SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. II (Nov – Dec. 2015), PP 50-52
www.iosrjournals.org
DOI: 10.9790/0661-17625052 www.iosrjournals.org 50 | Page
Using NP Problems to Share Keys in Secret-Key Cryptography
Yashasvini Sharma
Department of Computer Science, RGPV, INDIA
Abstract: Public key cryptography has now become an important means for providing confidentiality by its use
of key distribution, in which users can do private communication with the help of encryption keys. It also
provides digital signatures which allow users to sign keys to verify their identities. But public key cryptography
has its own shortcoming regarding to high cost in keys distribution and excessive computation in encoding and
decoding it.
Whereas private key can omit all above problems but only if we can find a way to share private key
confidentially.
This research presents an innovation, which can be our future approach, using technology so-called NP
problems, of sending or sharing keys to the receiver without any need of the third party. This will provide an
open idea where sender and receiver can share any key for any number of times for encrypting data
confidentially that also helpful in overcoming problem of brute force attack.
Keywords: Public key cryptography, Secret-key cryptography, NP problems, brute force attack, Symmetric key,
Plain text
I. Introduction
1. Secret-key cryptography, also known as symmetric-key cryptography, employs identical private
keys for users, while they also hold unique public keys. “Symmetric key” refers to the identical private keys
shared by users. But the main problem was” private keys must still be distributed in a confidential mode”.
1.1 Strengths
The private keys used in symmetric-key cryptography are robustly resistant to brute force attacks.
While only the one-time pad, which combines plaintext with a random key, holds secure in the face of any
attacker regardless of time and computing power, symmetric-key algorithms are generally more difficult to
crack than their public key counterparts. Additionally, secret-key algorithms require less computing power to be
created than equivalent private keys in public-key cryptography.
1.2 Weaknesses
The biggest obstacle in successfully deploying a symmetric-key algorithm is the necessity for a proper
exchange of private keys. This transaction must be completed in a secure manner. In the past, this would often
have to be done through some type of face- to-face meeting, which proves quite impractical in many
circumstances when taking distance and time into account. If one assumes that security is a risk to begin with
due to the desire for a secret exchange of data in the first place, the exchange of keys becomes further
complicated.
2. Public-key Encryption
The author’s public-key method consists of separate encryption and decryption keys, with users only
being able to decrypt an encrypted message if they have the appropriate decryption key. Users will exchange
public keys; this transaction does not need to be done in a secure manner because the release of public keys does
not threaten the security of any private information.
2.1 Strengths
The asymmetric nature of public-key cryptography allows it a sizable advantage over symmetric-key
algorithms. The unique private and public keys provided to each user allow them to conduct secure exchanges
of information without first needing to devise some way to secretly swap keys.
2.2 Weaknesses
Keys in public-key cryptography, due to their unique nature, are more computationally costly than their
counterparts in secret-key cryptography. Asymmetric keys must be many times longer than keys in secret-
cryptography in order to boast equivalent security. Keys in asymmetric cryptography are also more vulnerable
to brute force attacks than in secret-key cryptography. There exist algorithms for public-key cryptography that
allow attackers to crack private keys faster than a brute force method would require. The widely used and
Using NP Problems to Share Keys in Secret-Key Cryptography
DOI: 10.9790/0661-17625052 www.iosrjournals.org 51 | Page
pioneering RSA algorithm has such an algorithm that leaves it susceptible to attacks in less than brute force
time. While generating longer keys in other algorithms will usually prevent a brute force attack from succeeding
in any meaningful length of time, these computations become more computationally intensive. These longer
keys can still vary in effectiveness depending on the computing power available to an attacker. Public-key
cryptography also has vulnerabilities to attacks such as the man in the middle attack. In this situation, a
malicious third party intercepts a public key on its way to one of the parties involved. The third party can then
instead pass along his or her own public key with a message claiming to be from the original sender. An attacker
can use this process at every step of an exchange in order to successfully impersonate each member of the
conversation without any other parties having knowledge of this deception.
II. Intended Idea-
NP problems-
In computational complexity theory, NP is one of the most fundamental complexity classes. The
abbreviation NP refers to "nondeterministic polynomial time."
Intuitively, NP is the set of all decision problems for which the instances where the answer is "yes"
have efficiently verifiable proofs of the fact that the answer is indeed "yes".
We can take an example to understand what this means
If we have equation –> 3x+4=37
Can we find x
Yes, we know if one equation is given with one variable we can find that
3x=33
x=11
It is done in two steps and let us says each step is a unit so it is done in 2 unit means we can find
solution in some known time, this is called as polynomial solution.
Now take another question
2x^2+ 4y^5=11274
Can we find answer?
If this is a question there must be solution but we have no idea how to get it.
So we left with 2 methods-
1. By guessing values of x and y randomly
2. By taking one by one value of x and y in a sequence until we get answer.
Well we know that by any approach we are not sure when we will get answer, Its unpredictable, We
can get it in 2 minutes, 2 hours to 2 decades or just never…
These problems are called as NP or non polynomial means exponential-- that grows very fast.
But again lets say I tell you that x=15 and y=27. Now of coarse you can put it in equation and equate it
in polynomial time and can find if this solution is right or wrong.
This is the beauty and power of NP problem.
Means if I myself design a equation say (29^2+4*76^3)/8=220329
And then tell you as (x^2+4*y^3)/z=220329
Now tell me x, y and z
Can you? I don’t think so even for such or much large equation brute force also needs large, very large
time. But if I tell you ok x=29 and y=76 then you can calculate it in no time.
So we are going to deal with this IDEA.
III. Suggested Method
So in here we are taking easy example to understand-
Let’s say sender RAMA want to share a key with receiver SHYAAM which is 123
Now let’s build an equation-
{[(123*3)/2+1] +10}/5=39
Now make an equation by hiding 123
Put x=123
(3x+21)/10
Using NP Problems to Share Keys in Secret-Key Cryptography
DOI: 10.9790/0661-17625052 www.iosrjournals.org 52 | Page
Now send 39 to the sender
Sender SHYAAM will make his own equation with this value
{(39+11)/2}*5=125
Now SHYAAM make equation by putting p=11, q=5, r=2
(39q+pq)/r=125 and send to RAMA
Obviously even for this small equation p, q, r can have many value that satisfy equation so trespasser
has no idea what can be exactly p, q, r
RAMA place value of 39
{[{(3x+21)/10} + p]/r}*q
3xq+41q+10pq=1500r and send this to SHYAAM
Obviously again by seeing 3xq+41q+10pq=1500r equation one cannot easily find out what new we
have placed in (39q+pq)/r=125, moreover it is an easy example where we can predict 125*20=1500 obviously.
Actual equation shall be much large, complex and unpredictable. Easy values are used to make things easier.
This is hard to find that what have we placed to make such equation and if we make much harder equation this
will be next to impossible.
Now SHYAAM will simply place value of p, q, r and will get x=123 easy
In Points
RAMA (sender) SHYAAM(receiver)
---------------39
------------- (39q+pq)/r=125
---------------3xq+41q+10pq=1500r
Calculate x=123
It is simple example using very simple operations, but in reality one can perform heavy operations by
using very large numbers to make guessing factor complicated.
IV. Conclusion
Private Key cry[tography is much better than public key cryptography in terms of cost, resistance
against brute force attack, selectiveness of password, less complicated operations and robustness because you
can change or share a different key for different plain text, but has a biggest problem how to share key? The
present work gives a method to deal with the same.
Its biggest benefit is sender and receiver can share different key for different communication and not
like public key where you have only one pair of public and private key and if it get stolen, you will face lots of
problem which is removed in this case.
References
[1] Encryption: Strengths and Weaknesses of Public-key Cryptography Matt Blumenthal Department of Computing
Sciences Villanova University, Villanova, PA 19085 CSC 3990 – Computing Research Topics matthew.blumenthal@villanova.edu
[2] http://www.cgi.com/files/white-papers/cgi_whpr_35_pki_e.pdf
[3] Private and Public Key Cryptography and Ransomware December 2014 Authored by:Ted Fischer Center for Internet Security (CIS)
Security Operations Center (SOC) Analyst
[4] ISSN:2249-5789 Prashant Kumar Arya et al , International Journal of Computer Science & Communication Networks,Vol 5(1),17-
21 Comparative Study of Asymmetric Key Cryptographic Algorithms
[5] http://searchsecurity.techtarget.com/definition/asymmetric-cryptography
[6] A Comparison of a Public and a Secret Key Cryptosystem, Adam Donlin, SE4H. 29th February, 1995.

More Related Content

What's hot

DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYTuhin_Das
 
Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?Milos Dunjic
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuIJNSA Journal
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemIAEME Publication
 
Puniani, Arjan Singh | Candidate Time-Delayed Decryption Protocols for Deploy...
Puniani, Arjan Singh | Candidate Time-Delayed Decryption Protocols for Deploy...Puniani, Arjan Singh | Candidate Time-Delayed Decryption Protocols for Deploy...
Puniani, Arjan Singh | Candidate Time-Delayed Decryption Protocols for Deploy...Arjan
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...IOSR Journals
 
Diffie-Hellman Key Exchange
Diffie-Hellman Key ExchangeDiffie-Hellman Key Exchange
Diffie-Hellman Key ExchangeGürkan YILDIRIM
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSIJCNCJournal
 
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALSBLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALSIJNSA Journal
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...graphhoc
 
A New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups
A New Key Agreement Protocol Using BDP and CSP in Non Commutative GroupsA New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups
A New Key Agreement Protocol Using BDP and CSP in Non Commutative GroupsEswar Publications
 
Hash Visualization a New Technique to improve Real World CyberSecurity
Hash Visualization a New Technique to improve Real World CyberSecurityHash Visualization a New Technique to improve Real World CyberSecurity
Hash Visualization a New Technique to improve Real World CyberSecurityIan Beckett
 
A Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto SystemA Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto SystemIRJET Journal
 
A Good Performance OTP Encryption Image based on DCT-DWT Steganography
A Good Performance OTP Encryption Image based on DCT-DWT SteganographyA Good Performance OTP Encryption Image based on DCT-DWT Steganography
A Good Performance OTP Encryption Image based on DCT-DWT SteganographyTELKOMNIKA JOURNAL
 
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODESWEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODESIJNSA Journal
 
A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms Er Piyush Gupta IN ⊞⌘
 

What's hot (19)

DOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITYDOCS ON NETWORK SECURITY
DOCS ON NETWORK SECURITY
 
Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?Why Should You Pay Attention To Quantum Computing?
Why Should You Pay Attention To Quantum Computing?
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystem
 
Puniani, Arjan Singh | Candidate Time-Delayed Decryption Protocols for Deploy...
Puniani, Arjan Singh | Candidate Time-Delayed Decryption Protocols for Deploy...Puniani, Arjan Singh | Candidate Time-Delayed Decryption Protocols for Deploy...
Puniani, Arjan Singh | Candidate Time-Delayed Decryption Protocols for Deploy...
 
3 pkc+rsa
3 pkc+rsa3 pkc+rsa
3 pkc+rsa
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 
Diffie-Hellman Key Exchange
Diffie-Hellman Key ExchangeDiffie-Hellman Key Exchange
Diffie-Hellman Key Exchange
 
Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETS
 
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALSBLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...
 
A New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups
A New Key Agreement Protocol Using BDP and CSP in Non Commutative GroupsA New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups
A New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups
 
Hash Visualization a New Technique to improve Real World CyberSecurity
Hash Visualization a New Technique to improve Real World CyberSecurityHash Visualization a New Technique to improve Real World CyberSecurity
Hash Visualization a New Technique to improve Real World CyberSecurity
 
A Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto SystemA Novel Key Distribution Scheme f or a Visual Crypto System
A Novel Key Distribution Scheme f or a Visual Crypto System
 
A Good Performance OTP Encryption Image based on DCT-DWT Steganography
A Good Performance OTP Encryption Image based on DCT-DWT SteganographyA Good Performance OTP Encryption Image based on DCT-DWT Steganography
A Good Performance OTP Encryption Image based on DCT-DWT Steganography
 
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODESWEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
Cryptography
CryptographyCryptography
Cryptography
 
A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms
 

Viewers also liked

Deploying IPv6 Technology
Deploying IPv6 TechnologyDeploying IPv6 Technology
Deploying IPv6 Technologyiosrjce
 
การตัดภาพด้วยโปรแกรม Monteverdi-1.24
การตัดภาพด้วยโปรแกรม Monteverdi-1.24การตัดภาพด้วยโปรแกรม Monteverdi-1.24
การตัดภาพด้วยโปรแกรม Monteverdi-1.24Ooy's Patchaya
 
Tutorialmembuatbloguntukpemula 141129061320-conversion-gate01
Tutorialmembuatbloguntukpemula 141129061320-conversion-gate01Tutorialmembuatbloguntukpemula 141129061320-conversion-gate01
Tutorialmembuatbloguntukpemula 141129061320-conversion-gate01minerindha
 
Tutorialmembuatbloguntukpemula 141129061320-conversion-gate01
Tutorialmembuatbloguntukpemula 141129061320-conversion-gate01Tutorialmembuatbloguntukpemula 141129061320-conversion-gate01
Tutorialmembuatbloguntukpemula 141129061320-conversion-gate01minerindha
 
Jean-Doris Muhuza - Ethics of Energy
Jean-Doris Muhuza - Ethics of EnergyJean-Doris Muhuza - Ethics of Energy
Jean-Doris Muhuza - Ethics of EnergyJean Muhuza
 
トリップハッガー登録マニュアル
トリップハッガー登録マニュアルトリップハッガー登録マニュアル
トリップハッガー登録マニュアルShiro Someya
 
Marketing Football the Museum Way - Aditya
Marketing Football the Museum Way - Aditya Marketing Football the Museum Way - Aditya
Marketing Football the Museum Way - Aditya MuseumCultureMarketing
 
Supriya_HR Executive
Supriya_HR ExecutiveSupriya_HR Executive
Supriya_HR Executivesupriya kadu
 
#Milk4kids
#Milk4kids#Milk4kids
#Milk4kidssforduno
 

Viewers also liked (16)

Untitled Presentation
Untitled PresentationUntitled Presentation
Untitled Presentation
 
Deploying IPv6 Technology
Deploying IPv6 TechnologyDeploying IPv6 Technology
Deploying IPv6 Technology
 
การตัดภาพด้วยโปรแกรม Monteverdi-1.24
การตัดภาพด้วยโปรแกรม Monteverdi-1.24การตัดภาพด้วยโปรแกรม Monteverdi-1.24
การตัดภาพด้วยโปรแกรม Monteverdi-1.24
 
Tutorialmembuatbloguntukpemula 141129061320-conversion-gate01
Tutorialmembuatbloguntukpemula 141129061320-conversion-gate01Tutorialmembuatbloguntukpemula 141129061320-conversion-gate01
Tutorialmembuatbloguntukpemula 141129061320-conversion-gate01
 
Tutorialmembuatbloguntukpemula 141129061320-conversion-gate01
Tutorialmembuatbloguntukpemula 141129061320-conversion-gate01Tutorialmembuatbloguntukpemula 141129061320-conversion-gate01
Tutorialmembuatbloguntukpemula 141129061320-conversion-gate01
 
