DSpace Repository

A Double Key-Based Public-Private Key Encryption-Decryption Process for Secured Message Transaction

Show simple item record

dc.contributor.author Rashiduzzaman, Muhammad
dc.date.accessioned 2020-10-10T06:28:32Z
dc.date.available 2020-10-10T06:28:32Z
dc.date.issued 2019-12-06
dc.identifier.uri http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/4626
dc.description.abstract In modern communication age, security of electronic message transaction is the demand of time. It is most essential in various aspects. Currently a large amount of sensitive data is transmitted over the open network or internet or other communication channels on a daily basis. Without strong security, we cannot protect these sensitive information from malicious attacks. Currently, it is main concern to impose additional security services to the communicating message, communication channel and communicating participants. For this, a better approach for electronic message transaction system has been developed using Python programming language. It performs electronic message transactions with all the fundamental security requirements, which are confidentiality, integrity, authentication and non-repudiation for both communicating message and communicating participants. To do this, simple cryptographic encryption and decryption techniques are used to the communicating messages. At first message is encrypts with the private key of sender PRa and the output is again encrypts with a shared secret key K1 that generates cipherext, which is again encrypts with another shared secret key K2 that generates a code that serves as message authenticator known as MAC, which is concatenates with the ciphertext and again encrypts them with shared secret key K1 that builds the new cphertext, which is again encrypts with the receiver’s public key PUb to produce final ciphertext that is to be send to the intendent recipient. In the receiving end, to retrieve the message, receiver at first decrypts the received information with his private key PRb and again decrypts with the shared secret key K1 that gives the ciphertext and MAC of the ciphertext, and then only decrypts the MAC to generate a new ciphertext′ and compare the new ciphertext′ with the received ciphertext that ensures the ciphertext authentication as well as message authentication; if ciphertexts are found same, then decrypts the ciphertext with shared secret key K1 and again decrypts with the sender public key PUa and retrieve the message; otherwise discard it. This technique can be applied anywhere of electronic communications in a secure fashion. en_US
dc.language.iso en en_US
dc.publisher Daffodil International University en_US
dc.subject Communication en_US
dc.subject Network Technology en_US
dc.title A Double Key-Based Public-Private Key Encryption-Decryption Process for Secured Message Transaction en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account

Statistics