Enhancing the Data Security by Using RSA Algorithm with Application of Laplace Transform Cryptosystem
G. Nagalakshmi1, A. Chandra Sekhar2, N. Ravi Sankar3, K. Venkateswarlu4 

1G. Nagalakshmi, Assistant Professor, Dept of Applied Mathematics, GIS, GITAM (Deemed to be University), Andhra Pradesh, India.
2Prof. A. Chendra Sekhar, Dept of Applied Mathematics, GIS, GITAM (Deemed to be University), Andhra Pradesh, India.
3Prof. N. Ravi Sankar, Dept of Applied Mathematics, GIS, GITAM (Deemed to be University), Andhra Pradesh, India.
4K. Venkateswarlu, Assistant Professor, Dept of Computer Science, GIT, GITAM (Deemed to be University), Andhra Pradesh, India.

Manuscript received on 11 March 2019 | Revised Manuscript received on 18 March 2019 | Manuscript published on 30 July 2019 | PP: 6142-6147 | Volume-8 Issue-2, July 2019 | Retrieval Number: B3737078219/19©BEIESP | DOI: 10.35940/ijrte.B3737.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Encryption and Decryption schemes based on applications of Laplace Transforms are unable to provide more security to communicate the information. Rivest, Shemir, Adleman (RSA) Cryptosystem is popular public-key algorithm. This paper provides the conditions that give rise to the RSA Cryptosystem based on the Laplace Transform techniques. The modified RSA cryptosystem is explained with an algorithm. The proposed algorithm is implemented using a high-level program and time complexity of the proposed algorithm is tested with RSA cryptosystem algorithms. The comparison reveals that the proposed algorithm enhances the data security as compare with RSA cryptosystem algorithms and application of Laplace Transform for cryptosystem scheme. The statistical analysis for the proposed and existing algorithms is provided.
Index Terms: Laplace Transform Cryptography; Secret Key; Public key; RSA Cryptosystem.

Scope of the Article: Sequential, Parallel and Distributed Algorithms and Data Structures