SlideShare a Scribd company logo
1 of 33
DATA SECURITY IN CLOUD USING
RSAALGORITHM
-Lakshmi Teja .S
CONTENTS
 OBJECTIVE
 INTRODUCTION
 WHAT IS RSA?
 BLOCK DIAGRAM
 LITERATURE REVIEW
 CRITICAL ANALYSIS
 PROBLEM IDENTIFICATION
 PROPOSED METHOD
 PROGRESS OF THE WORK
OBJECTIVE
To ensure the security and to
optimize the time of execution of the encryption
and decryption of the cloud based data using
RSA algorithm.
INTRODUCTION
 Cloud computing is emerging technology which
gives open sources on the internet, it denotes
sharing of resources rather than having local
servers to handle applications.
 The major drawback is security in providing data
over the internet, So as to enhance the security
we use an algorithm called RSA
WHAT IS CLOUD ?
 Common implies multi-tenancy, not single or isolated tenancy
 Location-independent
 Online
 Utility implies pay-for-use pricing
 Demand implies ~infinite, ~immediate, ~invisible scalability
WHAT IS CLOUD AND ITS PROS AND CONS
LITERATURE REVIEW
S.NO Title of the paper Name of Authors Year Remarks
1
A Study And
Performance Analysis
Of RSAAlgorithm
M. Preetha,
Computer Science
& Application &
Periyar University,
India.
M. Nithya, CSA,
Periyar University,
India
2013
security aspects are
addressed.
2
RSA Public Key
Cryptography
Algorithm – A
Review
Shireen Nisha,
Mohammed Farik
2015
Strengths and
weaknesses are
addressed.
3
Data Encryption
and Decryption
Using RSA
Algorithm in a
Network
Dheeb Al Bashish,
Malik Braik,
Sulieman Bani-
Ahmad. Deot. Of
IT,
2017
Emphasizes on data
security between
computers sharing
some resources and
their private and
CLASSIFICATION OF ENCRYPTION ALGORITHMS
Encryption
Algorithms
Symmetric or
Secret Key
Encryption
Asymmetric or
Public Key
Encryption
DES
RSA
WHAT IS RSA..?
• RSA is an algorithm used by modern computers to encrypt
and decrypt messages
• It is an asymmetric cryptographic algorithm.
• It is included as a part of the web browsers from Microsoft and
Netscape.
• It is also part of Lotus Notes ,Intuit’s Quicken and many other
products
RSA CONTD
 RSA is the first practical public-key cryptosystems and is
widely used for secure data transmission
 Every number has a prime factorization and it is hard to
find if the number is very large. The time complexity is
also very high. But on the other hand the multiplication
is easy and time complexity is also not very high.
 The RSA algorithm involves three steps: key generation,
encryption and decryption
BLOCK DIAGRAM
RSA KEY SETUP
 each user generates a public/private key pair by:
 selecting two large primes at random - p, q
 computing their system modulus N=p*q
 note ø(N)=(p-1)(q-1)
 selecting at random the encryption key e
 where 1<e<ø(N), gcd(e,ø(N))=1
 solve following equation to find decryption key d
 e.d=1 mod ø(N) and 0≤d≤N
 publish their public encryption key: KU={e,N}
 keep secret private decryption key: KR={d,p,q}
RSA BLOCK DIAGRAM
CONFIDENTIALITY
 protecting the information from disclosure to
unauthorized parties
 ensures that only the right people (people
who knows the key) can read the information.
AUTHENTICATION
 The sender and receiver can confirm each other’s identity
and origin/destination of the information
RSA EXAMPLE
1. Select primes: p=17 & q=11
2. Compute n = pq =17×11=187
3. Compute ø(n)=(p–1)(q-1)=16×10=160
4. Select e : gcd(e,160)=1; choose e=7
5. Determine d: de=1 mod 160 and d < 160 Value is d=23
since 23×7=161= 10×160+1
6. Publish public key KU={7,187}
7. Keep secret private key KR={23,17,11}
RSA EXAMPLE CONTD
 Sample RSA encryption/decryption is:
 Given message M = 88 (nb. 88<187)
 Encryption:
C = 887 mod 187 = 11
 Decryption:
M = 1123 mod 187 = 88
HOW RSA WORKS
 because of Euler's Theorem:
 aø(n)mod N = 1
 where gcd(a,N)=1
 in RSA have:
 N=p.q
 ø(N)=(p-1)(q-1)
 carefully chosen e & d to be inverses mod ø(N)
 hence e.d=1+k.ø(N) for some k
 hence :
Cd = (Me)d = M1+k.ø(N) = M1.(Mø(N))q =
M1.(1)q = M1 = M mod N
PUBLIC KEY CRYPTOGRAPHY
PUBLIC KEY CHARACTERISTICS
 computationally infeasible to find private key knowing
only algorithm & public key
 computationally easy to en/decrypt messages when the
relevant (private/public) key is known
 either of the two related keys can be used for encryption
and other is used for decryption
PUBLIC KEY APPLICATIONS
 encryption/decryption(provide Confidentiality)
 digital signatures (provide authentication or proof)
