SlideShare a Scribd company logo
1 of 37
Md. Ariful Hoque 
Roll No: MSc 140202 
Discipline : CSE 
Khulna University
Data communication. 
Vital role of Cryptography. 
Phone communication. 
E-commerce. 
Pay-TV. 
Transmitting financial information. 
Video Conferencing. 
2
Cryptosystem. 
Encryption 
Decryption 
Symmetric cryptosystem. 
RSA cryptographic algorithm. 
Uses a pair of related keys - 
Private key 
Public key 
3
Record 500 Bangla speech words. 
Extract data. 
Stored in a text file as integer data. 
Encrypt and decrypt. 
4
Speech 
Word 
5 
Recording of Bangla speech words. 
Recorded as wav file. 
Sampling rate 8.00 KHz. 
Coded in 8 bits PCM.
Speech 
Word 
Preprocessing 
and 
Data 
Extraction 
6 
Discard 58 bytes from beginning. 
Extract require voiced data. 
Contain silence, unvoiced and voice. 
Stored in a text file.
Speech 
Word 
Preprocessing 
and 
Data 
Extraction 
Public 
key 
{e, n} 
7
Speech 
Word 
Preprocessing 
and 
Data 
Extraction 
Encryption 
Process 
8 
Public 
key 
{e, n}
Speech 
Word 
Preprocessing 
and 
Data 
Extraction 
Encryption 
Process 
Private 
key 
{d, n} 
Public 
key 
{e, n} 
9
Speech 
Word 
Preprocessing 
and 
Data 
Extraction 
Encryption 
Process 
Decryption 
Process 
Public 
key 
{e, n} 
10 
Private 
key 
{d, n}
Speech 
Word 
Preprocessing 
and 
Data 
Extraction 
Encryption 
Process 
Decryption 
Process 
Original 
Speech 
Word 
Private 
key 
{d, n} 
Public 
key 
{e, n} 
11
12
13 
Random 
Number 
Generator
14 
Random 
Number 
Generator 
Rand FIFO
15 
Random 
Number 
Generator 
Rand FIFO 
Primality 
Tester
16 
Random 
Number 
Generator 
Rand FIFO 
Primality 
Tester 
Prime FIFO
17 
Random 
Number 
Generator 
Rand FIFO 
Primality 
Tester 
Prime FIFO 
N=p*q 
∅(n)=(p-1)(q-1)
18 
Random 
Number 
Generator 
Rand FIFO 
Primality 
Tester 
Prime FIFO 
N=p*q 
∅(n)=(p-1)(q-1) 
n
19 
Random 
Number 
Generator 
Rand FIFO 
Primality 
Tester 
Prime FIFO 
N=p*q 
∅(n)=(p-1)(q-1) 
gcd(e, ∅(n))=1 
1<e< ∅(n) 
n
20 
Random 
Number 
Generator 
Rand FIFO 
Primality 
Tester 
Prime FIFO 
N=p*q 
∅(n)=(p-1)(q-1) 
gcd(e, ∅(n))=1 
1<e< ∅(n) 
e n
21 
Random 
Number 
Generator 
Rand FIFO 
Primality 
Tester 
Prime FIFO 
N=p*q 
∅(n)=(p-1)(q-1) 
gcd(e, ∅(n))=1 
1<e< ∅(n) 
e.d =1mod ∅(n 
0 ≤d ≤n 
e n
22 
Random 
Number 
Generator 
Rand FIFO 
Primality 
Tester 
Prime FIFO 
N=p*q 
∅(n)=(p-1)(q-1) 
gcd(e, ∅(n))=1 
1<e< ∅(n) 
e.d =1mod ∅(n 
0 ≤d ≤n 
d e n
23 
 Public key e n
24 
e n 
d 
n 
 Public key 
 Private key
25 
M
26 
M 
e 
n
27 
M 
e 
n 
Modular Exponentiation 
Me mod n
28 
M 
e 
n 
Modular Exponentiation C 
Me mod n
29 
C
30 
C 
d 
n
31 
C 
d 
n 
Modular Exponentiation 
Cd mod n
32 
C 
d 
n 
Modular Exponentiation M 
Cd mod n
33 
Input: A, B, n 
Output: E = AB mod n 
LR binary method 
E <= 1; 
for i = k-1 to 0 
If Bi =1 
E <= A*E mod n 
end if 
if i ≠ 0 
E <= E*E mod n; 
end if 
end for 
return E;
34
Objective. 
500 speech words recorded. 
Saved as .wav format. 
Extracted integer data. 
Taken txt file as input. 
Produce unreadable message. 
35
RSA algorithm used to encrypt and decrypt. 
M lies in the range . 
Encrypt 500 word at a time. 
Limitations. 
36
Thanks To All 
37

More Related Content

What's hot (20)

Rsa algorithm key generation
Rsa algorithm key generation Rsa algorithm key generation
Rsa algorithm key generation
 
The rsa algorithm
The rsa algorithmThe rsa algorithm
The rsa algorithm
 
Rsa Crptosystem
Rsa CrptosystemRsa Crptosystem
Rsa Crptosystem
 
RSA Algorithm report
RSA Algorithm reportRSA Algorithm report
RSA Algorithm report
 
Public Key Algorithms
Public Key AlgorithmsPublic Key Algorithms
Public Key Algorithms
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
RSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key CryptographyRSA Algorithm - Public Key Cryptography
RSA Algorithm - Public Key Cryptography
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2
 
Rsa
RsaRsa
Rsa
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
rsa-1
rsa-1rsa-1
rsa-1
 
Rsa
RsaRsa
Rsa
 
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
RSA - ALGORITHM by Muthugomathy and Meenakshi Shetti of GIT COLLEGE
 
Information and Network Security
Information and Network SecurityInformation and Network Security
Information and Network Security
 
Cryptography
CryptographyCryptography
Cryptography
 
Public key cryptography
Public key cryptography Public key cryptography
Public key cryptography
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 

Viewers also liked

Introduction to Django REST Framework, an easy way to build REST framework in...
Introduction to Django REST Framework, an easy way to build REST framework in...Introduction to Django REST Framework, an easy way to build REST framework in...
Introduction to Django REST Framework, an easy way to build REST framework in...Zhe Li
 
Real time web_apps_pycon2012-v1
Real time web_apps_pycon2012-v1Real time web_apps_pycon2012-v1
Real time web_apps_pycon2012-v1Avinash Prasad
 
DJANGO-REST-FRAMEWORK: AWESOME WEB-BROWSABLE WEB APIS
DJANGO-REST-FRAMEWORK: AWESOME WEB-BROWSABLE WEB APISDJANGO-REST-FRAMEWORK: AWESOME WEB-BROWSABLE WEB APIS
DJANGO-REST-FRAMEWORK: AWESOME WEB-BROWSABLE WEB APISFernando Rocha
 
PyConMY 2016 Django Channels
PyConMY 2016 Django ChannelsPyConMY 2016 Django Channels
PyConMY 2016 Django ChannelsKok Hoor Chew
 
Django Introduction & Tutorial
Django Introduction & TutorialDjango Introduction & Tutorial
Django Introduction & Tutorial之宇 趙
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA AlgorithmRitu Agarwal
 
The State of WebSockets in Django
The State of WebSockets in DjangoThe State of WebSockets in Django
The State of WebSockets in DjangoRami Sayar
 
Django REST Framework
Django REST FrameworkDjango REST Framework
Django REST FrameworkLoad Impact
 
Async Tasks with Django Channels
Async Tasks with Django ChannelsAsync Tasks with Django Channels
Async Tasks with Django ChannelsAlbert O'Connor
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
Django channels
Django channelsDjango channels
Django channelsAndy Dai
 
Python RESTful webservices with Python: Flask and Django solutions
Python RESTful webservices with Python: Flask and Django solutionsPython RESTful webservices with Python: Flask and Django solutions
Python RESTful webservices with Python: Flask and Django solutionsSolution4Future
 
Introduction to Genetic Algorithms
Introduction to Genetic AlgorithmsIntroduction to Genetic Algorithms
Introduction to Genetic AlgorithmsAhmed Othman
 
Djangocon 2014 - Django REST Framework - So Easy You Can Learn it in 25 Minutes
Djangocon 2014 - Django REST Framework - So Easy You Can Learn it in 25 MinutesDjangocon 2014 - Django REST Framework - So Easy You Can Learn it in 25 Minutes
Djangocon 2014 - Django REST Framework - So Easy You Can Learn it in 25 MinutesNina Zakharenko
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets LayerNascenia IT
 
Genetic Algorithm by Example
Genetic Algorithm by ExampleGenetic Algorithm by Example
Genetic Algorithm by ExampleNobal Niraula
 

Viewers also liked (20)

Introduction to Django REST Framework, an easy way to build REST framework in...
Introduction to Django REST Framework, an easy way to build REST framework in...Introduction to Django REST Framework, an easy way to build REST framework in...
Introduction to Django REST Framework, an easy way to build REST framework in...
 
