DOI QR코드

DOI QR Code

Incorporating RSA with a New Symmetric-Key Encryption Algorithm to Produce a Hybrid Encryption System

  • Prakash Kuppuswamy (Computer Networks Engineering Department, College of CS & IT, Jazan University) ;
  • Saeed QY Al Khalidi (Department of Information science, King Khalid University) ;
  • Nithya Rekha Sivakumar (Department of Computer Science & Engineering, Princes Nourah Bint Abdulrahman University)
  • Received : 2024.01.05
  • Published : 2024.01.30

Abstract

The security of data and information using encryption algorithms is becoming increasingly important in today's world of digital data transmission over unsecured wired and wireless communication channels. Hybrid encryption techniques combine both symmetric and asymmetric encryption methods and provide more security than public or private key encryption models. Currently, there are many techniques on the market that use a combination of cryptographic algorithms and claim to provide higher data security. Many hybrid algorithms have failed to satisfy customers in securing data and cannot prevent all types of security threats. To improve the security of digital data, it is essential to develop novel and resilient security systems as it is inevitable in the digital era. The proposed hybrid algorithm is a combination of the well-known RSA algorithm and a simple symmetric key (SSK) algorithm. The aim of this study is to develop a better encryption method using RSA and a newly proposed symmetric SSK algorithm. We believe that the proposed hybrid cryptographic algorithm provides more security and privacy.

Keywords

References

  1. Willett M, "Cryptography old and new", Science Direct Computers & Security, pp. 177-186, 1982. 
  2. Lin H S, "Cryptography and Public Policy", Journal of Government Information, pp. 135-148, 1998. 
  3. Alia M.A, Yahya A, "Public-Key Steganography Based on Matching Method", European Journal of Scientific Research, pp. 223-231, 2010. 
  4. Kumar S, Wollinger T, "Fundamentals of Symmetric Cryptography", Embedded Security in Cars, pp. 125-143, 2006. 
  5. Burke J, McDonald J, Austin T, "Architectural support for fast symmetric-key cryptography", Association for Computing Machinery, Volume 34, pp 178-189, 2000. 
  6. Mohapatra,P.K, "Public-Key Cryptography", XRDS: Crossroads, The ACM Magazine for students, Vol.7, 2000. 
  7. Palanisamy V, Jeneba Mary A, "Hybrid cryptography by the implementation of RSA and AES", International Journal of Current Research,Vol. 33, Issue, 4, pp.241-244, April, 2011. 
  8. Prakash Kuppuswamy, Saeed Q Y Al-Khalidi, "Implementation of security through simple symmetric key algorithm based on modulo 37", Council for Innovative Research, International Journal of Computers & Technology, www.ijctonline.com,ISSN:2277-3061, Volume 3 No. 2, OCT, 2012. 
  9. Ijaz Ali Shoukat, Kamalrulnizam Abu Bakar, Subariah Ibrahim, "A Generic Hybrid Encryption System (HES)", Research Journal of Applied Sciences, Engineering and Technology 5(9): 2692-2700, ISSN: 2040-7459; e-ISSN: 2040-7467 Maxwell Scientific Organization, 2013.  https://doi.org/10.19026/rjaset.5.4793
  10. Praphul M.N, Nataraj K.R, "FPGA Implementation of Hybrid Cryptosystem", International Journal of Emerging Science and Engineering (IJESE) ISSN: 2319-6378, Volume-1, Issue-8, June 2013. 
  11. Amritpal Singh, Mohit Marwaha, Baljinder Singh, Sandeep Singh , "Comparative Study of DES, 3DES, AES and RSA", Council for Innovative Research International Journal of Computers & Technology, Vol 9, No 3 www.cirworld.com, July 25, 2013. 
  12. Fei Yao, "Hybrid Encryption Scheme for Hospital Financial Data Based on Noekeon Algorithm", Security and Communication Networks, Published 19 October 2021. 
  13. Ali TS, Ali R, "A Novel Medical Image Signcryption Scheme Using TLTS and Henon Chaotic Map", in IEEE Access, vol. 8, pp. 71974-71992, 2020.  https://doi.org/10.1109/ACCESS.2020.2987615
  14. Sujithra M, Padmavathi G, Narayanan S, "Mobile device data security: A cryptographic approach by outsourcing mobile data to cloud", Procedia Computer Science, vol. 47, pp. 480-485, 2015. https://doi.org/10.1016/j.procs.2015.03.232
  15. Oladeji P. Akomolafe, Matthew O. Abodunrin, "A Hybrid Cryptographic Model for Data Storage in Mobile Cloud Computing", I. J. Computer Network and Information Security, Vol.6, pp. 53-60, 2017. 
  16. Ali Abdulridha Taha, Diaa Salama Abd Elminaam, Khalid M. Hosny Far, "An improved security scheme for mobile cloud computing using Hybrid cryptographic algorithms", East Journal of Electronics and Communications, Volume 18, Number 4, 2018, Pages 521-546, 2018. https://doi.org/10.17654/EC018040521
  17. Schneier B, "Applied Cryptography", New York: John Wiley & Sons, 1996. 
  18. Herschel, John Frederick William (1820), Book: "Part III. Section I. Examples of the Direct Method of Differences". A Collection of Examples of the Applications of the Calculus of Finite Differences. Cambridge, UK: Printed by J. Smith, sold by J. Deighton & sons. pp. 1-13 [5-6]. Accessed on 26/12/2021.
  19. Sarbajit Manna, Mohit Prajapati, Ayan Sett, Kallol Banerjee, Saurabh Dutta, "Design and implementation of a two-layered hybrid cryptosystem", International Conference on Security for Information Technology and Communications SECITC, pp 85-96, 2017. 
  20. Maksim Iavich, Sergiy Gnatyuk, Elza Jintcharadze, Yuliia Polishchuk, Roman Odarchenko, "Hybrid Encryption Model of AES and ElGamal Cryptosystems for Flight Control Systems", IEEE 5th International Conference on Methods and Systems of Navigation and Motion Control (MSNMC), 2018.
  21. Wang Z, Dong H, Chi Y, Zhang J, Yang T, Liu Q, "Research and Implementation of Hybrid Encryption System Based on SM2 and SM4 Algorithm", Proceedings of the 9th International Conference on computer Engineering and Networks, Advances in Intelligent Systems and Computing Vol.1143, Springer July 2020. 
  22. Thillaiarasu N, Chenthur Pandian S, Naveen Balaji G, Benitha Shierly M, Divya A, Divya Prabha G, "Enforcing Confidentiality and Authentication over Public Cloud Using Hybrid Cryptosystems", International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI), pp 1495-1503, 2018.
  23. Miroslaw Malek, Mohan guruswamy, Howard Owens, Minhir pandya, "A Hybrid Algorithm Technique" Technical Report -89-06, March 1989.