AU2021106127A4 - A novel cloud cryptography based on adaptive configuration - Google Patents

A novel cloud cryptography based on adaptive configuration Download PDF

Info

Publication number
AU2021106127A4
AU2021106127A4 AU2021106127A AU2021106127A AU2021106127A4 AU 2021106127 A4 AU2021106127 A4 AU 2021106127A4 AU 2021106127 A AU2021106127 A AU 2021106127A AU 2021106127 A AU2021106127 A AU 2021106127A AU 2021106127 A4 AU2021106127 A4 AU 2021106127A4
Authority
AU
Australia
Prior art keywords
cryptography
cloud
public key
recipient
integer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2021106127A
Inventor
Gandharv Apte
Mihir Gajbhiye
Shreyas Gandhi
Tanush Gandhi
Yash Gandhi
Ashish Gangurde
P. P. Ghadekar
Rajesh Jalnekar
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vishwakarma Institute of Technology
Original Assignee
Vishwakarma Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vishwakarma Institute of Technology filed Critical Vishwakarma Institute of Technology
Priority to AU2021106127A priority Critical patent/AU2021106127A4/en
Application granted granted Critical
Publication of AU2021106127A4 publication Critical patent/AU2021106127A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

A novel cloud cryptography based on adaptive configuration The present invention relates to a cloud cryptography method. The proposed method provides a secure communications between the sender and only the intended recipient. In the preferred embodiment a system is provided which uses structure cryptography and coding to produce more security for cloud storage.It encrypts the users income connected information into a ciphertext to urge protection from the third party and is decrypted solely by the recipient. This helps the user to transfer his valuable financial gain with assurance.

Description

A novel cloud cryptography based on adaptive configuration
Technical field of invention:
The present invention relates to the field of computer engineering and more particularly relates to a cloud cryptography to provide a secure communications between the sender and only the intended recipient.
Background of the present invention
The background information herein below relates to the present disclosure but is not necessarily prior art.
Cryptography is that the science of keeping info secure by reworking it into kind that causeless recipients cannot perceive. In cryptography, a creative human readable message, remarked as plaintext, is modified by means of associate rule, or series of mathematical operations, into one thing that to associate unenlightened observer would look like nonsensicality; this gibberish is termed ciphertext. Cryptographic systems need some methodology for the meant recipient to be able to create use of the encrypted message usually, though not perpetually, by reworking the ciphertext back into plaintext.
The key advantage of cloud coding is that the same as in any application of encryption: encrypted information is merely legible for authorized parties with access to the decoding keys. Encrypting information ensures that although that information falls into the wrong hands, it's useless as long as its keys stay secure.
This is particularly helpful once information is being hold on within the cloud, because it protects information contents within the event that a supplier, account, or system is compromised.
Therefore there is need to introduce a novel method and system to provide a secure communication. Hence the present invention provides a cloud cryptography method to provide secure communication.
Objective of the invention:
The primary object of the present invention is to provide a cloud cryptography method so as to shield users' information.
Summary of the invention
Accordingly present invention provides a cloud cryptography method to provide a secure communications between the sender and only the intended recipient. Herein RSA method is utilized in proposed invention as it is one of the most secure method available for cryptography. RSA method generates two keys i.e. the public key and private key. Encryption can be done by anybody using the public key but the message can be decoded by decryption only.
Detailed description of invention
The present invention relates to a cloud cryptography method. The proposed method provides a secure communications between the sender and only the intended recipient.
In the preferred embodiment of the proposed method RSA Algorithm is used as it is one of the most secure Algorithms available for cryptography. RSA Algorithm generates two keys i.e the public key and private key. Encryption can be done by anybody using the public key but the message can be decoded by Decryption only.
In the present invention, the cloud cryptography includes the following methodology wherein
• Choose two different large random prime numbers p and q. This should be kept secret. • Calculate n=p*q Where, n is the modulus for the public key and the private keys. • Calculate the totient:c.(n)=(p-1)(q-1) • Choose an integer e such that 1 < e<(D(n), and is co-prime to i.e.: and share no factors other than 1; gcd(on ,e )= 1 is released as the public key exponent. • Compute d to satisfy the congruence relation de=1 (mod <(n)) i.e.. d = (k*c(n) + 1) for some integer x . (Simply to say: Calculate d = (x*F(n) + 1)/e to be an integer) • d is kept as the private key exponent.
Therefore the preferred embodiment provides a system which uses structure cryptography and coding to produce more security for cloud storage. It encrypts the users income connected information into a ciphertext to urge protection from the third party and is decrypted solely by the recipient. This helps the user to transfer his valuable financial gain with assurance.
The many features and advantages of the invention are apparent from the detailed specification, and thus, it is intended by the appended claims to cover all such features and advantages of the invention which fall within the true spirit and scope of the invention. Further, since numerous modifications and variations will readily occur to those skilled in the art, it is not desired to limit the invention to the exact construction and operation illustrated and described, and accordingly, all suitable modifications and equivalents may be resorted to, falling within the scope of the invention.

Claims (3)

THE CLAIMS DEFINING THE INVENTION ARE AS FOLLOWS
1. A cloud cryptography methodso as to shield users' information, characterize in that;
provides a secure communications between the sender and only the intended recipient; utilizes RSA method for cryptography; RSA method generates two keys i.e. the public key and private key; encryption can be done by anybody using the public key but the message can be decoded by decryption only; the message is decrypted solely by the recipient.
2. A cloud cryptography method as claimed in claim 1 wherein the said method choose two different large random prime numbers p and q; calculate n=p*q where,n is the modulus for the public key and the private keys; calculate the totient: q.(n)=(p-1)(q-1); choose an integer e such that 1 < e<F(n) and is co-prime to and share no factors other than 1; gcd(n ,e)= 1 is released as the public key exponent; compute d to satisfy the congruence relation de=1 (mod <(n)) i.e..d = (k*'D(n) + 1) for some integer x. (Simply to say: Calculate d = (x*c(n) + 1)/e to be an integer), d is kept as the private key exponent.
3. A cloud cryptography method as claimed in claim 1the said method encrypts the users income connected information into a ciphertext to urge protection from the third party and is decrypted solely by the recipient.
AU2021106127A 2021-08-20 2021-08-20 A novel cloud cryptography based on adaptive configuration Ceased AU2021106127A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2021106127A AU2021106127A4 (en) 2021-08-20 2021-08-20 A novel cloud cryptography based on adaptive configuration

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2021106127A AU2021106127A4 (en) 2021-08-20 2021-08-20 A novel cloud cryptography based on adaptive configuration

Publications (1)

Publication Number Publication Date
AU2021106127A4 true AU2021106127A4 (en) 2021-11-18

Family

ID=78514049

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2021106127A Ceased AU2021106127A4 (en) 2021-08-20 2021-08-20 A novel cloud cryptography based on adaptive configuration

Country Status (1)

Country Link
AU (1) AU2021106127A4 (en)

Similar Documents

Publication Publication Date Title
CN110011995A (en) Encryption and decryption approaches and device in multi-casting communication
Shankar et al. Hybrid cryptographic technique using RSA algorithm and scheduling concepts
CA2819211C (en) Data encryption
Garg et al. Comparison of asymmetric algorithms in cryptography
Suguna et al. A study on symmetric and asymmetric key encryption algorithms
Al Busafi et al. Review and analysis of cryptography techniques
CN104009841A (en) Message encrypting method under instant messaging situation
Aiswarya et al. Binary RSA encryption algorithm
CN111355578B (en) Public key encryption and decryption method and system with double monitoring parties
Azaim et al. Design and implementation of encrypted SMS on Android smartphone combining ECDSA-ECDH and AES
AU2021106127A4 (en) A novel cloud cryptography based on adaptive configuration
JPH08251156A (en) Method and system for ciphering electronic mail
KR100388059B1 (en) Data encryption system and its method using asymmetric key encryption algorithm
Deore et al. Hybrid encryption for database security
Keerthan et al. Analysis of Key Based Cryptographic Algorithms and its Applications
JPH07175411A (en) Cipher system
Rivest et al. 9. A Method for Obtaining Digital Signatures and
Kester A public-key exchange cryptographic technique using matrix
JP2004246350A (en) Enciphering device, deciphering device, enciphering system equipped with the same, enciphering method, and deciphering method
Ryabko et al. Cryptography in the information society
Diwan et al. AN APPROACH TO REVAMP THE DATA SECURITY USING CRYPTOGRAPHIC TECHNIQUES.
Kalaiselvi et al. Implementation Issues and analysis of cryptographic algorithms based on different security parameters
CN116781243B (en) Unintentional transmission method based on homomorphic encryption, medium and electronic equipment
Chaudhari et al. A survey on methods of cryptography and data encryption
SEM Introduction to Block chain

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry