Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Study and Design of an Encryption Algorithm for Data Transmitted Over the Network by the IDEA and RSA

by Ahmed Nashaat Shakir
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 4
Year of Publication: 2017
Authors: Ahmed Nashaat Shakir
10.5120/ijca2017915586

Ahmed Nashaat Shakir . Study and Design of an Encryption Algorithm for Data Transmitted Over the Network by the IDEA and RSA. International Journal of Computer Applications. 176, 4 ( Oct 2017), 35-41. DOI=10.5120/ijca2017915586

@article{ 10.5120/ijca2017915586,
author = { Ahmed Nashaat Shakir },
title = { Study and Design of an Encryption Algorithm for Data Transmitted Over the Network by the IDEA and RSA },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2017 },
volume = { 176 },
number = { 4 },
month = { Oct },
year = { 2017 },
issn = { 0975-8887 },
pages = { 35-41 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number4/28543-2017915586/ },
doi = { 10.5120/ijca2017915586 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:41:39.821254+05:30
%A Ahmed Nashaat Shakir
%T Study and Design of an Encryption Algorithm for Data Transmitted Over the Network by the IDEA and RSA
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 4
%P 35-41
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this research, an Encryption algorithm are designed and implemented for transmitted data over a network and the program written by (c) language. Rivest-Shamir-Adleman (RSA) algorithm and International Data Encryption Algorithm (IDEA) are designed to be complex and highly confidential, where a combination of symmetric and asymmetric cryptographic algorithms is used. In addition, a special algorithm developed to generate the cryptographic key complexly and randomly, this made any data transmitted across the network, and encryption keys exchanged between network sides disobeyed for any attempt to reveal them and know their content. Thus, transmitted data will be secured across any network that use this algorithm.

References
  1. William, S. 2006. pearson prentice hall, 4th edition “cryptography and network security” .
  2. William, S. Ph.D. 1995. prentice-Hall .Inc , New Jersey, “Network and Internet work security principles and practice”.
  3. Bruce, S., John, W. and Sons, I. 1994. “Applied cryptography –Protocols” (Algorithms, and Source code in C).
  4. Aman, K., Sudesh, J. and Mr. Sunil M. 2012. "Comparative Analysis between DES and RSA Algorithm’s", International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7, pp. 386-391, July.
  5. Xin, Z. and Xiaofei T. 2011. "Research and Implementation of RSA Algorithm for Encryption and Decryption", the 6th International Forum on Strategic Technology, pp. 1118 – 1121.
  6. Yunfei, L., Qing, L. and Tong, L. 2010. Design and Implementation of an Improved RSA Algorithm, International Conference on E-Health Networking, Digital Ecosystems and Technologies.
  7. Ajay, K. and Bansal P.K. 2012. "Comparison of Various Encryption Algorithms and Techniques for Secured Data Communication in Multinode Network", International Journal of Engineering and Technology, Volume 2 No. 1, pp. 87-92, January.
  8. Popovych, R. “Cryptoanalysis of RSA system of enciphering with public key”, Modern Problems of Radio Engineering, Telecommunications and Computer Science, Vol.2, pp. 301- 302.
  9. Sriram, R. and Marimuthu, K. 2011. "Designing an algorithm with high Avalanche Effect", IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.1, pp. 106-111, January.
  10. Schneier B. 1994. ” Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish) Fast Software Encryption”, Cambridge Security Workshop Proceedings (December 1993), Springer-Verlag, pp. 191-204.
  11. Milad, B. Mohammad, R. Omid, S. Mojtaba, A. and Mohammad, S. 2010. ”Novel Approach witch is the Secure and Fast Generation of RSA Public and Private Keys on Smart-Card”, 978-1-4244-6805-8/10/$26.00 © IEEE.
  12. Basuin, S. 2011. “International data encryption algorithm (idea) – a typical illustration”, Journal of global research in computer science (JGRCS), vol. 2, no 7.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Decryption Symmetric Encryption Asymmetric Encryption RSA IDEA