public) key is known
 either of the two related keys can be used for encryption
and other is used for decryption
PUBLIC KEY APPLICATIONS
 encryption/decryption(provide Confidentiality)
 digital signatures (provide authentication or proof)
RSA SECURITY PROBLEMS
 Three approaches to attack RSA:
 Brute force key search (infeasible given size of numbers)
 Mathematical attacks (based on difficulty of computing ø(N), by
factoring modulus N)
 Timing attacks (on running of decryption)
MODIFIED RSA ALGORITHM USING ‘N’ PRIME
NUMBERS
Using more than two factors in the modulus of RSA
cryptosystem that the arthimetic advantage that the private key
computations can be speeded up using Chinese remaindering.
At the same time with the proper choice of parameters one does
not have to work with a larger modulus to achieve the same level
of security in terms of the difficulty of integer factorization
problem
ADVANTAGES OF RSA
•
•
Very fast, very simple encryption and verification.
Easier to implement than Elliptical curve
cryptography(ECC).
•
•
Easier to understand.
Widely deployed, better industry support.
DISADVANTAGES OF RSA
•
•
Very slow key generation.
Slow decryption, which is slightly tricky to implement
securely.
• Two-part key is vulnerable to GCD attack if poorly
implemented.
CRITICAL ANALYSIS
 Though the execution time of the RSA is more it is widely applied in
many fields because it provides more security as it adds complexity for
the intruders and also provides authentication .
 It is used:
-to protect web traffic, in the SSL protocol
(Security Socket Layer),
-to guarantee email privacy and authenticity in
Pretty good privacy.
- to guarantee remote connection in SSH(Secure Shell).
-also in digital data information and telephone security
PROBLEM IDENTIFICATION
 At present, 1024 bit keys are considered weak, 2048
bit keys are probably secure enough for most
purposes, and 40 bit keys are likely to remain
secure for decades.
 RSA is very vulnerable to chosen plaintext attacks.
There is also a new timing attack that can be used to
break many implementations of RSA.
 The RSA algorithm is believed to be safe when used
properly, but one must be very careful when using it
to avoid these attacks.
PROPOSAL METHOD
 To improve the Data Security and to decrease the
execution time for the existing algorithm by increasing the
length of the key.
PROGRESS OF THE WORK
 Encryption of the plain text using RSA algorithm
using MATLAB software has been performed
successfully.
 The comparison of the time of execution for various
plain texts.
FUTURE SCOPE
The future will focusing on –
More strong security algorithms and implement a better
version of RSA .
New security techniques need to be developed and older
security techniques needed to be radically tweaked to be able
to work with the clouds architecture.
As the development of cloud computing technology is still
under R&D, there will be more better understanding of
the design challenges of cloud computing, and pave the way
for further research in this area.
CONCLUSION
 Security is a major requirement in cloud computing
while we talk about data storage. There are number of
existing techniques used to implement security in cloud.
So in this presentation, It discussed the popularly
used asymmetric algorithms of cloud encryption
techniques.
REFERENCES
 Coutinho, S. C. The Mathematics of Ciphers: Number Theory and RSA Cryptography. Wellesley,
MA: A K Peters, 1999.
 Flannery, S. and Flannery, D. In Code: A Mathematical Journey. Profile Books, 2000.
 Honsberger, R. Mathematical Gems III. Washington, DC: Math. Assoc. Amer., pp. 166-173, 1985.
 Meijer, A. R. "Groups, Factoring, and Cryptography." Math. Mag. 69, 103-109, 1996.
 Rivest, R. L. "Remarks on a Proposed Cryptanalytic Attack on the MIT Public-Key
Cryptosystem." Cryptologia 2, 62-65, 1978.
 Rivest, R.; Shamir, A.; and Adleman, L. "A Method for Obtaining Digital Signatures and Public-
Key Cryptosystems." MIT Memo MIT/LCS/TM-82, 1977.
 Rivest, R.; Shamir, A.; and Adleman, L. "A Method for Obtaining Digital Signatures and Public
Key Cryptosystems." Comm. ACM 21, 120-126, 1978.
 RSA Laboratories. "The RSA Factoring
Challenge" http://www.rsa.com/rsalabs/node.asp?id=2092.
 Simmons, G. J. and Norris, M. J. "Preliminary Comments on the MIT Public-Key
Cryptosystem." Cryptologia 1, 406-414, 1977.
RESULTS
SNO P Q FILE SIZE TIME TAKEN
1 53 59 4KB 3.05 s
2 1021 1031 8KB 37s
3 10163 10169 8KB 1.83 s
SNO P Q R FILE SIZE TIME
TAKEN
1 5 6 7 12KB 0.004s
2 51 53 61 12KB 2.14s
3 10163 10169 10177 12KB 0.0003s
Data security using rsa

