CFP last date
20 May 2024
Reseach Article

Enhancing Cryptographic Security using Novel Approach based on Enhanced-RSA and Elamal: Analysis and Comparison

by Shaina Arora, Pooja
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 112 - Number 13
Year of Publication: 2015
Authors: Shaina Arora, Pooja
10.5120/19730-1429

Shaina Arora, Pooja . Enhancing Cryptographic Security using Novel Approach based on Enhanced-RSA and Elamal: Analysis and Comparison. International Journal of Computer Applications. 112, 13 ( February 2015), 35-39. DOI=10.5120/19730-1429

@article{ 10.5120/19730-1429,
author = { Shaina Arora, Pooja },
title = { Enhancing Cryptographic Security using Novel Approach based on Enhanced-RSA and Elamal: Analysis and Comparison },
journal = { International Journal of Computer Applications },
issue_date = { February 2015 },
volume = { 112 },
number = { 13 },
month = { February },
year = { 2015 },
issn = { 0975-8887 },
pages = { 35-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume112/number13/19730-1429/ },
doi = { 10.5120/19730-1429 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:49:25.760113+05:30
%A Shaina Arora
%A Pooja
%T Enhancing Cryptographic Security using Novel Approach based on Enhanced-RSA and Elamal: Analysis and Comparison
%J International Journal of Computer Applications
%@ 0975-8887
%V 112
%N 13
%P 35-39
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography is generated to create secure data transmission over networks. The algorithm chosen for cryptography should satisfy the conditions of authentication, confidentiality, integrity and non-repudiation. Recent years have witnessed the phenomenal growth of RSA. We design an algorithm to merge both enhanced RSA algorithm and El-Gamal algorithm to provide user with a higher level of data security. The enhanced RSA algorithm enables faster encryption and decryption process and generating public and private key faster than the original RSA. The Enhanced RSA Cryptosystem is based on Integer Factorization Problem (IFP), while the El-Gamal Cryptosystem is based on Discrete Logarithm Problem (DLP). This model works on the basis of combining IFP and DLP. The weaknesses of RSA algorithm when we use two prime's number are the following points which are used to break the algorithm in most cases. These weaknesses are: (a) Small encryption exponent, if you use a small exponent like e=3 and send the same message to different recipients. (b) Using the Same key for encryption and signing. (c) There is no secure Method to Transfer the Public Key From Sender to the Reciever. It Only provides the mechanism of generating Public and Private Keys. Enhanced RSA works on the Existence of three Prime Numbers that will give the ability to the enhanced encryption method to increase the difficulty of factoring of the variable (n), Its speed increases the process of encryption and decryption. While generating variable (n) by original RSA algorithm, this generate the public and private key that contains the number of 500 digits by using two primes number with 200 digits each. Multiplication process will take longer than the time to generating the same variable (n) by using three prime numbers where each number with 200 digits. In another case more complexity of the algorithm is increased by combining the other asymmetric El- Gamal algorithm.

References
  1. Stallings, William; cryptography and network security; fourth edition; 2005; ISBN: 0-13-187316-4
  2. Norman D. Jorstad, CRYPTOGRAPHICALGORITHM METRICS, January 1997.
  3. http://searchsoftwarequality. techtarget. com/definition/ cryptography
  4. http://searchsecurity. techtarget. com/definition/Data-Encryption-Standard
  5. http://www. truecrypt. org/docs/aes
  6. http://en. citizendium. org/wiki/Rivest_ciphers
  7. https://www. schneier. com/blowfish. html
  8. http://searchsecurity. techtarget. com/definition/RSA
  9. http://www. emc. com/emc-plus/rsa-labs/standards-initiatives/advantages-and disadvantages. htm
  10. http://searchsecurity. techtarget. com/definition/Diffie-Hellman-key-exchange
  11. http://technet. microsoft. com/en-us/library/ cc962033. aspx
  12. http://www. princeton. edu/~achaney/tmve/wiki100k/ docs/ElGamal_encryption. html
  13. markus-jakobsson. com/papers/jakobsson-siacrypt00. pdf?
  14. http://x5. net/faqs/crypto/q29. html
  15. http://www. accuhash. com/what-is-md5. html
  16. http://pcsupport. about. com/od/termsm/g/md5. htm
  17. Jassim Mohammed Ahmed, Zulkarnain Md Ali (2011), "The Enhancement of Computation Technique By Combining RSA and El-Gamal Cryptosystems", Page(s): 1 – 5.
  18. Prof. Dr. Alaa Hussein Al-Hamami, Ibrahem Abdallah Aldariseh (2012)," Enhanced Method for RSA Cryptosystem Algorithm" International Conference on Advanced Computer Science Applications and Technologies, Page(s):402-408.
  19. Rashmi PS,Dr. Varghese Paul,"A Hybrid Crypto System based on a new Circle-Symmetric key Algorithm & RSA with CRT Asymmetric key Algorithm for E-commerce Applications". International Conference on VLSI, Communication & Instrumentation (ICVCI) 2011. Page(s):14-18.
  20. Taher El-Gamal,"A Public Key Cryptosystem and a Signature Scheme Based on Discrete Algorithm", IEEE transactions on information theory.
  21. Lein Harn, Manish Mehta, Wen-Jung Hsin,"Integrating Diffie-Hellman Key Exchange into Digital Signature Algorithm (DSA)", IEEE Communication Letters, March 2004
  22. Ramesh A,Suruliandi A. (2013) "Performance Analysis of Encryption Algorithms for Information Security, Circuits, Power and Computing Technologies (ICCPCT), Page(s): 840 – 844.
  23. Mandal, B. K. Bhattacharyya, D. Bandyopadhyay, (2013) "Designing and Performance Analysis of a Proposed Symmetric Cryptography Algorithm" Page(s): 453 – 461.
  24. Deewangan,C. P. , Agarwal,S. , Mandal, A. K. Tiwari, A. (2012) "Study of avalanche effect in AES using binary codes", Advanced Communication Control and Computing Technologies (ICACCCT), 2012 IEEE International Conference, Page(s): 183 – 187.
  25. Mandal, A. K. ; Parakash, C. ; Tiwari, A. (2012) "Performance Evaluation of Cryptographic Algorithms: DES and AES", Electrical, Electronics and Computer Science (SCEECS), Page(s): 1 – 5.
  26. Alani, M. M. (2012) "Neuro-Cryptanalysis of DES", Internet Security (WorldCIS),Page(s): 23 – 27.
  27. Moh'd. A, Jararweh, Y. Tawalbeh. (2011) "AES-512: 512-Bit Advanced Encryption Standard Algorithm Design and Evaluation", Information Assurance and Security (IAS), Page(s): 292 – 297.
  28. Wang Rui,Chen Ju ,Duan Guangwen (2011) "Ak-RSA Algorithm ",Communication Software and Networks (ICCSN) , Page(s): 21 – 24.
  29. Wang, Suli,Liu, Ganlai (2011) "File encryption and decryption system based on RSA algorithm", Computational and Information Sciences (ICCIS), Page(s): 797 – 800.
  30. Li Dongjiang,Wang Yandan,Chen Hong (2012) "The research on key generation in RSA public- key cryptosystem", Page(s): 578 – 580.
  31. Boldyreva, A. Imai, H. Kobara, (2010) "How to Strengthen the Security of RSA-OAEP", Information Theory , Page(s): 5876 – 5886.
  32. Alani, M. M. (2010) "DES96-Improved DES Security", Systems Signals and Devices (SSD), Page(s): 1 – 4.
  33. HongweiSi, YoulinCai, ZhimeiCheng (2010) " An Improved RSA Signature Algorithm Based on Complex Numeric Operation Function", Challenges in Environmental Science and Computer Engineering (CESCE), Page(s): 397 – 400.
  34. Da Silva,J. C. L. (2010) "Factoring Semi primes and Possible Implications for RSA", Electrical and Electronics Engineers in Israel (IEEEI), Page(s): 000182 – 000183.
  35. Tingyuan Nie, Chuanwang Song, Xulong Zhi (2010)," Performance Evaluation of DES and Blowfish Algorithms", Biomedical Engineering and Computer Science, Page(s): 1 – 4.
  36. Jong-Yeon Park, Okyeon Yi, Ji-Sun Choi (2010) "Methods for Practical Whitebox Cryptography", Information and Communication Technology Convergence (ICTC) , Page(s): 474 – 479.
  37. Kumar R. ,Verma H. K. (2010) " An Advanced Secure (t, n) Threshold Proxy Signature Scheme Based on RSA Cryptosystem for Known Signers ", Advance Computing Conference (IACC) , Page(s): 293 – 298.
  38. Dhall. S, S. K. Pal (2010) "Design of a New Block Cipher Based on Conditional Encryption", Information Technology: New Generations (ITNG), Page(s): 714-718.
  39. Nagar S. A. , Alshamma. S. (2010) "High speed implementation of RSA along with modified keys exchange", Sciences of Electronic Technologies of Information and Telecommunications (SETIT), Page(s): 639-642.
  40. Fei Shao, Zinan Chang, Yi Zhang (2010) "AES Encryption Algorithm Based on the High Performance Computing of GPU", Communication Software and Networks, Page(s): 588 – 590.
  41. Qamar Saeed,Tariq Basir,Saeed Ul Haq,Nadia Zia,Mustaq A. Paracha(2006) "Mathematical Hard Problems in Modern Public-Key Cryptosystem" International Conference on Emerging Technologies Page(s):456-460
  42. R. L. Rivest , A. Shamir , L. Adleman (1978) "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems" MIT Laboratory for Computer Science and Department of Mathematics. Page(s):120-130
  43. Ravi Shankar Dhakar, Amit Kumar Gupta ,Prashant Sharma (2012) "Modified RSA Encryption Algorithm" Second International Conference on Advanced Computing & Communication Technologies. Page(s): 426-429
Index Terms

Computer Science
Information Sciences

Keywords

Security Cryptography RSA algorithm