Posts

Showing posts from March, 2019

Write a Java program to implement RSA Algoithm | RSA Algorithm in Java | Cryptography

Image
HARDWARE AND SOFTWARE REQUIREMENT: 1. Intel based Desktop PC: - RAM of 512 MB 2. Notepad/Notepad ++ editor   and Command Prompt or 3. IntelliJ IDEA Community Edition/ Eclipse THEORY: Ø   RSA  is an encryption algorithm, in order to have secure transmission of   messages over the internet. Ø   Many protocols like  Secure Shell ,  S/MIME , and  SSL / TLS  are based on RSA for encryption and  digital signature  functions. Ø   It is an asymmetric encryption technique [Asymmetric means that there are two different keys i.e. Public key and Private key. That’s why it is also known as public key cryptography]. Ø   The public key is used to encrypt messages and can be known to everyone; Messages encrypted using the public key can only be decrypted with the private key / Secret key. An example of asymmetric cryptography in Client-Server Communication: 1.        A client (web browser) sends its shared key to the   web server and requests for some data. 2.      Th

Write the RC4 logic in Java Using Java cryptography; encrypt the text “Hello world” using Blowfish. Create your own key using Java key tool.

Image
HARDWARE AND SOFTWARE REQUIREMENT: 1. Intel based Desktop PC: - RAM of 512 MB 2. Notepad/Notepad ++ editor  and Command Prompt or 3. IntelliJ IDEA Community Edition THEORY: Ø RC4 – this algorithm is used to create pseudo-random stream of bits (a key-stream). As with any stream cipher, keystreams can be used for encryption Ø A  stream cipher  is a symmetric key cipher where plaintext digits one at a time are XORed with corresponding digits of  pseudorandom  stream of bits (keystream) to create encrypted message i.e. ciphertext. Ø RC4 is mostly used in protocols such as  : 1) Secure Socket Layer (SSL)  to establish an encrypted link between a web server and a browser to ensure all data transmitted  remain private and generally used by many websites to protect their online transaction with their customers  2) Wired Equivalent Privacy (WEP)  security protocol to provide security and privacy to wireless networks(e.g. Wi-Fi) comparable to as in Wired Network (LAN)

Search related post on google