RSA SECURITY PROBLEMS
 Three approaches to attack RSA:
 Brute force key search (infeasible given size of numbers)
 Mathematical attacks (based on difficulty of computing ø(N), by
factoring modulus N)
 Timing attacks (on running of decryption)
MODIFIED RSA ALGORITHM USING ‘N’ PRIME
NUMBERS
Using more than two factors in the modulus of RSA
cryptosystem that the arthimetic advantage that the private key
computations can be speeded up using Chinese remaindering.
At the same time with the proper choice of parameters one does
not have to work with a larger modulus to achieve the same level
of security in terms of the difficulty of integer factorization
problem
ADVANTAGES OF RSA
•
•
Very fast, very simple encryption and verification.
Easier to implement than Elliptical curve
cryptography(ECC).
•
•
Easier to understand.
Widely deployed, better industry support.
DISADVANTAGES OF RSA
•
•
Very slow key generation.
Slow decryption, which is slightly tricky to implement
securely.
• Two-part key is vulnerable to GCD attack if poorly
implemented.
CRITICAL ANALYSIS
 Though the execution time of the RSA is more it is widely applied in
many fields because it provides more security as it adds complexity for
the intruders and also provides authentication .
 It is used:
-to protect web traffic, in the SSL protocol
(Security Socket Layer),
-to guarantee email privacy and authenticity in
Pretty good privacy.
- to guarantee remote connection in SSH(Secure Shell).
-also in digital data information and telephone security
PROBLEM IDENTIFICATION
 At present, 1024 bit keys are considered weak, 2048
bit keys are probably secure enough for most
purposes, and 40 bit keys are likely to remain
secure for decades.
 RSA is very vulnerable to chosen plaintext attacks.
There is also a new timing attack that can be used to
break many implementations of RSA.
 The RSA algorithm is believed to be safe when used
properly, but one must be very careful when using it
to avoid these attacks.
PROPOSAL METHOD
 To improve the Data Security and to decrease the
execution time for the existing algorithm by increasing the
length of the key.
PROGRESS OF THE WORK
 Encryption of the plain text using RSA algorithm
using MATLAB software has been performed
successfully.
 The comparison of the time of execution for various
plain texts.
FUTURE SCOPE
The future will focusing on –
More strong security algorithms and implement a better
version of RSA .
New security techniques need to be developed and older
security techniques needed to be radically tweaked to be able
to work with the clouds architecture.
As the development of cloud computing technology is still
under R&D, there will be more better understanding of
the design challenges of cloud computing, and pave the way
for further research in this area.
CONCLUSION
 Security is a major requirement in cloud computing
while we talk about data storage. There are number of
existing techniques used to implement security in cloud.
So in this presentation, It discussed the popularly
used asymmetric algorithms of cloud encryption
techniques.
REFERENCES
 Coutinho, S. C. The Mathematics of Ciphers: Number Theory and RSA Cryptography. Wellesley,
MA: A K Peters, 1999.
 Flannery, S. and Flannery, D. In Code: A Mathematical Journey. Profile Books, 2000.
 Honsberger, R. Mathematical Gems III. Washington, DC: Math. Assoc. Amer., pp. 166-173, 1985.
 Meijer, A. R. "Groups, Factoring, and Cryptography." Math. Mag. 69, 103-109, 1996.
 Rivest, R. L. "Remarks on a Proposed Cryptanalytic Attack on the MIT Public-Key
Cryptosystem." Cryptologia 2, 62-65, 1978.
 Rivest, R.; Shamir, A.; and Adleman, L. "A Method for Obtaining Digital Signatures and Public-
Key Cryptosystems." MIT Memo MIT/LCS/TM-82, 1977.
 Rivest, R.; Shamir, A.; and Adleman, L. "A Method for Obtaining Digital Signatures and Public
Key Cryptosystems." Comm. ACM 21, 120-126, 1978.
 RSA Laboratories. "The RSA Factoring
Challenge" http://www.rsa.com/rsalabs/node.asp?id=2092.
 Simmons, G. J. and Norris, M. J. "Preliminary Comments on the MIT Public-Key
Cryptosystem." Cryptologia 1, 406-414, 1977.
RESULTS
SNO P Q FILE SIZE TIME TAKEN
1 53 59 4KB 3.05 s
2 1021 1031 8KB 37s
3 10163 10169 8KB 1.83 s
SNO P Q R FILE SIZE TIME
TAKEN
1 5 6 7 12KB 0.004s
2 51 53 61 12KB 2.14s
3 10163 10169 10177 12KB 0.0003s
Data security using rsa

More Related Content

What's hot

Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanismspriya_trehan
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyGopal Sakarkar
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signaturesRohit Bhat
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & CryptographyArun ACE
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and DistributionSyed Bahadur Shah
 
Homomorphic encryption in cloud computing final
Homomorphic encryption  in cloud computing finalHomomorphic encryption  in cloud computing final
Homomorphic encryption in cloud computing finalSantanu Das Saan
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptographydrewz lin
 
Introduction to Homomorphic Encryption
Introduction to Homomorphic EncryptionIntroduction to Homomorphic Encryption
Introduction to Homomorphic EncryptionChristoph Matthies
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipherVaibhav Khanna
 

What's hot (20)

Cryptography
CryptographyCryptography
Cryptography
 
Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Cryptography
CryptographyCryptography
Cryptography
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Introduction to Digital signatures
Introduction to Digital signaturesIntroduction to Digital signatures
Introduction to Digital signatures
 
Information Security & Cryptography
Information Security & CryptographyInformation Security & Cryptography
Information Security & Cryptography
 
Feistel cipher
Feistel cipherFeistel cipher
Feistel cipher
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 
Hash Function
Hash Function Hash Function
Hash Function
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Homomorphic encryption in cloud computing final
Homomorphic encryption  in cloud computing finalHomomorphic encryption  in cloud computing final
Homomorphic encryption in cloud computing final
 
13 asymmetric key cryptography
13   asymmetric key cryptography13   asymmetric key cryptography
13 asymmetric key cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
hill cipher
hill cipherhill cipher
hill cipher
 
Introduction to Homomorphic Encryption
Introduction to Homomorphic EncryptionIntroduction to Homomorphic Encryption
Introduction to Homomorphic Encryption
 
Information and network security 13 playfair cipher
Information and network security 13 playfair cipherInformation and network security 13 playfair cipher
Information and network security 13 playfair cipher
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 

Similar to Data security using rsa

Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches forijcsa
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptRizwanBasha12
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuIJNSA Journal
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGIJNSA Journal
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsaMohsin Ali
 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys IJECEIAES
 
Data Security With Colors Using Rsa
Data Security With Colors Using RsaData Security With Colors Using Rsa
Data Security With Colors Using RsaIJERA Editor
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.Tuhin_Das
 
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptxRivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptxwerip98386
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYQualcomm
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmVinayak Raja
 
CRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfCRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfBhuvanaR13
 

Similar to Data security using rsa (20)

Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
 
Rsa
RsaRsa
Rsa
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.ppt
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
 
Ch09
Ch09Ch09
Ch09
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsa
 
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys
 
Data Security With Colors Using Rsa
Data Security With Colors Using RsaData Security With Colors Using Rsa
Data Security With Colors Using Rsa
 
A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.A NETWORK SECURITY APPROACH USING RSA.
A NETWORK SECURITY APPROACH USING RSA.
 
Introduction to cryptography
Introduction to cryptographyIntroduction to cryptography
Introduction to cryptography
 
Rsa
RsaRsa
Rsa
 
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptxRivest Shamir Adleman Algorithm and its variant : DRSA.pptx
Rivest Shamir Adleman Algorithm and its variant : DRSA.pptx
 
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHYRSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
 
Digital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA AlgorithmDigital Signature Recognition using RSA Algorithm
Digital Signature Recognition using RSA Algorithm
 
Presentation
PresentationPresentation
Presentation
 
CRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfCRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdf
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 
F010243136
F010243136F010243136
F010243136
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Data security using rsa

  • 1. DATA SECURITY IN CLOUD USING RSAALGORITHM -Lakshmi Teja .S
  • 2. CONTENTS  OBJECTIVE  INTRODUCTION  WHAT IS RSA?  BLOCK DIAGRAM  LITERATURE REVIEW  CRITICAL ANALYSIS  PROBLEM IDENTIFICATION  PROPOSED METHOD  PROGRESS OF THE WORK
  • 3. OBJECTIVE To ensure the security and to optimize the time of execution of the encryption and decryption of the cloud based data using RSA algorithm.
  • 4. INTRODUCTION  Cloud computing is emerging technology which gives open sources on the internet, it denotes sharing of resources rather than having local servers to handle applications.  The major drawback is security in providing data over the internet, So as to enhance the security we use an algorithm called RSA
  • 5. WHAT IS CLOUD ?  Common implies multi-tenancy, not single or isolated tenancy  Location-independent  Online  Utility implies pay-for-use pricing  Demand implies ~infinite, ~immediate, ~invisible scalability
  • 6. WHAT IS CLOUD AND ITS PROS AND CONS
  • 7. LITERATURE REVIEW S.NO Title of the paper Name of Authors Year Remarks 1 A Study And Performance Analysis Of RSAAlgorithm M. Preetha, Computer Science & Application & Periyar University, India. M. Nithya, CSA, Periyar University, India 2013 security aspects are addressed. 2 RSA Public Key Cryptography Algorithm – A Review Shireen Nisha, Mohammed Farik 2015 Strengths and weaknesses are addressed. 3 Data Encryption and Decryption Using RSA Algorithm in a Network Dheeb Al Bashish, Malik Braik, Sulieman Bani- Ahmad. Deot. Of IT, 2017 Emphasizes on data security between computers sharing some resources and their private and
  • 8. CLASSIFICATION OF ENCRYPTION ALGORITHMS Encryption Algorithms Symmetric or Secret Key Encryption Asymmetric or Public Key Encryption DES RSA
  • 9. WHAT IS RSA..? • RSA is an algorithm used by modern computers to encrypt and decrypt messages • It is an asymmetric cryptographic algorithm. • It is included as a part of the web browsers from Microsoft and Netscape. • It is also part of Lotus Notes ,Intuit’s Quicken and many other products
  • 10. RSA CONTD  RSA is the first practical public-key cryptosystems and is widely used for secure data transmission  Every number has a prime factorization and it is hard to find if the number is very large. The time complexity is also very high. But on the other hand the multiplication is easy and time complexity is also not very high.  The RSA algorithm involves three steps: key generation, encryption and decryption
  • 12. RSA KEY SETUP  each user generates a public/private key pair by:  selecting two large primes at random - p, q  computing their system modulus N=p*q  note ø(N)=(p-1)(q-1)  selecting at random the encryption key e  where 1<e<ø(N), gcd(e,ø(N))=1  solve following equation to find decryption key d  e.d=1 mod ø(N) and 0≤d≤N  publish their public encryption key: KU={e,N}  keep secret private decryption key: KR={d,p,q}
  • 14. CONFIDENTIALITY  protecting the information from disclosure to unauthorized parties  ensures that only the right people (people who knows the key) can read the information.
  • 15. AUTHENTICATION  The sender and receiver can confirm each other’s identity and origin/destination of the information
  • 16. RSA EXAMPLE 1. Select primes: p=17 & q=11 2. Compute n = pq =17×11=187 3. Compute ø(n)=(p–1)(q-1)=16×10=160 4. Select e : gcd(e,160)=1; choose e=7 5. Determine d: de=1 mod 160 and d < 160 Value is d=23 since 23×7=161= 10×160+1 6. Publish public key KU={7,187} 7. Keep secret private key KR={23,17,11}
  • 17. RSA EXAMPLE CONTD  Sample RSA encryption/decryption is:  Given message M = 88 (nb. 88<187)  Encryption: C = 887 mod 187 = 11  Decryption: M = 1123 mod 187 = 88
  • 18. HOW RSA WORKS  because of Euler's Theorem:  aø(n)mod N = 1  where gcd(a,N)=1  in RSA have:  N=p.q  ø(N)=(p-1)(q-1)  carefully chosen e & d to be inverses mod ø(N)  hence e.d=1+k.ø(N) for some k  hence : Cd = (Me)d = M1+k.ø(N) = M1.(Mø(N))q = M1.(1)q = M1 = M mod N
  • 20. PUBLIC KEY CHARACTERISTICS  computationally infeasible to find private key knowing only algorithm & public key  computationally easy to en/decrypt messages when the relevant (private/public) key is known  either of the two related keys can be used for encryption and other is used for decryption
  • 21. PUBLIC KEY APPLICATIONS  encryption/decryption(provide Confidentiality)  digital signatures (provide authentication or proof)
  • 22. RSA SECURITY PROBLEMS  Three approaches to attack RSA:  Brute force key search (infeasible given size of numbers)  Mathematical attacks (based on difficulty of computing ø(N), by factoring modulus N)  Timing attacks (on running of decryption)
  • 23. MODIFIED RSA ALGORITHM USING ‘N’ PRIME NUMBERS Using more than two factors in the modulus of RSA cryptosystem that the arthimetic advantage that the private key computations can be speeded up using Chinese remaindering. At the same time with the proper choice of parameters one does not have to work with a larger modulus to achieve the same level of security in terms of the difficulty of integer factorization problem
  • 24. ADVANTAGES OF RSA • • Very fast, very simple encryption and verification. Easier to implement than Elliptical curve cryptography(ECC). • • Easier to understand. Widely deployed, better industry support. DISADVANTAGES OF RSA • • Very slow key generation. Slow decryption, which is slightly tricky to implement securely. • Two-part key is vulnerable to GCD attack if poorly implemented.
  • 25. CRITICAL ANALYSIS  Though the execution time of the RSA is more it is widely applied in many fields because it provides more security as it adds complexity for the intruders and also provides authentication .  It is used: -to protect web traffic, in the SSL protocol (Security Socket Layer), -to guarantee email privacy and authenticity in Pretty good privacy. - to guarantee remote connection in SSH(Secure Shell). -also in digital data information and telephone security
  • 26. PROBLEM IDENTIFICATION  At present, 1024 bit keys are considered weak, 2048 bit keys are probably secure enough for most purposes, and 40 bit keys are likely to remain secure for decades.  RSA is very vulnerable to chosen plaintext attacks. There is also a new timing attack that can be used to break many implementations of RSA.  The RSA algorithm is believed to be safe when used properly, but one must be very careful when using it to avoid these attacks.
  • 27. PROPOSAL METHOD  To improve the Data Security and to decrease the execution time for the existing algorithm by increasing the length of the key.
  • 28. PROGRESS OF THE WORK  Encryption of the plain text using RSA algorithm using MATLAB software has been performed successfully.  The comparison of the time of execution for various plain texts.
  • 29. FUTURE SCOPE The future will focusing on – More strong security algorithms and implement a better version of RSA . New security techniques need to be developed and older security techniques needed to be radically tweaked to be able to work with the clouds architecture. As the development of cloud computing technology is still under R&D, there will be more better understanding of the design challenges of cloud computing, and pave the way for further research in this area.
  • 30. CONCLUSION  Security is a major requirement in cloud computing while we talk about data storage. There are number of existing techniques used to implement security in cloud. So in this presentation, It discussed the popularly used asymmetric algorithms of cloud encryption techniques.
  • 31. REFERENCES  Coutinho, S. C. The Mathematics of Ciphers: Number Theory and RSA Cryptography. Wellesley, MA: A K Peters, 1999.  Flannery, S. and Flannery, D. In Code: A Mathematical Journey. Profile Books, 2000.  Honsberger, R. Mathematical Gems III. Washington, DC: Math. Assoc. Amer., pp. 166-173, 1985.  Meijer, A. R. "Groups, Factoring, and Cryptography." Math. Mag. 69, 103-109, 1996.  Rivest, R. L. "Remarks on a Proposed Cryptanalytic Attack on the MIT Public-Key Cryptosystem." Cryptologia 2, 62-65, 1978.  Rivest, R.; Shamir, A.; and Adleman, L. "A Method for Obtaining Digital Signatures and Public- Key Cryptosystems." MIT Memo MIT/LCS/TM-82, 1977.  Rivest, R.; Shamir, A.; and Adleman, L. "A Method for Obtaining Digital Signatures and Public Key Cryptosystems." Comm. ACM 21, 120-126, 1978.  RSA Laboratories. "The RSA Factoring Challenge" http://www.rsa.com/rsalabs/node.asp?id=2092.  Simmons, G. J. and Norris, M. J. "Preliminary Comments on the MIT Public-Key Cryptosystem." Cryptologia 1, 406-414, 1977.
  • 32. RESULTS SNO P Q FILE SIZE TIME TAKEN 1 53 59 4KB 3.05 s 2 1021 1031 8KB 37s 3 10163 10169 8KB 1.83 s SNO P Q R FILE SIZE TIME TAKEN 1 5 6 7 12KB 0.004s 2 51 53 61 12KB 2.14s 3 10163 10169 10177 12KB 0.0003s