The art of protecting information by transforming it (encrypting it) into
unreadable format called cipher Text. On the Other end we decipher (or decrypt) the message into plain text. In Cryptographic Communication Encryption and Decryption achieved by Several Algorithm form which some important algorithms are RSA Algorithm SHA Algorithm RSA Algorithm: RSA algorithm is a cryptographic protocol which allows two parties that have no prior knowledge of each other to jointly establish shared secret keys over an insecure communications channel. The RSA algorithm can be used for both public key encryption and digital signatures. Its security is based on the difficulty of factoring large integers. We will be using this cryptographic secured communication method in offices, bank, and in industries where one need to secure their company details. The person who is retrieving the datas of others will see only the wrong information. This paves the way for secured communication Key Generation Algorithm: We have to generate two large random primes, p and q, of approximately equal size such that their product n=pq is of the required bit length. After finding out their products compute n = pq and also the value for () phi = (p-1)(q-1). Then choose an integer e, 1 < e < phi, such that gcd (e, phi) = 1. When this condition satisfied compute the secret exponent d, 1 < d < phi, such that ed 1 (mod phi). The public key is (n, e) and the private key is (n, d). The values of p, q, and phi should also be kept secret. N-modulus, E- public exponent or encryption exponent, d - secret exponent or decryption exponent. Encryption- Encryption represents the plaintext message as a positive integer. Then we have to compute the cipher text c = m^e mod n. Sends the cipher text c to B. Decryption- Decryption uses its private key component (n, d) to compute m = c ^d mod n. Finally it extracts the plaintext from the integer representative m. SHA Algorithm:
Providing a way to check the integrity of information transmitted over an
unreliable medium is a prime necessity in the world of open computing and communications. Message authentication can be achieved using message authentication code (MAC), which can be used to authenticate both the source of the message and its integrity. MACs are used between two parties that share a secret key in order to authenticate information transmitted between these parties. A keyed-hash message authentication code (HMAC) is a mechanism for message authentication that uses cryptographic shared secret key along with an approved hash function.
This Project is developed in .NET Platform and base language is VB.NET.
Because VB.NET is very effective language to write, understand easily also user friendly to both Programmer and user compare to all other web technologies. Data communication has become a fundamental part of computing and data networks. Visual Basic .NET comes with enhanced visual designers, increased application performance, and a powerful integrated development environment (IDE).With an improved integrated development environment (IDE) and a significantly reduced startup time, Visual Basic .NET offers fast, automatic formatting of code as you type, improved IntelliSense, an enhanced object browser and XML designer, and much more.
Evaluation of Some Websites that Offer Virtual Phone Numbers for SMS Reception and Websites to Obtain Virtual Debit/Credit Cards for Online Accounts Verifications