Rsa Algorithm
Rsa AlgorithmRsa Algorithm
Rsa Algorithm
 
Real time web_apps_pycon2012-v1
Real time web_apps_pycon2012-v1Real time web_apps_pycon2012-v1
Real time web_apps_pycon2012-v1
 
DJANGO-REST-FRAMEWORK: AWESOME WEB-BROWSABLE WEB APIS
DJANGO-REST-FRAMEWORK: AWESOME WEB-BROWSABLE WEB APISDJANGO-REST-FRAMEWORK: AWESOME WEB-BROWSABLE WEB APIS
DJANGO-REST-FRAMEWORK: AWESOME WEB-BROWSABLE WEB APIS
 
PyConMY 2016 Django Channels
PyConMY 2016 Django ChannelsPyConMY 2016 Django Channels
PyConMY 2016 Django Channels
 
Django Introduction & Tutorial
Django Introduction & TutorialDjango Introduction & Tutorial
Django Introduction & Tutorial
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
The State of WebSockets in Django
The State of WebSockets in DjangoThe State of WebSockets in Django
The State of WebSockets in Django
 
Django Celery
Django Celery Django Celery
Django Celery
 
Django REST Framework
Django REST FrameworkDjango REST Framework
Django REST Framework
 
Async Tasks with Django Channels
Async Tasks with Django ChannelsAsync Tasks with Django Channels
Async Tasks with Django Channels
 
Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Django channels
Django channelsDjango channels
Django channels
 
Python RESTful webservices with Python: Flask and Django solutions
Python RESTful webservices with Python: Flask and Django solutionsPython RESTful webservices with Python: Flask and Django solutions
Python RESTful webservices with Python: Flask and Django solutions
 
Introduction to Genetic Algorithms
Introduction to Genetic AlgorithmsIntroduction to Genetic Algorithms
Introduction to Genetic Algorithms
 
Djangocon 2014 - Django REST Framework - So Easy You Can Learn it in 25 Minutes
Djangocon 2014 - Django REST Framework - So Easy You Can Learn it in 25 MinutesDjangocon 2014 - Django REST Framework - So Easy You Can Learn it in 25 Minutes
Djangocon 2014 - Django REST Framework - So Easy You Can Learn it in 25 Minutes
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
Genetic Algorithm by Example
Genetic Algorithm by ExampleGenetic Algorithm by Example
Genetic Algorithm by Example
 

Similar to Implementation of RSA Algorithm for Speech Data Encryption and Decryption

The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA EncryptionNathan F. Dunn
 
Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...FahmiOlayah
 
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...CSCJournals
 
Big Data Day LA 2016/ Hadoop/ Spark/ Kafka track - Data Provenance Support in...
Big Data Day LA 2016/ Hadoop/ Spark/ Kafka track - Data Provenance Support in...Big Data Day LA 2016/ Hadoop/ Spark/ Kafka track - Data Provenance Support in...
Big Data Day LA 2016/ Hadoop/ Spark/ Kafka track - Data Provenance Support in...Data Con LA
 
Surrey dl-4
Surrey dl-4Surrey dl-4
Surrey dl-4ozzie73
 
RSA Algorithm.ppt
RSA Algorithm.pptRSA Algorithm.ppt
RSA Algorithm.pptArchanaT30
 
Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate providerKishankant Yadav
 
Asymmetric Encryption with RSA
Asymmetric Encryption with RSAAsymmetric Encryption with RSA
Asymmetric Encryption with RSAAaftabKhan14
 
cp467_12_lecture14_image compression1.pdf
cp467_12_lecture14_image compression1.pdfcp467_12_lecture14_image compression1.pdf
cp467_12_lecture14_image compression1.pdfshaikmoosa2003
 
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docxHW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docxwellesleyterresa
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithmSiva Rushi
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA EncryptionNathan F. Dunn
 
Fourier project presentation
Fourier project  presentationFourier project  presentation
Fourier project presentation志璿 楊
 

Similar to Implementation of RSA Algorithm for Speech Data Encryption and Decryption (20)

PKC&RSA
PKC&RSAPKC&RSA
PKC&RSA
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA Encryption
 
Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...
 
EEG, MEG and FieldTrip
EEG, MEG and FieldTripEEG, MEG and FieldTrip
EEG, MEG and FieldTrip
 
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
 
Ntewrok secuirty cs7
Ntewrok secuirty cs7Ntewrok secuirty cs7
Ntewrok secuirty cs7
 
Big Data Day LA 2016/ Hadoop/ Spark/ Kafka track - Data Provenance Support in...
Big Data Day LA 2016/ Hadoop/ Spark/ Kafka track - Data Provenance Support in...Big Data Day LA 2016/ Hadoop/ Spark/ Kafka track - Data Provenance Support in...
Big Data Day LA 2016/ Hadoop/ Spark/ Kafka track - Data Provenance Support in...
 
Rsa algorithm
Rsa algorithmRsa algorithm
Rsa algorithm
 
Surrey dl-4
Surrey dl-4Surrey dl-4
Surrey dl-4
 
rsa-1
rsa-1rsa-1
rsa-1
 
rsa-1
rsa-1rsa-1
rsa-1
 
RSA Algorithm.ppt
RSA Algorithm.pptRSA Algorithm.ppt
RSA Algorithm.ppt
 
3320 cyclic codes.ppt
3320 cyclic codes.ppt3320 cyclic codes.ppt
3320 cyclic codes.ppt
 
Signyourd digital signature certificate provider
Signyourd   digital signature certificate providerSignyourd   digital signature certificate provider
Signyourd digital signature certificate provider
 
Asymmetric Encryption with RSA
Asymmetric Encryption with RSAAsymmetric Encryption with RSA
Asymmetric Encryption with RSA
 
cp467_12_lecture14_image compression1.pdf
cp467_12_lecture14_image compression1.pdfcp467_12_lecture14_image compression1.pdf
cp467_12_lecture14_image compression1.pdf
 
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docxHW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
 
RSA & MD5 algorithm
RSA & MD5 algorithmRSA & MD5 algorithm
RSA & MD5 algorithm
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA Encryption
 
Fourier project presentation
Fourier project  presentationFourier project  presentation
Fourier project presentation
 

More from Md. Ariful Hoque

More from Md. Ariful Hoque (8)

Automated Payment Gateway for small shops
Automated Payment Gateway for small shopsAutomated Payment Gateway for small shops
Automated Payment Gateway for small shops
 
µIP (micro IP)
µIP (micro IP)µIP (micro IP)
µIP (micro IP)
 
Poz Software
Poz SoftwarePoz Software
Poz Software
 
Show me
Show meShow me
Show me
 
Decision Tree Learning
Decision Tree LearningDecision Tree Learning
Decision Tree Learning
 
EIMS software for schools
EIMS software for schoolsEIMS software for schools
EIMS software for schools
 
Cost effective arena active protection system
Cost effective arena active protection systemCost effective arena active protection system
Cost effective arena active protection system
 
Amazon ec2cluster
Amazon ec2clusterAmazon ec2cluster
Amazon ec2cluster
 

Recently uploaded

zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzohaibmir069
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )aarthirajkumar25
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Sérgio Sacani
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​kaibalyasahoo82800
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...Sérgio Sacani
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 
TOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsTOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsssuserddc89b
 
Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)DHURKADEVIBASKAR
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxyaramohamed343013
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxUmerFayaz5
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...Sérgio Sacani
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfnehabiju2046
 
Luciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxLuciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxAleenaTreesaSaji
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 

Recently uploaded (20)

zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistan
 
Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )Recombination DNA Technology (Nucleic Acid Hybridization )
Recombination DNA Technology (Nucleic Acid Hybridization )
 
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
Discovery of an Accretion Streamer and a Slow Wide-angle Outflow around FUOri...
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
Nanoparticles synthesis and characterization​ ​
Nanoparticles synthesis and characterization​  ​Nanoparticles synthesis and characterization​  ​
Nanoparticles synthesis and characterization​ ​
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
9953056974 Young Call Girls In Mahavir enclave Indian Quality Escort service
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 
TOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsTOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physics
 
Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)Recombinant DNA technology( Transgenic plant and animal)
Recombinant DNA technology( Transgenic plant and animal)
 
Scheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docxScheme-of-Work-Science-Stage-4 cambridge science.docx
Scheme-of-Work-Science-Stage-4 cambridge science.docx
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
Animal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptxAnimal Communication- Auditory and Visual.pptx
Animal Communication- Auditory and Visual.pptx
 
