AU2021106127A4 - A novel cloud cryptography based on adaptive configuration - Google Patents
A novel cloud cryptography based on adaptive configuration Download PDFInfo
- Publication number
- AU2021106127A4 AU2021106127A4 AU2021106127A AU2021106127A AU2021106127A4 AU 2021106127 A4 AU2021106127 A4 AU 2021106127A4 AU 2021106127 A AU2021106127 A AU 2021106127A AU 2021106127 A AU2021106127 A AU 2021106127A AU 2021106127 A4 AU2021106127 A4 AU 2021106127A4
- Authority
- AU
- Australia
- Prior art keywords
- cryptography
- cloud
- public key
- recipient
- integer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
- 230000003044 adaptive effect Effects 0.000 title abstract description 3
- 238000000034 method Methods 0.000 claims abstract description 20
- 238000004891 communication Methods 0.000 claims abstract description 7
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
A novel cloud cryptography based on adaptive configuration
The present invention relates to a cloud cryptography method. The proposed method provides a
secure communications between the sender and only the intended recipient. In the preferred
embodiment a system is provided which uses structure cryptography and coding to produce more
security for cloud storage.It encrypts the users income connected information into a ciphertext to
urge protection from the third party and is decrypted solely by the recipient. This helps the user
to transfer his valuable financial gain with assurance.
Description
A novel cloud cryptography based on adaptive configuration
Technical field of invention:
The present invention relates to the field of computer engineering and more particularly relates to a cloud cryptography to provide a secure communications between the sender and only the intended recipient.
Background of the present invention
The background information herein below relates to the present disclosure but is not necessarily prior art.
Cryptography is that the science of keeping info secure by reworking it into kind that causeless recipients cannot perceive. In cryptography, a creative human readable message, remarked as plaintext, is modified by means of associate rule, or series of mathematical operations, into one thing that to associate unenlightened observer would look like nonsensicality; this gibberish is termed ciphertext. Cryptographic systems need some methodology for the meant recipient to be able to create use of the encrypted message usually, though not perpetually, by reworking the ciphertext back into plaintext.
The key advantage of cloud coding is that the same as in any application of encryption: encrypted information is merely legible for authorized parties with access to the decoding keys. Encrypting information ensures that although that information falls into the wrong hands, it's useless as long as its keys stay secure.
This is particularly helpful once information is being hold on within the cloud, because it protects information contents within the event that a supplier, account, or system is compromised.
Therefore there is need to introduce a novel method and system to provide a secure communication. Hence the present invention provides a cloud cryptography method to provide secure communication.
Objective of the invention:
The primary object of the present invention is to provide a cloud cryptography method so as to shield users' information.
Summary of the invention
Accordingly present invention provides a cloud cryptography method to provide a secure communications between the sender and only the intended recipient. Herein RSA method is utilized in proposed invention as it is one of the most secure method available for cryptography. RSA method generates two keys i.e. the public key and private key. Encryption can be done by anybody using the public key but the message can be decoded by decryption only.
Detailed description of invention
The present invention relates to a cloud cryptography method. The proposed method provides a secure communications between the sender and only the intended recipient.
In the preferred embodiment of the proposed method RSA Algorithm is used as it is one of the most secure Algorithms available for cryptography. RSA Algorithm generates two keys i.e the public key and private key. Encryption can be done by anybody using the public key but the message can be decoded by Decryption only.
In the present invention, the cloud cryptography includes the following methodology wherein
• Choose two different large random prime numbers p and q. This should be kept secret. • Calculate n=p*q Where, n is the modulus for the public key and the private keys. • Calculate the totient:c.(n)=(p-1)(q-1) • Choose an integer e such that 1 < e<(D(n), and is co-prime to i.e.: and share no factors other than 1; gcd(on ,e )= 1 is released as the public key exponent. • Compute d to satisfy the congruence relation de=1 (mod <(n)) i.e.. d = (k*c(n) + 1) for some integer x . (Simply to say: Calculate d = (x*F(n) + 1)/e to be an integer) • d is kept as the private key exponent.
Therefore the preferred embodiment provides a system which uses structure cryptography and coding to produce more security for cloud storage. It encrypts the users income connected information into a ciphertext to urge protection from the third party and is decrypted solely by the recipient. This helps the user to transfer his valuable financial gain with assurance.
