Implementation of Modified RSA Approach for Encrypting and Decrypting Text Using Multi-power and K-Nearest Neighbor Algorithm

  • Shikha MathurEmail author
  • Deepika Gupta
  • Vishal Goar
  • Sunita Choudhary
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 4)


Security is the concept of keeping information secret by protecting it from unauthorized users. In a distributed medium, cryptography becomes crucial part for secure communication. This chapter presents literature survey of the previous work done by various researchers in the field of cryptography and implementation of modified approach with a fair comparison between traditional RSA and modified approach. The text of different sizes was encrypted and decrypted using modified approach. The simulation results are also shown with graphical description simultaneously.


Public key Private key RSA Symmetric key and asymmetric key ‘n’ prime number Multiple public key 


  1. 1.
    M. Thangavel, P. Varalakshmi, Mukund Murrali, K. Nithya, “An Enhanced and Secured RSA Key Generation Scheme”, Department of Information Technology, Anna University, Chennai, 2014, Elsevier.Google Scholar
  2. 2.
    Amare Anagaw Ayele, Dr. Vuda Sreenivasarao, “A Modified RSA Encryption Technique Based on Multiple public keys”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 1, Issue 4, ISSN 2320-9798, June 2013.Google Scholar
  3. 3.
    Ammar Odeh, Khaled Elleithy, Muneer Alshowkan, Eman Abdelfattah, 2013, “Quantum Key Distribution by Using Public Key Algorithm (RSA)”, IEEE.Google Scholar
  4. 4.
    Norhidayah Muhammadi, Jasni Mohamad Zaini, Md Yazid Mohd Saman, “Loop-based RSA Key Generation Algorithm using String Identity”, 13th International Conference on Control, Automation and Systems (ICCAS 2013). International Journal of Computer Applications (0975 – 8887) Volume 114 – No. 7, March 2015 33.Google Scholar
  5. 5.
    Ms. Ritu Patidar, Mrs. Rupali Bhartiya, 2013, “Modified RSA Cryptosystem Based on Offline Storage and Prime Number”, IEEE.Google Scholar
  6. 6.
    Liang Wang, Yonggui Zhang, 2011, “A New Personal Information Protection Approach Based on RSA Cryptography”, IEEE.Google Scholar
  7. 7.
    Malek Jakob Kakish, “Enhancing The Security Of The RSA Cryptosystem”, IJRRAS August 2011.Google Scholar
  8. 8.
    Dr. D.I. George Amalarethinam, J. Sai Geetha, “Enhancing Security level for Public Key Cryptosystem using MRGA”, World Congress on Computing and Communication Technologies, 978-1-4799-2876-7/13/, 2014, IEEE.Google Scholar
  9. 9.
    Dr. Abdulameer K. Hussain, “A Modified RSA Algorithm for Security Enhancement and Redundant Messages Elimination Using K-Nearest Neighbor Algorithm”, IJISET - International Journal of Innovative Science, Engineering & Technology, Vol. 2, Issue 1, ISSN 2348-7968, January 2015.Google Scholar
  10. 10.
    Xianmeng Meng, Xuexin Zheng, “Cryptanalysis of RSA with a small parameter revisited”, Information Processing Letters 115, 858-862, 2015, Elsevier.Google Scholar
  11. 11.
    Ritu Tripathi, Sanjay Agrawal, “Critical Analysis of RSA Public Key Cryptosystem”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 7, ISSN 2277-128X, July 2014.Google Scholar
  12. 12.
    Shilpi Gupta, Jaya Sharma, “A Hybrid Encryption Algorithm based on RSA and Diffie-Hellman”, International Conference on Computational Intelligence and Computing Research, 978-1-4673-1344-5/12, 2012, IEEE.Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Shikha Mathur
    • 1
    Email author
  • Deepika Gupta
    • 1
  • Vishal Goar
    • 2
  • Sunita Choudhary
    • 3
  1. 1.Marudhar Engineering CollegeBikanerIndia
  2. 2.Government Engineering CollegeBikanerIndia
  3. 3.College of Engineering & TechnologyBikanerIndia

Personalised recommendations