Jean-Doris Muhuza - Ethics of Energy
Jean-Doris Muhuza - Ethics of EnergyJean-Doris Muhuza - Ethics of Energy
Jean-Doris Muhuza - Ethics of Energy
 
トリップハッガー登録マニュアル
トリップハッガー登録マニュアルトリップハッガー登録マニュアル
トリップハッガー登録マニュアル
 
S ni p 4.02-91 (17)
S ni p 4.02-91 (17)S ni p 4.02-91 (17)
S ni p 4.02-91 (17)
 
Sipani Jardin
Sipani JardinSipani Jardin
Sipani Jardin
 
Reference
ReferenceReference
Reference
 
Vivir como-dios-manda
Vivir como-dios-mandaVivir como-dios-manda
Vivir como-dios-manda
 
Marketing Football the Museum Way - Aditya
Marketing Football the Museum Way - Aditya Marketing Football the Museum Way - Aditya
Marketing Football the Museum Way - Aditya
 
Supriya_HR Executive
Supriya_HR ExecutiveSupriya_HR Executive
Supriya_HR Executive
 
Stb el pogr_zn
Stb el pogr_znStb el pogr_zn
Stb el pogr_zn
 
#Milk4kids
#Milk4kids#Milk4kids
#Milk4kids
 
Harmony
HarmonyHarmony
Harmony
 

Similar to Using NP Problems to Share Keys in Secret-Key Cryptography

ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.pptChandraB15
 
Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?AlexWang212277
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptRizwanBasha12
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGIJNSA Journal
 
Public Key Cryptosystems and RSA
Public Key Cryptosystems and RSAPublic Key Cryptosystems and RSA
Public Key Cryptosystems and RSAChris Theisen
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE Qualcomm
 
CRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfCRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfBhuvanaR13
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-ittrameshvvv
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET Journal
 

Similar to Using NP Problems to Share Keys in Secret-Key Cryptography (20)

Cryptography & Security
Cryptography & SecurityCryptography & Security
Cryptography & Security
 
Public key algorithm
Public key algorithmPublic key algorithm
Public key algorithm
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 
Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?
 
50620130101002
5062013010100250620130101002
50620130101002
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.ppt
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
Rsa
RsaRsa
Rsa
 
Ch09
Ch09Ch09
Ch09
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
 
Data security using rsa
Data security using rsaData security using rsa
Data security using rsa
 
Public Key Cryptosystems and RSA
Public Key Cryptosystems and RSAPublic Key Cryptosystems and RSA
Public Key Cryptosystems and RSA
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
 
Rsa
RsaRsa
Rsa
 
CRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdfCRYPTOGRAPHY (2).pdf
CRYPTOGRAPHY (2).pdf
 
Rsa diffi-network security-itt
Rsa diffi-network security-ittRsa diffi-network security-itt
Rsa diffi-network security-itt
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
 
H42063743
H42063743H42063743
H42063743
 
Cryptography
CryptographyCryptography
Cryptography
 

More from iosrjce

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...iosrjce
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?iosrjce
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later lifeiosrjce
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...iosrjce
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubaiiosrjce
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...iosrjce
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approachiosrjce
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sitesiosrjce
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeiosrjce
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...iosrjce
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...iosrjce
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladeshiosrjce
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...iosrjce
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...iosrjce
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Considerationiosrjce
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyiosrjce
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...iosrjce
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...iosrjce
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...iosrjce
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...iosrjce
 

More from iosrjce (20)

An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...An Examination of Effectuation Dimension as Financing Practice of Small and M...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
 
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
 
Childhood Factors that influence success in later life
Childhood Factors that influence success in later lifeChildhood Factors that influence success in later life
Childhood Factors that influence success in later life
 
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
 
Customer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in DubaiCustomer’s Acceptance of Internet Banking in Dubai
Customer’s Acceptance of Internet Banking in Dubai
 
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
 
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model ApproachConsumer Perspectives on Brand Preference: A Choice Based Model Approach
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
 
Student`S Approach towards Social Network Sites
Student`S Approach towards Social Network SitesStudent`S Approach towards Social Network Sites
Student`S Approach towards Social Network Sites
 
Broadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperativeBroadcast Management in Nigeria: The systems approach as an imperative
Broadcast Management in Nigeria: The systems approach as an imperative
 
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
 
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
 
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on BangladeshConsumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
 
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
 
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
 
Media Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & ConsiderationMedia Innovations and its Impact on Brand awareness & Consideration
Media Innovations and its Impact on Brand awareness & Consideration
 
Customer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative studyCustomer experience in supermarkets and hypermarkets – A comparative study
Customer experience in supermarkets and hypermarkets – A comparative study
 
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...Social Media and Small Businesses: A Combinational Strategic Approach under t...
Social Media and Small Businesses: A Combinational Strategic Approach under t...
 
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
 
Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...Implementation of Quality Management principles at Zimbabwe Open University (...
Implementation of Quality Management principles at Zimbabwe Open University (...
 
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
 

Recently uploaded

fluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answerfluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answerapareshmondalnita
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwoodseandesed
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsAtif Razi
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringC Sai Kiran
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdfKamal Acharya
 
Pharmacy management system project report..pdf
Pharmacy management system project report..pdfPharmacy management system project report..pdf
Pharmacy management system project report..pdfKamal Acharya
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdfKamal Acharya
 
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...Amil baba
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdfKamal Acharya
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGKOUSTAV SARKAR
 
IT-601 Lecture Notes-UNIT-2.pdf Data Analysis
IT-601 Lecture Notes-UNIT-2.pdf Data AnalysisIT-601 Lecture Notes-UNIT-2.pdf Data Analysis
IT-601 Lecture Notes-UNIT-2.pdf Data AnalysisDr. Radhey Shyam
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdfKamal Acharya
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
 
fundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projectionfundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projectionjeevanprasad8
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdfAhmedHussein950959
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdfKamal Acharya
 
Toll tax management system project report..pdf
Toll tax management system project report..pdfToll tax management system project report..pdf
Toll tax management system project report..pdfKamal Acharya
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectRased Khan
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfKamal Acharya
 

Recently uploaded (20)

fluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answerfluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answer
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical SolutionsRS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
RS Khurmi Machine Design Clutch and Brake Exercise Numerical Solutions
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
 
Pharmacy management system project report..pdf
Pharmacy management system project report..pdfPharmacy management system project report..pdf
Pharmacy management system project report..pdf
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdf
 
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
 
IT-601 Lecture Notes-UNIT-2.pdf Data Analysis
IT-601 Lecture Notes-UNIT-2.pdf Data AnalysisIT-601 Lecture Notes-UNIT-2.pdf Data Analysis
IT-601 Lecture Notes-UNIT-2.pdf Data Analysis
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
fundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projectionfundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projection
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
 
Toll tax management system project report..pdf
Toll tax management system project report..pdfToll tax management system project report..pdf
Toll tax management system project report..pdf
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdf
 

Using NP Problems to Share Keys in Secret-Key Cryptography

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. II (Nov – Dec. 2015), PP 50-52 www.iosrjournals.org DOI: 10.9790/0661-17625052 www.iosrjournals.org 50 | Page Using NP Problems to Share Keys in Secret-Key Cryptography Yashasvini Sharma Department of Computer Science, RGPV, INDIA Abstract: Public key cryptography has now become an important means for providing confidentiality by its use of key distribution, in which users can do private communication with the help of encryption keys. It also provides digital signatures which allow users to sign keys to verify their identities. But public key cryptography has its own shortcoming regarding to high cost in keys distribution and excessive computation in encoding and decoding it. Whereas private key can omit all above problems but only if we can find a way to share private key confidentially. This research presents an innovation, which can be our future approach, using technology so-called NP problems, of sending or sharing keys to the receiver without any need of the third party. This will provide an open idea where sender and receiver can share any key for any number of times for encrypting data confidentially that also helpful in overcoming problem of brute force attack. Keywords: Public key cryptography, Secret-key cryptography, NP problems, brute force attack, Symmetric key, Plain text I. Introduction 1. Secret-key cryptography, also known as symmetric-key cryptography, employs identical private keys for users, while they also hold unique public keys. “Symmetric key” refers to the identical private keys shared by users. But the main problem was” private keys must still be distributed in a confidential mode”. 1.1 Strengths The private keys used in symmetric-key cryptography are robustly resistant to brute force attacks. While only the one-time pad, which combines plaintext with a random key, holds secure in the face of any attacker regardless of time and computing power, symmetric-key algorithms are generally more difficult to crack than their public key counterparts. Additionally, secret-key algorithms require less computing power to be created than equivalent private keys in public-key cryptography. 1.2 Weaknesses The biggest obstacle in successfully deploying a symmetric-key algorithm is the necessity for a proper exchange of private keys. This transaction must be completed in a secure manner. In the past, this would often have to be done through some type of face- to-face meeting, which proves quite impractical in many circumstances when taking distance and time into account. If one assumes that security is a risk to begin with due to the desire for a secret exchange of data in the first place, the exchange of keys becomes further complicated. 2. Public-key Encryption The author’s public-key method consists of separate encryption and decryption keys, with users only being able to decrypt an encrypted message if they have the appropriate decryption key. Users will exchange public keys; this transaction does not need to be done in a secure manner because the release of public keys does not threaten the security of any private information. 2.1 Strengths The asymmetric nature of public-key cryptography allows it a sizable advantage over symmetric-key algorithms. The unique private and public keys provided to each user allow them to conduct secure exchanges of information without first needing to devise some way to secretly swap keys. 2.2 Weaknesses Keys in public-key cryptography, due to their unique nature, are more computationally costly than their counterparts in secret-key cryptography. Asymmetric keys must be many times longer than keys in secret- cryptography in order to boast equivalent security. Keys in asymmetric cryptography are also more vulnerable to brute force attacks than in secret-key cryptography. There exist algorithms for public-key cryptography that allow attackers to crack private keys faster than a brute force method would require. The widely used and
  • 2. Using NP Problems to Share Keys in Secret-Key Cryptography DOI: 10.9790/0661-17625052 www.iosrjournals.org 51 | Page pioneering RSA algorithm has such an algorithm that leaves it susceptible to attacks in less than brute force time. While generating longer keys in other algorithms will usually prevent a brute force attack from succeeding in any meaningful length of time, these computations become more computationally intensive. These longer keys can still vary in effectiveness depending on the computing power available to an attacker. Public-key cryptography also has vulnerabilities to attacks such as the man in the middle attack. In this situation, a malicious third party intercepts a public key on its way to one of the parties involved. The third party can then instead pass along his or her own public key with a message claiming to be from the original sender. An attacker can use this process at every step of an exchange in order to successfully impersonate each member of the conversation without any other parties having knowledge of this deception. II. Intended Idea- NP problems- In computational complexity theory, NP is one of the most fundamental complexity classes. The abbreviation NP refers to "nondeterministic polynomial time." Intuitively, NP is the set of all decision problems for which the instances where the answer is "yes" have efficiently verifiable proofs of the fact that the answer is indeed "yes". We can take an example to understand what this means If we have equation –> 3x+4=37 Can we find x Yes, we know if one equation is given with one variable we can find that 3x=33 x=11 It is done in two steps and let us says each step is a unit so it is done in 2 unit means we can find solution in some known time, this is called as polynomial solution. Now take another question 2x^2+ 4y^5=11274 Can we find answer? If this is a question there must be solution but we have no idea how to get it. So we left with 2 methods- 1. By guessing values of x and y randomly 2. By taking one by one value of x and y in a sequence until we get answer. Well we know that by any approach we are not sure when we will get answer, Its unpredictable, We can get it in 2 minutes, 2 hours to 2 decades or just never… These problems are called as NP or non polynomial means exponential-- that grows very fast. But again lets say I tell you that x=15 and y=27. Now of coarse you can put it in equation and equate it in polynomial time and can find if this solution is right or wrong. This is the beauty and power of NP problem. Means if I myself design a equation say (29^2+4*76^3)/8=220329 And then tell you as (x^2+4*y^3)/z=220329 Now tell me x, y and z Can you? I don’t think so even for such or much large equation brute force also needs large, very large time. But if I tell you ok x=29 and y=76 then you can calculate it in no time. So we are going to deal with this IDEA. III. Suggested Method So in here we are taking easy example to understand- Let’s say sender RAMA want to share a key with receiver SHYAAM which is 123 Now let’s build an equation- {[(123*3)/2+1] +10}/5=39 Now make an equation by hiding 123 Put x=123 (3x+21)/10
  • 3. Using NP Problems to Share Keys in Secret-Key Cryptography DOI: 10.9790/0661-17625052 www.iosrjournals.org 52 | Page Now send 39 to the sender Sender SHYAAM will make his own equation with this value {(39+11)/2}*5=125 Now SHYAAM make equation by putting p=11, q=5, r=2 (39q+pq)/r=125 and send to RAMA Obviously even for this small equation p, q, r can have many value that satisfy equation so trespasser has no idea what can be exactly p, q, r RAMA place value of 39 {[{(3x+21)/10} + p]/r}*q 3xq+41q+10pq=1500r and send this to SHYAAM Obviously again by seeing 3xq+41q+10pq=1500r equation one cannot easily find out what new we have placed in (39q+pq)/r=125, moreover it is an easy example where we can predict 125*20=1500 obviously. Actual equation shall be much large, complex and unpredictable. Easy values are used to make things easier. This is hard to find that what have we placed to make such equation and if we make much harder equation this will be next to impossible. Now SHYAAM will simply place value of p, q, r and will get x=123 easy In Points RAMA (sender) SHYAAM(receiver) ---------------39 ------------- (39q+pq)/r=125 ---------------3xq+41q+10pq=1500r Calculate x=123 It is simple example using very simple operations, but in reality one can perform heavy operations by using very large numbers to make guessing factor complicated. IV. Conclusion Private Key cry[tography is much better than public key cryptography in terms of cost, resistance against brute force attack, selectiveness of password, less complicated operations and robustness because you can change or share a different key for different plain text, but has a biggest problem how to share key? The present work gives a method to deal with the same. Its biggest benefit is sender and receiver can share different key for different communication and not like public key where you have only one pair of public and private key and if it get stolen, you will face lots of problem which is removed in this case. References [1] Encryption: Strengths and Weaknesses of Public-key Cryptography Matt Blumenthal Department of Computing Sciences Villanova University, Villanova, PA 19085 CSC 3990 – Computing Research Topics matthew.blumenthal@villanova.edu [2] http://www.cgi.com/files/white-papers/cgi_whpr_35_pki_e.pdf [3] Private and Public Key Cryptography and Ransomware December 2014 Authored by:Ted Fischer Center for Internet Security (CIS) Security Operations Center (SOC) Analyst [4] ISSN:2249-5789 Prashant Kumar Arya et al , International Journal of Computer Science & Communication Networks,Vol 5(1),17- 21 Comparative Study of Asymmetric Key Cryptographic Algorithms [5] http://searchsecurity.techtarget.com/definition/asymmetric-cryptography [6] A Comparison of a Public and a Secret Key Cryptosystem, Adam Donlin, SE4H. 29th February, 1995.