Implementation of RSA Algorithm Using Client-Server full report
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar topics
Active In SP

Posts: 559
Joined: Mar 2010
30-03-2010, 11:20 AM

Implementation of RSA Algorithm Using Client-Server

Presented By:

In cryptography, RSA (which stands for Rivest, Shamir and Adleman ) is an algorithm for public-key cryptography.
It is the first algorithm known to be suitable for signing as well as encryption.
RSA is widely used in electronic commerce protocols, and is believed to be secure given sufficiently long keys and the use of up-to-date implementations.
Network security threats
Network Security Threats
Security in networking is based on cryptography.
Cryptography ,a word with Greek origins,means secret writing.
It can provide several aspects of security related to the interchange of messages through networks.
Cryptography can also be used to authenticate the sender and receiver of the message to each other.
Need for cryptography
Cryptography can provide :
Symmetric-key cryptography algorithms:
In symmetric-key cryptography ,the same key is used by parties.
Asymmetric-key cryptography algorithms:
In asymmetric-key cryptography , there are two
keys : public key
private key
Asymmetric encryption
A modern branch of cryptography also known as public-key cryptography in which the algorithms employ a pair of keys.
Symmetric encryption
The encryption key and the decryption key are interrelated and may even be the same.
The RSA algorithm involves three steps
Key Generation.
RSA Key generation
RSA involves a public key and a private key. The public key can be known to everyone and is used for encrypting messages. Messages encrypted with the public key can only be decrypted using the private key. The keys for the RSA algorithm are generated the following way:
1. Choose two distinct prime numbers p and q.
For security purposes, the integers p and q should be chosen uniformly at random and should be of similar bit-length.
RSA Key Generation
2. Compute n = p*q.
n is used as the modulus for both the public and private keys
3. Compute f = (p - 1)*(q - 1).. (f is Euler's totient function).
4.choose a random integer e and calculates d so that d*e=1 mod f .
5.announces e and n to the public key and f ,d secret.
In RSA ,e and n are announced to the public , f and d are kept secret.
RSA Encryption
Client Side RSA Encryption: the public key is used to encrypt the message.
RSA encrypts as follows:
C=P e(mod n) where C is ciphertext , e and n are public keys and P is plaintext.
RSA decryption
Server side RSA decryption : To decrypt the ciphertext C,the RSA algorithm raises C to the power d and reduces the result modulo n
C d(mod n)=(p e)d(mod n)=P de (mod n)=p (mod n)=p
The primary advantage of public-key cryptography is increased security and convenience . Private keys never need to transmitted or revealed to anyone.
Another major advantage of public-key systems is that they can provide a method for digital signatures.
Public-key authentication, on the other hand, prevents this type of repudiation.each user has sole responsibility for protecting his or her private key. This property of public-key authentication is often called non-repudiation.
The public-key cryptography for encryption is speed: there are popular secret-key encryption methods that are significantly faster than any currently available public-key encryption method.
In some situations, public-key cryptography is not necessary and secret-key cryptography alone is sufficient.
Although RSA can be used to encrypt and decrypt actual messages ,it is very slow if the message is long.
Other algorithms
Diffie Hellman: It was originally designed for key exchange .In this algorithm two parties create a symmetric session key to exchange the data without having to remember the key for future use.
The Digital Signature Algorithm (DSA) is a United States Federal Government standard or FIPS for digital signatures.

Other algorithms
The Elliptic Curve Digital Signature Algorithm (ECDSA) is a variant of the Digital Signature Algorithm (DSA) which uses Elliptic curve cryptography.
X- cramer - shoup cryptography
The Cramer“shoup system is an asymmetric key encryption algorithm, and was the first efficient scheme proven to be secure against adaptive chosen ciphertext attack using standard cryptographic assumptions.
RSA is an asymmetric cryptography algorithm which uses both public key and private key . It plays a very important role in network security . They widely used networking. It helps in data security and efficiency.
Data Communications and Networking ,fourth edition BEHROUZ A FOROUZAN.
Communication Networks Fundamental Concepts and key Architectures , second edition Alberto Leon-Garcia.

Attached Files
.ppt   implementation of RSA using Client server.ppt (Size: 748.5 KB / Downloads: 292)
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Active In SP

Posts: 2
Joined: Sep 2011
19-09-2011, 04:14 PM

itz really helpfull in doing my project and implimentation reports.
seminar addict
Super Moderator

Posts: 6,592
Joined: Jul 2011
20-09-2011, 09:48 AM

To get more information about the topic " Implementation of RSA Algorithm Using Client-Server full report" please refer the link below

Active In SP

Posts: 1
Joined: Dec 2011
23-12-2011, 07:30 AM

pls i need the code of this...
seminar addict
Super Moderator

Posts: 6,592
Joined: Jul 2011
23-12-2011, 09:38 AM

To get more information about the topic " Implementation of RSA Algorithm Using Client-Server full report" please refer the link below


Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  web spoofing full report computer science technology 13 8,923 20-05-2016, 11:59 AM
Last Post: Dhanabhagya
  A Character Segmentation Algorithm for Printed Kannada Text Document uploader 1 1,494 10-01-2015, 12:52 PM
Last Post: zcfqmbrtb
  android full report computer science technology 57 73,127 24-09-2014, 05:05 PM
Last Post: Michaelnof
  3D Steganography Algorithm project report helper 8 3,482 01-09-2014, 11:07 AM
Last Post: computer science crazy
  steganography full report project report tiger 23 25,735 01-09-2014, 11:05 AM
Last Post: computer science crazy
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 144 92,342 13-05-2014, 10:16 AM
Last Post: seminar project topic
Video Random Access Memory ( Download Full Seminar Report ) computer science crazy 2 2,392 10-05-2014, 09:44 AM
Last Post: seminar project topic
Brick Virtual keyboard (Download Full Report And Abstract) computer science crazy 37 30,948 08-04-2014, 07:07 AM
Last Post: Guest
  Towards Secure and Dependable Storage Services in Cloud Computing FULL REPORT seminar ideas 5 4,120 24-03-2014, 02:51 PM
Last Post: seminar project topic
  eyeOS cloud operating system full report seminar topics 8 11,427 24-03-2014, 02:49 PM
Last Post: seminar project topic