CRYPTOGRAPHIC METHOD TO ENHANCE DATA SECURITY USING RSA ALGORITHM AND MELLIN TRANSFORM
Keywords:Cryptography, Encryption, Decryption, RSA algorithm, Mellin Transform
Cryptography is the technique of using mathematical algorithms to encrypt and decrypt the information. The process of converting plaintext to ciphertext is known as encryption, whereas the process of converting ciphertext to plaintext is known as decryption. Encryption and decryption methods based on Mellin Transform are unable to provide more security while transmitting the information. RSA algorithm is an Asymmetric key cryptography algorithm. The purpose of this study is to present a cryptographic method that uses the RSA algorithm and Mellin Transform to improve communication security.
Debnath, L., and Bhatta, D. (2015). “Integral Transforms and their Applications” (3rd ed.).
Johar, M. Ashfaque (2019). “The Mellin Transform à Basic Introduction”.
Lone, A. H. and Uddin, M. (2016). “Common Attacks on RSA and its Variants with Possible Countermeasures”. International Journal of Research in Management and Technology, 5, 65-70.
Malhotra, M. & Singh, A. (2013). “Study of Various Cryptographic Algorithms”. International Journal of Scientific Engineering and Research, 1(3), 77-88.
Milanov, E. (2009). “The RSA Algorithm”. RSA Laboratories, 1-11.
Mohammadi, M., Zolghadr, A., and Purmina, M. A. (2018). “Comparison of two Public Key Cryptosystems”. Journal of Optoelectronical Nanostructures Summer, 3(3), 47-58. https://dorl.net/dor/20.1001.1.24237361.2018.3.3.5.0
Mok, C. J. and Chuah, C. W. (2019). “An Intelligence Brute Force Attack on RSA Cryptosystem”. Communications in Computational and Applied Mathematics, 1(1).
Nagalakshmi, G., Sekhar, A. C., Sankar, N. R., and Venkateswarlu, K. (2019). “Enhancing the Data Security by Using RSA Algorithm with Application of Laplace Transform Cryptosystem”. International Journal of Recent Technology and Engineering (IJRTE), 8(2).
Nisha, S., and Farik, M. (2017). “RSA Public Key Cryptography Algorithm–A Review”. International Journal of Scientific & Technology Research, 6(7), 187-191.
Rivest, R., Shamir, A., and Adleman, L. (1978). “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”. Communications of the ACM, 21(2), 120-126. https://doi.org/10.1145/359340.359342.
Santana, Y. C. (2014). “A Cryptographic Scheme of Mellin Transform”.
Singh, M. M. P. and Saha, M. (2017). “Application of Laplace - Mellin Transform to Cryptography”. International Journal of Mathematical Archive-8(7), 143-146.
Stallings, W. (2002). “Cryptography and Network Security” (3rd ed). Pearson Education.
Tayal, S., Gupta, N., Gupta, P., Goyal, D., and Goyal, M. (2017). “A Review Paper on Network Security and Cryptography”. Advances in Computational Sciences and Technology, 10(5), 763-770.
Thakkar, A. and Gor, R. (2021). “A Review paper on Cryptographic Algorithms and Mathematical Transformations”, Proceeding of International Conference on Mathematical Modelling and Simulation in Physical Sciences (MMSPS), Excellent Publishers, 324-331.
Thakkar, A. and Gor, R. (2022), “Cryptographic Method to Enhance Data Security Using Elgamal Algorithm and Mellin Transform”. IOSR Journal of Mathematics (IOSR-JM), 18(6), 12-18.
Thakkar, A. and Gor, R. (2022). “Cryptographic Method to Enhance the Data Security Using Rsa Algorithm and Kamal Transform”. IOSR Journal of Computer Engineering (IOSR-JCE), 24(3), 01-07.
Thakkar, A. and Gor, R. (2022). “Cryptographic Method to Enhance the Data Security using ElGamal Algorithm and Kamal Transform”. IOSR Journal of Computer Engineering (IOSR-JCE), 24(3), 08-14.
How to Cite
Copyright (c) 2023 Akash Thakkar, Dr. Ravi Gor
This work is licensed under a Creative Commons Attribution 4.0 International License.