You are on page 1of 2

ENCRYPTION AND DECRYPTION USING SHA ALGORITHM

The art of protecting information by transforming it (encrypting it) into


unreadable format called cipher Text. On the Other end we decipher (or decrypt) the
message into plain text. In Cryptographic Communication Encryption and Decryption
achieved by Several Algorithm form which some important algorithms are
RSA Algorithm
SHA Algorithm
RSA Algorithm:
RSA algorithm is a cryptographic protocol which allows two parties that have no
prior knowledge of each other to jointly establish shared secret keys over an insecure
communications channel. The RSA algorithm can be used for both public key encryption
and digital signatures. Its security is based on the difficulty of factoring large integers. We
will be using this cryptographic secured communication method in offices, bank, and in
industries where one need to secure their company details. The person who is retrieving
the datas of others will see only the wrong information. This paves the way for secured
communication
Key Generation Algorithm:
We have to generate two large random primes, p and q, of approximately equal
size such that their product n=pq is of the required bit length. After finding out their
products compute n = pq and also the value for () phi = (p-1)(q-1). Then choose an
integer e, 1 < e < phi, such that gcd (e, phi) = 1. When this condition satisfied compute
the secret exponent d, 1 < d < phi, such that ed 1 (mod phi). The public key is (n, e) and
the private key is (n, d). The values of p, q, and phi should also be kept secret.
N-modulus, E- public exponent or encryption exponent, d - secret exponent or
decryption exponent.
Encryption- Encryption represents the plaintext message as a positive integer.
Then we have to compute the cipher text c = m^e mod n. Sends the cipher text c
to B.
Decryption- Decryption uses its private key component (n, d) to compute m = c ^d
mod n. Finally it extracts the plaintext from the integer representative m.
SHA Algorithm:

Providing a way to check the integrity of information transmitted over an


unreliable medium is a prime necessity in the world of open computing and
communications. Message authentication can be achieved using message authentication
code (MAC), which can be used to authenticate both the source of the message and its
integrity. MACs are used between two parties that share a secret key in order to
authenticate information transmitted between these parties. A keyed-hash message
authentication code (HMAC) is a mechanism for message authentication that uses
cryptographic shared secret key along with an approved hash function.

This Project is developed in .NET Platform and base language is VB.NET.


Because VB.NET is very effective language to write, understand easily also user friendly
to both Programmer and user compare to all other web technologies. Data
communication has become a fundamental part of computing and data networks. Visual
Basic .NET comes with enhanced visual designers, increased application performance,
and a powerful integrated development environment (IDE).With an improved integrated
development environment (IDE) and a significantly reduced startup time, Visual Basic
.NET offers fast, automatic formatting of code as you type, improved IntelliSense, an
enhanced object browser and XML designer, and much more.

You might also like