IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 8 - Issue 10, October 2019 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Hybrid Cryptosystem Using RSA, DSA, Elgamal, And AES

[Full Text]

 

AUTHOR(S)

Levinia B. Rivera, Jazzmine A. Bay, Edwin R. Arboleda, Marlon R. Pereña and Rhowel M. Dellosa

 

KEYWORDS

AES, Algorithm, El Gamal, DSA, RSA, Encryption, Symmetric, Asymmetric

 

ABSTRACT

The integration and combination of an asymmetric and symmetric algorithm such as RSA, ElGamal, DSA, and AES were presented. Hybrid encryption has been used to ensure integrity in terms of data exchanged between the sender and receiver. The strength of the asymmetric algorithm such as RSA depends on the difficult process of factorization of large prime integers while the ElGamal’s security lies on Discrete Logarithm Problem (DLP). The symmetric algorithm is known to process the encryption faster than the asymmetric algorithm. Key generation of DSA is merged in the proposed algorithm. DSA is recognized for its fast signature algorithm while the AES S-Box is used to hash the ciphertext obtained. AES strength is its fast expansion key tone. Experiment’s result is presented to analyze the effectiveness of the proposed algorithm.

 

REFERENCES

[1] M. Preetha and M. NIthaya, “A Study and Performance Analysis of RSA Algorithm,” Int. J. Comput. Sci. Mob. Comput., vol. 2, no. 2320–088X, pp. 126–139, 2013.
[2] A. Sanada, Y. Nogami, K. Iokibe, and A. Khandaker, “Security Analysis of Raspberry Pi Against Side-Channel Attack with RSA Cryptography,” pp. 287–288, 2017
[3] S. Dey, J. Nath, and A. Nath, “An Integrated Symmetric Key Cryptographic Method - Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation, and Reversal Method: SJA Algorithm,” Int. J. Mod. Educ. Comput. Sci., vol. 4, no. 5, pp. 1–9, 2012.
[4] Malhotra M. A New Encryption Scheme Based on Enhanced RSA and ElGamal. Int J Emerg Technol Comput Appl Sci ( IJETCAS ). 2014;1:138–42.
[5] Arboleda ER. Secure and Fast Chaotic El Gamal Cryptosystem. Int J Eng Adv Technol. 2019;8(5):1693–9.
[6] Asaithambi N. A Study on Asymmetric Key Cryptography Algorithms. International Journal of Computer Science and Mobile Applications, Vol.3 Issue. 4, April- 2015, pg. 8-13
[7] Elminaam, Diaa Salama Abd, Abdual Kader, Hatem Mohamed & Hadhoud, Mohiy Mohamed. “Evaluating The Performance of Symmetric Encryption Algorithms”. International Journal of Network Security, Vol.10, No.3, May 2010, pp. 216
[8] Thakur J, Kumar N. DES, AES, and Blowfish : Symmetric Key Cryptography Algorithms Simulation-Based Performance Analysis. International Journal of Emerging Technology and Advanced Engineering 2011;1(2):6–12.
[9] E. Zakasovskaya, A. Glushchenko, and V. Tarasov, "Construction of asymmetric cryptosystems using finite non-commutative algebraic groups," 2017 International Conference on Industrial Engineering, Applications and Manufacturing (ICIEAM), St. Petersburg, 2017, pp. 1-5. doi: 10.1109/ICIEAM.2017.8076440
[10] Arboleda ER, Balaba JL, Espineli JCL. Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Scheduling. Bull Electr Eng Informatics. 2017;6(3):219–27.
[11] Espalmado JMB, Arboleda ER. DARE Algorithm : A New Security Protocol by Integration of Different Cryptographic Techniques. Int J Electrical Comput Eng. 2017;7(2):1032–41.
[12] Mahajan P, Sachdeva A. A Study of Encryption Algorithms AES, DES and RSA for Security. Global Journal of Computer Science and Technology Network, Web & Security 2013;13 (15): 14-22
[13] Rivest RL, Shamir A, L. A method for obtaining digital signatures and public-key cryptosystems. Commun ACM. 1978;21(2):120-126. doi:10.1145/359340.359342
[14] Data Encryption and Decryption Using RSA Algorithm in a Network Environment. IJCSNS Int J Comput Sci Netw Secur. 2013; 13(7): 9–13.
[15] Shankar M. Hybrid Cryptographic Technique Using RSA. Int J Netw Secur Its Appl. 2014; 6(6): 39– 48.
[16] Singh G. A Study of Encryption Algorithms (RSA, DES, 3DES, and AES) for Information Security. Int J Comput Appl. 2013; 67(19): 975–8887. Available from: http://research.ijcaonline.org/volume67/number19/pxc3887224.pdf
[17] Chadha A. Dual-Layer Video Encryption using RSA Algorithm Dual-Layer Video Encryption using RSA Algorithm. Int J Adv Res Ideas Innov Technol. 2015; 116(August): 33–40.
[18] Karakra A, Alsadeh A. A-RSA: Augmented RSA. Proc 2016 SAI Comput Conf SAI 2016. 2016; (September): 1016–23.
[19] Ahmed JM, Ali ZM. The Enhancement of Computation Technique by Combining RSA and El-Gamal Cryptosystems. Proc 2011 Int Conf Electr Eng Informatics, ICEEI 2011. 2011; (July).
[20] R Pahal and V Kumar, “Efficient Implementation of AES,” in International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 7, July 2013,pp.290-295
[21] D Jayasinghe, J Fernando, R Herath, and R Ragel, “Remote Cache Timing Attack on Advanced Encryption Standard and Countermeasure,” in IEEE International Conference on Information and Automation for Sustainability (ICIAFs),pp. 177-182, Dec. 2010
[22] New Comparative Study Between DES, 3DES, and AES within Nine Factors Hamdan.O. Alanazi, B.B. Zaidan, A. Zaidan, Hamid A. Jalab, M. Shabbir and Y. Al-Nabhani JOURNAL OF COMPUTING, VOLUME 2, ISSUE 3, MARCH 2010, ISSN 2151-9617
[23] Comparative Study of Symmetric and Asymmetric Cryptography Techniques by Ritu Tripathi, Sanjay Agrawal compares Symmetric and Asymmetric Cryptography Techniques using throughput, key length, tunability, speed, encryption ratio, and security attacks. IJCSMS International Journal of Computer Science and Management Studies, Vol. 11, Issue 03, Oct 2011 ISSN (Online): 2231-5268
[24] T. El Gamal, “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Trans. Inf. THEORY, vol. 31, no. 4, pp. 469–472, 1985.
[25] Efficient Implementation of AES, RituPahal, Vikaskumar, Volume 3, Issue 7, July 2013 ISSN: 2277 128X, © 2013, IJARCSSE
[26] Dellosa R, Fajardo A and Medina R. “A New Method of Location Estimation for Fingerprinting Localization Technique of Indoor Positioning System ” ARPN Journal of Engineering and Applied Sciences 13 (48), 9427-9435