An OTP Integrated Optimal Key RSA Based Secure Data Communication
Mrinmoy Sarkar1, Asok Kumar2, Bansibadan Maji3

1Mrinmoy Sarkar*, ECE, Bankura Unnayani Institute of Engineering, Bankura, W.B.
2Asok Kumar, ECE, Name MCKV Institute of Engineering, Howrah,W.B.
3Bansibadan Maji, ECE, NIT, Durgapur, India.
Manuscript received on January 26, 2020. | Revised Manuscript received on February 05, 2020. | Manuscript published on February 30, 2020. | PP: 2144-2151 | Volume-9 Issue-3, February 2020. | Retrieval Number: C5471029320/2020©BEIESP | DOI: 10.35940/ijeat.C5471.029320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: System security is a basic aspect of data sharing. Aspires have been made to exhaust particular defects over the web. For this, different creative usage and security methods have been made. The measure of information exchange isn’t a factor. The major factor is, how much it’s secure, the channel gives while transmitting information. Cryptography is one such structure, which grants secure information transmission without losing its protection and uprightness. In light of the key circulation, cryptography is also assembled into two critical forms Symmetric Key Cryptography as well as Asymmetric Key Cryptography. RSA is one of the best conspicuous public-key cryptography based algorithms is unequivocally utilized for encryption/decryption. It’s far based on the logical arrangement of factorization of strongly enormous whole numbers which is a compute-intensive way. In this paper, we have provided a novel, secure and profitable information communication system dependent on the RSA algorithm. Mystery updating signal dealing with systems have been proposed in the exploration for the two data transmission and the channel estimation stages. The proposed one facilitates the advantages of both RSA calculation and One Time Password (OTP) produced by the sender and got just by the endorsed customer. Despite that not at all like conventional RSA algorithm, in this work we embrace perfect key assurance by particle swarm optimization (PSO) during both encryption and decryption. The use of PSO for perfect key decision makes the general technique proficient by extending the security level and making the computation procedure very easy.
Keywords: Cryptography, One Time Password (OTP), Particle Swarm Optimization (PSO), RSA, Signal Processing.