The many features and advantages of the invention are apparent from the detailed specification, and thus, it is intended by the appended claims to cover all such features and advantages of the invention which fall within the true spirit and scope of the invention. Further, since numerous modifications and variations will readily occur to those skilled in the art, it is not desired to limit the invention to the exact construction and operation illustrated and described, and accordingly, all suitable modifications and equivalents may be resorted to, falling within the scope of the invention.
Claims (3)
1. A cloud cryptography methodso as to shield users' information, characterize in that;
provides a secure communications between the sender and only the intended recipient; utilizes RSA method for cryptography; RSA method generates two keys i.e. the public key and private key; encryption can be done by anybody using the public key but the message can be decoded by decryption only; the message is decrypted solely by the recipient.
2. A cloud cryptography method as claimed in claim 1 wherein the said method choose two different large random prime numbers p and q; calculate n=p*q where,n is the modulus for the public key and the private keys; calculate the totient: q.(n)=(p-1)(q-1); choose an integer e such that 1 < e<F(n) and is co-prime to and share no factors other than 1; gcd(n ,e)= 1 is released as the public key exponent; compute d to satisfy the congruence relation de=1 (mod <(n)) i.e..d = (k*'D(n) + 1) for some integer x. (Simply to say: Calculate d = (x*c(n) + 1)/e to be an integer), d is kept as the private key exponent.
3. A cloud cryptography method as claimed in claim 1the said method encrypts the users income connected information into a ciphertext to urge protection from the third party and is decrypted solely by the recipient.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2021106127A AU2021106127A4 (en) | 2021-08-20 | 2021-08-20 | A novel cloud cryptography based on adaptive configuration |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2021106127A AU2021106127A4 (en) | 2021-08-20 | 2021-08-20 | A novel cloud cryptography based on adaptive configuration |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2021106127A4 true AU2021106127A4 (en) | 2021-11-18 |
Family
ID=78514049
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2021106127A Ceased AU2021106127A4 (en) | 2021-08-20 | 2021-08-20 | A novel cloud cryptography based on adaptive configuration |
Country Status (1)
Country | Link |
---|---|
AU (1) | AU2021106127A4 (en) |
-
2021
- 2021-08-20 AU AU2021106127A patent/AU2021106127A4/en not_active Ceased
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110011995A (en) | Encryption and decryption approaches and device in multi-casting communication | |
Shankar et al. | Hybrid cryptographic technique using RSA algorithm and scheduling concepts | |
CA2819211C (en) | Data encryption | |
Garg et al. | Comparison of asymmetric algorithms in cryptography | |
Suguna et al. | A study on symmetric and asymmetric key encryption algorithms | |
Al Busafi et al. | Review and analysis of cryptography techniques | |
CN104009841A (en) | Message encrypting method under instant messaging situation | |
Aiswarya et al. | Binary RSA encryption algorithm | |
CN111355578B (en) | Public key encryption and decryption method and system with double monitoring parties | |
Azaim et al. | Design and implementation of encrypted SMS on Android smartphone combining ECDSA-ECDH and AES | |
AU2021106127A4 (en) | A novel cloud cryptography based on adaptive configuration | |
JPH08251156A (en) | Method and system for ciphering electronic mail | |
KR100388059B1 (en) | Data encryption system and its method using asymmetric key encryption algorithm | |
Deore et al. | Hybrid encryption for database security | |
Keerthan et al. | Analysis of Key Based Cryptographic Algorithms and its Applications | |
JPH07175411A (en) | Cipher system | |
Rivest et al. | 9. A Method for Obtaining Digital Signatures and | |
Kester | A public-key exchange cryptographic technique using matrix | |
JP2004246350A (en) | Enciphering device, deciphering device, enciphering system equipped with the same, enciphering method, and deciphering method | |
Ryabko et al. | Cryptography in the information society | |
Diwan et al. | AN APPROACH TO REVAMP THE DATA SECURITY USING CRYPTOGRAPHIC TECHNIQUES. | |
Kalaiselvi et al. | Implementation Issues and analysis of cryptographic algorithms based on different security parameters | |
CN116781243B (en) | Unintentional transmission method based on homomorphic encryption, medium and electronic equipment | |
Chaudhari et al. | A survey on methods of cryptography and data encryption | |
SEM | Introduction to Block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FGI | Letters patent sealed or granted (innovation patent) | ||
MK22 | Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry |