International Journal Of Engineering And Computer Science
In this paper the authors provide security that has to be implemented in the network path. The vital part of this can be effectively programmed so that the data are sent in encrypted form. Among the fool proof algorithms that are in existence they chose RSA to be implement. The factoring challenge was intended to track the cutting edge in integer factorization. A primary application is for choosing the key length of the RSA encryption scheme. Progress in this challenge should give an insight into which key sizes are still safe and for how long.