MATERIALS:
Homomorphic encryption is a form of encryption that allows computations to be carried out on cipher text, thus generating an encrypted result which, when decrypted, matches the result of operations performed on the plaintext. This is sometimes a desirable feature in modern communication system architectures.
A. Algorithm
RSA (Rivestmk-Shamir-Adleman) Algorithm-
In this system we use RSA (Rivest-Shamir-Adleman) Algorithm, it involves four steps: key generation, key distribution, encryption and decryption. RSA involves a public key and private key. The public key can be known by everyone, and it is used for encrypting messages. RSA is one of the first practical public key cryptosystems and is widely used for secure data transmission.
…show more content…
When admin approve the request of user the user gets a mail of user name, password and one part of encrypted image.
C. Encryption-
Encryption secures online information, protects from countless daily attacks, in encryption is the process of encoding a message or information in such a way that only authorized parties can access it. In this process User’s ID proof is encrypted, and one third part of that encrypted image will be send through the mail by admin.
D. Transaction-
Users online banking system that consist of transfer money, statement, account details and money, amount have to be entered to transfer then user go to the Transaction to transfer then user. E. One Time Password (OTP) Generation-
After clicking on transfer the user gets an email of OTP security code that is useful for more security by user side. OTP have time limit for 30 seconds, after typing correct OTP code the amount transfer successfully.
E. Decryption-
Decryption is the process of taking encoded or encrypted image or other data and converting it back into image that user can read and understand, that one third part of encrypted image will be decrypted in this process. If both user and admin data will be match then user get a user ID and
In this process of end to end encryption, the unauthorized users such as service provider or any intermediate person can’t decrypt or read the communication between the sender and receiver. In the present day, Service Providers have access to our communication but when we deploy the end to end encryption then the service provider can intercept the communication but can’t read the content of our communication and the common example is WhatsApp messaging service. We can also secure our emails by using PGP encryption technology.
There are many terms which have been introduced by the field of encryption. Each of these terms are need to understand this discussion. Plaintext is the original document to be transmitted or stored on a computer system. Ciphertext is the encrypted document. ...
RSA encryption is the foundation of public key cryptography security products. For example, credit card companies use the RSA algorithm for customers’ individual online WebPages. The credit card companies publish a big number on WebPages, which is made by big prime numbers using the RSA algorithm. Since neither computers nor people can factor such big numbers, the RSA encryption system has secured many customers’ information.
...rite a code for image or audio or video data encryption and decryption. No, in the cryptography we are not designing an experiment it is an observations. The main feature point of this topic is the data in file is fully secured and not stolen by other users. There is no control system involved in this topic. There is no particular thing to measure the performance like error, profit and energy etc.
Today’s businesses and organizations need privacy. They need to keep their employee’s information, trade secrets, financial records, and many other sensitive documents that cannot be shown to the public. To do this, these organizations use encryption. Encryption is using an irreversible program to turn a file into gibberish. To translate the gibberish back to the original contents of the file, you must use a decryption program and provide a password. This is so the program can decrypt the file correctly. This encryption is what prevents cybercriminals who happen to get a hold of any files from looking at file contents. To the cybercriminal, encrypted files are completely useless unless he can figure out how it was encrypted. In order to decrypt the file, the cybercriminal must first find a series of steps that can decrypt the file over and over again: an algorithm.
Encryption refers to the translation of data into secret serial characters. It is the most successful medium to achieve security of data. To access an encrypted file or data, a user must have the secret key or password to allow the entry to the data for decryption. Encrypted data is called cipher text whereas an unencrypted data is referred to as plain text.
Cryptography provide many thing for the everyday person such as authentication, time stamping, electronic banking and secure network communication. Authentication is a very important application of public key encryption. According to Simpson authentication ensures the message is from a certain person. Ensuring a message is from who it is said to be from is important in making sure information is passed along to the correct people. As well as ensuring
A Public Key Infrastructure is not a single device or entity; it is a compilation of technology, infrastructure, and practices that enables large scale use of public key cryptography to provide authenticity, confidentiality, integrity, and non-repudiation services (CITE). The word cryptography is derived from the Greek word “kryptos”(CITE), which means hidden. It is the technique in which a cryptographic algorithm is used to take the original plaintext information and then make it unreadable to everyone except for those it was initially intended for by scrambling it into ciphertext. This is known as encryption, and the process that unscrambles the message to make it readable again is called decryption. The National Security Agency (NSA) even defines cryptography as the science and art of making codes and ciphers(CITE NSA 2009). In cryptography, a key or code is used to scramble the message which results in a cipher.
Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. In nowadays business world, it’s the easiest and most practical way to secure the information that we stored and processed, and it’s significant for our sensitive information. For example, as electronic commerce is popular now, the vendors and retailers must protect the customers’ personal information from hackers or competitors. They also have many business files or contracts that need to be strictly protected. Without data encryption, these important information may fall into wrong hands and be misused by others. Besides, data encryption may be used to secure sensitive information that exists on company networks, or create digital signatures, and help to authorize in business. No one should underestimate the importance of encryption. A little mistake in encryption may make sensitive information revealing, or even result in illegal and criminal accuse.
...enerated on look up of the message is called as private key. The other key which can be used for any sort of message as nothing in general is called as public Key. The private key is used to encrypt the messages personally and will not be seen or shared by any other user. Whereas the public key is used again for the same reason as of encryption but is hidden from others except our self. The encryption of the data by a public key can be also decrypted by the private key.
The encryption of entire disk drives. This includes the Operating System, user files, system files, swap files and hibernation files.
...tal part of lives just like privacy. Using cryptology provides mechanisms through a digital signature. This signature is inserted using a key (that only the writer of the email possesses) whilst a timestamp binds itself to the document. This type of cryptography is used to control access of security installations or pay-per-view television channels.
Multiplying the selected number by itself (pub times) and rounding of the value based on maximum encrypts the message.To decrypt, the encrypted message is multiplied by itself priv key times (priv times).
receiving money by means of computers in an easy, secure and fast way using an account-based system. This can be
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including: