Main Reference PaperEncryption and Decryption through RSA Cryptosystem using Two Public Keys and Chinese Remainder Theorem, International Journal of Computer Applications, July 2017 [NS2].
  • The RSA cryptosystem is proposed which contains four prime numbers and by using two key pairs instead of sending the public key alone and use some mathematical calculations so that if an attacker has an opportunity of getting the public key component they cannot find the private key value by brute force search. On the other hand it has a speed improvement on RSA decryption side by using the Chinese remainder theorem (CRT) by which the scheme is semantically secure also.

+ Description
  • The RSA cryptosystem is proposed which contains four prime numbers and by using two key pairs instead of sending the public key alone and use some mathematical calculations so that if an attacker has an opportunity of getting the public key component they cannot find the private key value by brute force search. On the other hand it has a speed improvement on RSA decryption side by using the Chinese remainder theorem (CRT) by which the scheme is semantically secure also.

  • It improves the security and performance in the network.

  • It avoids the attacker in the network.

+ Aim & Objectives
  • It improves the security and performance in the network.

  • It avoids the attacker in the network.

  • A technique is proposed to further improve the security in the network.

+ Contribution
  • A technique is proposed to further improve the security in the network.

  • Operating System : Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

+ Software Tools & Technologies
  • Operating System : Ubuntu 12.04 LTS 64bit.

  • Simulator: NS 2.35, Language : TCL and AWK script, (C++)

  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

+ Project Recommended For
  • M.E / M.Tech / MS / Ph.D.- Customized according to the client requirements.

  • No Readymade Projects-Depending on the complexity of the project and requirements.

+ Order To Delivery
  • No Readymade Projects-Depending on the complexity of the project and requirements.

Professional Ethics: We S-Logix would appreciate the students those who willingly contribute with atleast a line of thinking of their own while preparing the project with us. It is advised that the project given by us be considered only as a model project and be applied with confidence to contribute your own ideas through our expert guidance and enrich your knowledge.