More Related Content

What's hot

Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
patisa
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
Rohit Bhat
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 

What's hot (20)

MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Advanced cryptography and implementation
Advanced cryptography and implementationAdvanced cryptography and implementation
Advanced cryptography and implementation
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
ElGamal Encryption Algoritham.pptx
ElGamal Encryption Algoritham.pptxElGamal Encryption Algoritham.pptx
ElGamal Encryption Algoritham.pptx
 
Network security and cryptography
Network security and cryptographyNetwork security and cryptography
Network security and cryptography
 
Diffie hellman key exchange algorithm
Diffie hellman key exchange algorithmDiffie hellman key exchange algorithm
Diffie hellman key exchange algorithm
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
3 public key cryptography
3 public key cryptography3 public key cryptography
3 public key cryptography
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)
 
Ssl and tls
Ssl and tlsSsl and tls
Ssl and tls
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 

Similar to Data security using rsa

Similar to Data security using rsa (20)

Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
 
Rsa
RsaRsa
Rsa
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.ppt
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
 
Ch09
Ch09Ch09
Ch09
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsa
 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
 
Data Security With Colors Using Rsa
Data Security With Colors Using RsaData Security With Colors Using Rsa
Data Security With Colors Using Rsa
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Rsa
RsaRsa
Rsa
 
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptxRivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
Presentation
PresentationPresentation
Presentation
 
CRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfCRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdf
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 

Recently uploaded

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Data security using rsa

  • 1. DATA SECURITY IN CLOUD USING RSAALGORITHM -Lakshmi Teja .S
  • 2. CONTENTS  OBJECTIVE  INTRODUCTION  WHAT IS RSA?  BLOCK DIAGRAM  LITERATURE REVIEW  CRITICAL ANALYSIS  PROBLEM IDENTIFICATION  PROPOSED METHOD  PROGRESS OF THE WORK
  • 3. OBJECTIVE To ensure the security and to optimize the time of execution of the encryption and decryption of the cloud based data using RSA algorithm.
  • 4. INTRODUCTION  Cloud computing is emerging technology which gives open sources on the internet, it denotes sharing of resources rather than having local servers to handle applications.  The major drawback is security in providing data over the internet, So as to enhance the security we use an algorithm called RSA
  • 5. WHAT IS CLOUD ?  Common implies multi-tenancy, not single or isolated tenancy  Location-independent  Online  Utility implies pay-for-use pricing  Demand implies ~infinite, ~immediate, ~invisible scalability
  • 6. WHAT IS CLOUD AND ITS PROS AND CONS
  • 7. LITERATURE REVIEW S.NO Title of the paper Name of Authors Year Remarks 1 A Study And Performance Analysis Of RSAAlgorithm M. Preetha, Computer Science & Application & Periyar University, India. M. Nithya, CSA, Periyar University, India 2013 security aspects are addressed. 2 RSA Public Key Cryptography Algorithm – A Review Shireen Nisha, Mohammed Farik 2015 Strengths and weaknesses are addressed. 3 Data Encryption and Decryption Using RSA Algorithm in a Network Dheeb Al Bashish, Malik Braik, Sulieman Bani- Ahmad. Deot. Of IT, 2017 Emphasizes on data security between computers sharing some resources and their private and
  • 8. CLASSIFICATION OF ENCRYPTION ALGORITHMS Encryption Algorithms Symmetric or Secret Key Encryption Asymmetric or Public Key Encryption DES RSA
  • 9. WHAT IS RSA..? • RSA is an algorithm used by modern computers to encrypt and decrypt messages • It is an asymmetric cryptographic algorithm. • It is included as a part of the web browsers from Microsoft and Netscape. • It is also part of Lotus Notes ,Intuit’s Quicken and many other products
  • 10. RSA CONTD  RSA is the first practical public-key cryptosystems and is widely used for secure data transmission  Every number has a prime factorization and it is hard to find if the number is very large. The time complexity is also very high. But on the other hand the multiplication is easy and time complexity is also not very high.  The RSA algorithm involves three steps: key generation, encryption and decryption
  • 12. RSA KEY SETUP  each user generates a public/private key pair by:  selecting two large primes at random - p, q  computing their system modulus N=p*q  note ø(N)=(p-1)(q-1)  selecting at random the encryption key e  where 1<e<ø(N), gcd(e,ø(N))=1  solve following equation to find decryption key d  e.d=1 mod ø(N) and 0≤d≤N  publish their public encryption key: KU={e,N}  keep secret private decryption key: KR={d,p,q}
  • 14. CONFIDENTIALITY  protecting the information from disclosure to unauthorized parties  ensures that only the right people (people who knows the key) can read the information.
  • 15. AUTHENTICATION  The sender and receiver can confirm each other’s identity and origin/destination of the information
  • 16. RSA EXAMPLE 1. Select primes: p=17 & q=11 2. Compute n = pq =17×11=187 3. Compute ø(n)=(p–1)(q-1)=16×10=160 4. Select e : gcd(e,160)=1; choose e=7 5. Determine d: de=1 mod 160 and d < 160 Value is d=23 since 23×7=161= 10×160+1 6. Publish public key KU={7,187} 7. Keep secret private key KR={23,17,11}
  • 17. RSA EXAMPLE CONTD  Sample RSA encryption/decryption is:  Given message M = 88 (nb. 88<187)  Encryption: C = 887 mod 187 = 11  Decryption: M = 1123 mod 187 = 88
  • 18. HOW RSA WORKS  because of Euler's Theorem:  aø(n)mod N = 1  where gcd(a,N)=1  in RSA have:  N=p.q  ø(N)=(p-1)(q-1)  carefully chosen e & d to be inverses mod ø(N)  hence e.d=1+k.ø(N) for some k  hence : Cd = (Me)d = M1+k.ø(N) = M1.(Mø(N))q = M1.(1)q = M1 = M mod N
  • 20. PUBLIC KEY CHARACTERISTICS  computationally infeasible to find private key knowing only algorithm & public key  computationally easy to en/decrypt messages when the relevant (private/public) key is known  either of the two related keys can be used for encryption and other is used for decryption
  • 21. PUBLIC KEY APPLICATIONS  encryption/decryption(provide Confidentiality)  digital signatures (provide authentication or proof)
  • 22. RSA SECURITY PROBLEMS  Three approaches to attack RSA:  Brute force key search (infeasible given size of numbers)  Mathematical attacks (based on difficulty of computing ø(N), by factoring modulus N)  Timing attacks (on running of decryption)
  • 23. MODIFIED RSA ALGORITHM USING ‘N’ PRIME NUMBERS Using more than two factors in the modulus of RSA cryptosystem that the arthimetic advantage that the private key computations can be speeded up using Chinese remaindering. At the same time with the proper choice of parameters one does not have to work with a larger modulus to achieve the same level of security in terms of the difficulty of integer factorization problem
  • 24. ADVANTAGES OF RSA • • Very fast, very simple encryption and verification. Easier to implement than Elliptical curve cryptography(ECC). • • Easier to understand. Widely deployed, better industry support. DISADVANTAGES OF RSA • • Very slow key generation. Slow decryption, which is slightly tricky to implement securely. • Two-part key is vulnerable to GCD attack if poorly implemented.
  • 25. CRITICAL ANALYSIS  Though the execution time of the RSA is more it is widely applied in many fields because it provides more security as it adds complexity for the intruders and also provides authentication .  It is used: -to protect web traffic, in the SSL protocol (Security Socket Layer), -to guarantee email privacy and authenticity in Pretty good privacy. - to guarantee remote connection in SSH(Secure Shell). -also in digital data information and telephone security
  • 26. PROBLEM IDENTIFICATION  At present, 1024 bit keys are considered weak, 2048 bit keys are probably secure enough for most purposes, and 40 bit keys are likely to remain secure for decades.  RSA is very vulnerable to chosen plaintext attacks. There is also a new timing attack that can be used to break many implementations of RSA.  The RSA algorithm is believed to be safe when used properly, but one must be very careful when using it to avoid these attacks.
  • 27. PROPOSAL METHOD  To improve the Data Security and to decrease the execution time for the existing algorithm by increasing the length of the key.
  • 28. PROGRESS OF THE WORK  Encryption of the plain text using RSA algorithm using MATLAB software has been performed successfully.  The comparison of the time of execution for various plain texts.
  • 29. FUTURE SCOPE The future will focusing on – More strong security algorithms and implement a better version of RSA . New security techniques need to be developed and older security techniques needed to be radically tweaked to be able to work with the clouds architecture. As the development of cloud computing technology is still under R&D, there will be more better understanding of the design challenges of cloud computing, and pave the way for further research in this area.
  • 30. CONCLUSION  Security is a major requirement in cloud computing while we talk about data storage. There are number of existing techniques used to implement security in cloud. So in this presentation, It discussed the popularly used asymmetric algorithms of cloud encryption techniques.
  • 31. REFERENCES  Coutinho, S. C. The Mathematics of Ciphers: Number Theory and RSA Cryptography. Wellesley, MA: A K Peters, 1999.  Flannery, S. and Flannery, D. In Code: A Mathematical Journey. Profile Books, 2000.  Honsberger, R. Mathematical Gems III. Washington, DC: Math. Assoc. Amer., pp. 166-173, 1985.  Meijer, A. R. "Groups, Factoring, and Cryptography." Math. Mag. 69, 103-109, 1996.  Rivest, R. L. "Remarks on a Proposed Cryptanalytic Attack on the MIT Public-Key Cryptosystem." Cryptologia 2, 62-65, 1978.  Rivest, R.; Shamir, A.; and Adleman, L. "A Method for Obtaining Digital Signatures and Public- Key Cryptosystems." MIT Memo MIT/LCS/TM-82, 1977.  Rivest, R.; Shamir, A.; and Adleman, L. "A Method for Obtaining Digital Signatures and Public Key Cryptosystems." Comm. ACM 21, 120-126, 1978.  RSA Laboratories. "The RSA Factoring Challenge" http://www.rsa.com/rsalabs/node.asp?id=2092.  Simmons, G. J. and Norris, M. J. "Preliminary Comments on the MIT Public-Key Cryptosystem." Cryptologia 1, 406-414, 1977.
  • 32. RESULTS SNO P Q FILE SIZE TIME TAKEN 1 53 59 4KB 3.05 s 2 1021 1031 8KB 37s 3 10163 10169 8KB 1.83 s SNO P Q R FILE SIZE TIME TAKEN 1 5 6 7 12KB 0.004s 2 51 53 61 12KB 2.14s 3 10163 10169 10177 12KB 0.0003s