<?xml version="1.0"?>
<records>
  <record>
    <language>eng</language>
    <publisher>Ansari Education and Research Society</publisher>
    <journalTitle>Journal of Ultra Scientist of Physical Sciences</journalTitle>
    <issn/>
    <eissn/>
    <publicationDate>December 2008 </publicationDate>
    <volume>20</volume>
    <issue>3</issue>
    <startPage>749</startPage>
    <endPage>756</endPage>
    <doi>jusps-B</doi>
    <publisherRecordId>1400</publisherRecordId>
    <documentType>article</documentType>
    <title language="eng">Public key cryptography-implementation using R-2R ladder network </title>
    <authors>
      <author>
        <name>Davinder Singh</name>
        <affiliationId>1</affiliationId>
      </author>
      <author>
        <name>Ravinder Rathee </name>
        <affiliationId>2</affiliationId>
      </author>
      <author>
        <name>Manoj Duhan (duhan.manoj@yahoo.com)</name>
        <affiliationId>3</affiliationId>
      </author>
    </authors>
    <affiliationsList>
      <affiliationName affiliationId="1">Lect. Meri - College of Engineering &amp; Technology, Near Sampla, Bahadugarh</affiliationName>
      <affiliationName affiliationId="2">H.O.D, Computer Department, C.R., Polytechnic, Rohtak (INDIA)</affiliationName>
      <affiliationName affiliationId="3">Chairman, Electronics &amp; Commerce Department, GJUS &amp; T, Hisar (INDIA)</affiliationName>
    </affiliationsList>
    <abstract language="eng">&lt;p style="text-align: justify;"&gt;Cryptography is the art of achieving security by encoding messages to keep the information non-readable. Cryptography actually is a mathematical scrambling and unscrambling of data to achieve, Confidentiality (Readable only to sender and receiver); Integrity (not modified by any one to integrity of message); Non repudiation (sender can&amp;#39;t refuse the claim of not sending); and Entity authentication. While sending or receiving the data, special keys are used to encrypt/decrypt data to verify the original contents. This key makes the process of cryptography secure. Public key systems use two keys such that one key, the public key, can be used to encrypt some text that can then only be decrypted using the securely-held private key. There are two approaches for the generation of encryption/decryption keys&lt;em&gt; i.e.&lt;/em&gt; software and hardware. The purpose of this paper is to generate encryption key using hardware technique. To design electronics circuit basic concept is derived from the Knapsack problem. Then R-2R ladder network is used for the implementation of Knapsack algorithm. The electronics circuit design is evaluated using (ORCAD-Pcpise) software and analyzed practically on electronics bread board as well. The circuit implementation aim is achieved through many intermediate steps which are followed as firstly terminology and transformation are defined foe public key cryptography, then the knapsack problem is discussed and after that knapsack algorithm (greedy algorithm) is achieved using the electronics circuits. Some modification also has been discussed to make circuit more practical and more secure.&lt;/p&gt;&#xD;
</abstract>
    <fullTextUrl format="html">https://ultraphysicalsciences.org/paper/1400/</fullTextUrl>
    <keywords>
      <keyword language="eng">Public key</keyword>
    </keywords>
    <keywords>
      <keyword language="eng"> cryptography-implementation</keyword>
    </keywords>
    <keywords>
      <keyword language="eng">R-2R ladder network </keyword>
    </keywords>
  </record>
</records>
