Public key cryptography-implementation using R-2R ladder network

Author & Affiliation:
Davinder Singh
Lect. Meri - College of Engineering & Technology, Near Sampla, Bahadugarh
Ravinder Rathee
H.O.D, Computer Department, C.R., Polytechnic, Rohtak (INDIA)
Manoj Duhan (duhan.manoj@yahoo.com)
Chairman, Electronics & Commerce Department, GJUS & T, Hisar (INDIA)
Keyword:
Public key, cryptography-implementation, R-2R ladder network
Issue Date:
December 2008
Abstract:

Cryptography is the art of achieving security by encoding messages to keep the information non-readable. Cryptography actually is a mathematical scrambling and unscrambling of data to achieve, Confidentiality (Readable only to sender and receiver); Integrity (not modified by any one to integrity of message); Non repudiation (sender can't refuse the claim of not sending); and Entity authentication. While sending or receiving the data, special keys are used to encrypt/decrypt data to verify the original contents. This key makes the process of cryptography secure. Public key systems use two keys such that one key, the public key, can be used to encrypt some text that can then only be decrypted using the securely-held private key. There are two approaches for the generation of encryption/decryption keys i.e. software and hardware. The purpose of this paper is to generate encryption key using hardware technique. To design electronics circuit basic concept is derived from the Knapsack problem. Then R-2R ladder network is used for the implementation of Knapsack algorithm. The electronics circuit design is evaluated using (ORCAD-Pcpise) software and analyzed practically on electronics bread board as well. The circuit implementation aim is achieved through many intermediate steps which are followed as firstly terminology and transformation are defined foe public key cryptography, then the knapsack problem is discussed and after that knapsack algorithm (greedy algorithm) is achieved using the electronics circuits. Some modification also has been discussed to make circuit more practical and more secure.

 

Pages:
749-756
ISSN:
2319-8044 (Online) - 2231-346X (Print)
Source:
DOI:
jusps-A
Share This:
Facebook Twitter Google Plus LinkedIn Reddit

Copy the following to cite this article:

D. Singh; R. Rathee; M. Duhan, "Public key cryptography-implementation using R-2R ladder network", Journal of Ultra Scientist of Physical Sciences, Volume 20, Issue 3, Page Number 749-756, 2018

Copy the following to cite this URL:

D. Singh; R. Rathee; M. Duhan, "Public key cryptography-implementation using R-2R ladder network", Journal of Ultra Scientist of Physical Sciences, Volume 20, Issue 3, Page Number 749-756, 2018

Available from: https://www.ultrascientist.org/paper/1438/

Ansari Education And Research Society
Facebook Google Plus Twitter