This paper is published in Volume-4, Issue-2, 2018
Area
Computer Science
Author
Vikas, Amit Puri, Barjinder Singh
Org/Univ
Global Institute of Management and Emerging Technologies, Sohian Khurd, Amritsar, Punjab, India
Pub. Date
24 April, 2018
Paper ID
V4I2-2081
Publisher
Keywords
DNS security, DNS spoofing, RSA algorithm, Bit stuffing, DNS attacks

Citationsacebook

IEEE
Vikas, Amit Puri, Barjinder Singh. Modified RSA algorithm with bit stuffing to enhance DNS security, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Vikas, Amit Puri, Barjinder Singh (2018). Modified RSA algorithm with bit stuffing to enhance DNS security. International Journal of Advance Research, Ideas and Innovations in Technology, 4(2) www.IJARIIT.com.

MLA
Vikas, Amit Puri, Barjinder Singh. "Modified RSA algorithm with bit stuffing to enhance DNS security." International Journal of Advance Research, Ideas and Innovations in Technology 4.2 (2018). www.IJARIIT.com.

Abstract

We use the Internet every day. The Internet relies on its very foundations on DNS, the Domain Name System. DNS continues to be a nice target for hackers. The possibilities a hacker can expect should he succeed in taking over a server or simply use DNS implementation to reorientate traffic, are some of the things which make DNS a source of security issues. In the last many years, several security flaws have been discovered in the protocol and its specific implementations. DNS spoofing one of the major threat to DNS Server. DNS cache poisoning, also known as DNS spoofing, is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones. In our work, we have developed a robust algorithm that is combination of (RSA + bit stuffing), i.e. RSA accounts for legacy of user by providing the Digital signature, while bit stuffing is used digesting the message so that it remain confidential for the intruders, if any changes persist (violation of integrity) destination can’t decipher the message with the help of public key of sender. So this way we can provide more robustness for DNS.