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
All-domain Anomaly Resolution Office U.S. Department of Defense (U) Case: “Eg...
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
A relative description on Sonoporation.pdf
A relative description on Sonoporation.pdfA relative description on Sonoporation.pdf
A relative description on Sonoporation.pdf
 
Luciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptxLuciferase in rDNA technology (biotechnology).pptx
Luciferase in rDNA technology (biotechnology).pptx
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 

Implementation of RSA Algorithm for Speech Data Encryption and Decryption

  • 1. Md. Ariful Hoque Roll No: MSc 140202 Discipline : CSE Khulna University
  • 2. Data communication. Vital role of Cryptography. Phone communication. E-commerce. Pay-TV. Transmitting financial information. Video Conferencing. 2
  • 3. Cryptosystem. Encryption Decryption Symmetric cryptosystem. RSA cryptographic algorithm. Uses a pair of related keys - Private key Public key 3
  • 4. Record 500 Bangla speech words. Extract data. Stored in a text file as integer data. Encrypt and decrypt. 4
  • 5. Speech Word 5 Recording of Bangla speech words. Recorded as wav file. Sampling rate 8.00 KHz. Coded in 8 bits PCM.
  • 6. Speech Word Preprocessing and Data Extraction 6 Discard 58 bytes from beginning. Extract require voiced data. Contain silence, unvoiced and voice. Stored in a text file.
  • 7. Speech Word Preprocessing and Data Extraction Public key {e, n} 7
  • 8. Speech Word Preprocessing and Data Extraction Encryption Process 8 Public key {e, n}
  • 9. Speech Word Preprocessing and Data Extraction Encryption Process Private key {d, n} Public key {e, n} 9
  • 10. Speech Word Preprocessing and Data Extraction Encryption Process Decryption Process Public key {e, n} 10 Private key {d, n}
  • 11. Speech Word Preprocessing and Data Extraction Encryption Process Decryption Process Original Speech Word Private key {d, n} Public key {e, n} 11
  • 12. 12
  • 13. 13 Random Number Generator
  • 14. 14 Random Number Generator Rand FIFO
  • 15. 15 Random Number Generator Rand FIFO Primality Tester
  • 16. 16 Random Number Generator Rand FIFO Primality Tester Prime FIFO
  • 17. 17 Random Number Generator Rand FIFO Primality Tester Prime FIFO N=p*q ∅(n)=(p-1)(q-1)
  • 18. 18 Random Number Generator Rand FIFO Primality Tester Prime FIFO N=p*q ∅(n)=(p-1)(q-1) n
  • 19. 19 Random Number Generator Rand FIFO Primality Tester Prime FIFO N=p*q ∅(n)=(p-1)(q-1) gcd(e, ∅(n))=1 1<e< ∅(n) n
  • 20. 20 Random Number Generator Rand FIFO Primality Tester Prime FIFO N=p*q ∅(n)=(p-1)(q-1) gcd(e, ∅(n))=1 1<e< ∅(n) e n
  • 21. 21 Random Number Generator Rand FIFO Primality Tester Prime FIFO N=p*q ∅(n)=(p-1)(q-1) gcd(e, ∅(n))=1 1<e< ∅(n) e.d =1mod ∅(n 0 ≤d ≤n e n
  • 22. 22 Random Number Generator Rand FIFO Primality Tester Prime FIFO N=p*q ∅(n)=(p-1)(q-1) gcd(e, ∅(n))=1 1<e< ∅(n) e.d =1mod ∅(n 0 ≤d ≤n d e n
  • 23. 23  Public key e n
  • 24. 24 e n d n  Public key  Private key
  • 25. 25 M
  • 26. 26 M e n
  • 27. 27 M e n Modular Exponentiation Me mod n
  • 28. 28 M e n Modular Exponentiation C Me mod n
  • 29. 29 C
  • 30. 30 C d n
  • 31. 31 C d n Modular Exponentiation Cd mod n
  • 32. 32 C d n Modular Exponentiation M Cd mod n
  • 33. 33 Input: A, B, n Output: E = AB mod n LR binary method E <= 1; for i = k-1 to 0 If Bi =1 E <= A*E mod n end if if i ≠ 0 E <= E*E mod n; end if end for return E;
  • 34. 34
  • 35. Objective. 500 speech words recorded. Saved as .wav format. Extracted integer data. Taken txt file as input. Produce unreadable message. 35
  • 36. RSA algorithm used to encrypt and decrypt. M lies in the range . Encrypt 500 word at a time. Limitations. 36