Contemporaneous Secured Information Transfer by using Extended and Modified RSA Cryptosystem

  • Unique Paper ID: 182955
  • Volume: 12
  • Issue: no
  • PageNo: 31-38
  • Abstract:
  • Data and information are transferred through machines, the internet, and communications networks in the digital realm. In these kinds of circumstances, data security and confidentiality are paramount. Through the application of cryptography, we can shield our data from unauthorized access. To enhance security, we improved the RSA method used in this research by introducing more prime numbers and adjusting the public key. After modification, we honestly compared the original and modified RSA algorithms and demonstrated, via qualitative and quantitative analysis, whether our modified algorithm is superior to the original

Copyright & License

Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{182955,
        author = {Smriti Gupta and Abhijit Pandit and Simran Riyaz and Ayan Banerjee and Prashnatit Pal},
        title = {Contemporaneous Secured Information Transfer by using Extended and Modified RSA Cryptosystem},
        journal = {International Journal of Innovative Research in Technology},
        year = {},
        volume = {12},
        number = {no},
        pages = {31-38},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=182955},
        abstract = {Data and information are transferred through machines, the internet, and communications networks in the digital realm. In these kinds of circumstances, data security and confidentiality are paramount. Through the application of cryptography, we can shield our data from unauthorized access. To enhance security, we improved the RSA method used in this research by introducing more prime numbers and adjusting the public key. After modification, we honestly compared the original and modified RSA algorithms and demonstrated, via qualitative and quantitative analysis, whether our modified algorithm is superior to the original},
        keywords = {Security, Confidentiality, Private Key, RSA. Qualitative and Quantitative Analysis},
        month = {},
        }

Cite This Article

  • ISSN: 2349-6002
  • Volume: 12
  • Issue: no
  • PageNo: 31-38

Contemporaneous Secured Information Transfer by using Extended and Modified RSA Cryptosystem

Related Articles