One of the cryptography classifications is asymmetric cryptography, which uses two different keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of asymmetric cryptography techniques. It is trying to present the domains of RSA scheme used including in public network, wireless sensor network, image encryption, cloud computing, proxy signature, Internet of Things and embedded device, based on the perspective of researchers’ effort in the last decade. Other than that, this paper reviewed the trends and the performance metrics of RSA scheme such as security, speed, efficiency, computational complexity and space based on the number of researches done. Finally, the technique and strengths of the proposed scheme are also stated in this paper.
In many of today’s computer application needs, faster operation is essential to the efficient implementation
of information security algorithm. RC4 has been used as the data encryption algorithm for many
applications and protocols including the Wi-Fi, Skype, and Bit Torrent to name a few. Several efficient
approaches to the implementation of RC4 have been proposed and we review some of those. More recently
some parallel approaches to faster implementation of RC4 have been presented and we include those in our
survey of efficient approaches to RC4. This paper presents an analysis of available hardware/software
parallel implementations of RC4 symmetric key-based algorithm and some security approaches which
make it more secure.
RSA is one of the most popular Public Key Cryptography based algorithm mainly used for digital
signatures, encryption/decryption etc. It is based on the mathematical scheme of factorization of very large
integers which is a compute-intensive process and takes very long time as well as power to perform.
Several scientists are working throughout the world to increase the speedup and to decrease the power
consumption of RSA algorithm while keeping the security of the algorithm intact. One popular technique
which can be used to enhance the performance of RSA is parallel programming. In this paper we are
presenting the survey of various parallel implementations of RSA algorithm involving variety of hardware
and software implementations.
This document discusses securely sharing data in multi-owner cloud environments for dynamic groups. It proposes a method for securely sharing data files with other users in a group on an untrusted cloud. The method supports dynamic groups where new users can access files uploaded before joining without contacting owners. User revocation is achieved through a revocation list without updating other users' secret keys. Encryption overhead is constant, independent of revoked users. The scheme provides secure access control and preserves user privacy by hiding identities from the cloud.
This document discusses searchable encryption systems and the current state of data security. It covers common uses of encryption like SSL and describes limitations of early encryption methods like Yao's Garbled Circuits. The document then focuses on fully homomorphic encryption, which allows computations on encrypted data without decrypting it first. While promising, homomorphic encryption has limitations in speed and potential security issues that require more research to address.
This document discusses the OSI security architecture and its key concepts of security attacks, mechanisms, and services. It defines security attacks as any action compromising information security, security mechanisms as tools to detect, prevent or recover from attacks, and security services as services enhancing security. The document then discusses common types of security attacks like passive attacks involving unauthorized access and active attacks involving modifying information. It also outlines various cryptographic attacks against cryptosystems like ciphertext-only, known plaintext, chosen plaintext, and brute force attacks. Finally, it describes the main security services provided by cryptography as confidentiality, data integrity, authentication, and non-repudiation.
An Enhanced Encryption Technique using BCD and Bit ComplementationIRJET Journal
This document proposes an encryption technique that uses binary coded decimal (BCD) and bit complementation. The technique encrypts the key first using a two's complement before encrypting the data with the encrypted key. This provides three levels of encryption. The algorithm uses basic binary operations and computation, making it faster than other algorithms. An experimental analysis showed it outperformed similar variants in terms of performance. The document provides background on symmetric key cryptography and reviews related work on other encryption algorithms.
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONadeij1
Cloud storage services are a lot of well-liked today . To secure information from those that don't have access, several encoding schemes are projected. Most of the projected schemes assume cloud storage service suppliers or trustworthy third parties handling key management are trustworthy and can't be hacked; but, in follow, some entities could intercept communications between users and cloud storage suppliers and so compel storage suppliers to unleash user secrets by victimisation government power or alternative means that. During this case, encrypted information are assumed to be identified and storage suppliers are requested to unleash user secrets. Since it's tough to fight against outside coercion, we tend to aimed to create Associate in Nursing encoding theme that might facilitate cloud storage suppliers avoid this plight. We provide cloud storage suppliers means that to make pretend user secrets. Given such pretend user secrets, outside coercers will solely obtained solid information from a user’s keep cipher text. Once coercers suppose the received secrets are real, they'll be happy and a lot of significantly cloud storage suppliers won't have discovered any real secrets. Therefore, user privacy continues to be protected.
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
This document compares the performance of the RSA and RC4 encryption algorithms. An application was developed to encrypt text and image files of varying sizes (10-200KB) using RSA and RC4. The encryption time (TE) for each algorithm on each file size was measured and recorded. The results showed that RC4 had significantly faster encryption times than RSA for all file sizes, both for text and image files. However, RSA is considered more securely than RC4. In conclusion, while RSA is more secure, RC4 has better performance and faster encryption/decryption speeds compared to RSA.
In many of today’s computer application needs, faster operation is essential to the efficient implementation
of information security algorithm. RC4 has been used as the data encryption algorithm for many
applications and protocols including the Wi-Fi, Skype, and Bit Torrent to name a few. Several efficient
approaches to the implementation of RC4 have been proposed and we review some of those. More recently
some parallel approaches to faster implementation of RC4 have been presented and we include those in our
survey of efficient approaches to RC4. This paper presents an analysis of available hardware/software
parallel implementations of RC4 symmetric key-based algorithm and some security approaches which
make it more secure.
RSA is one of the most popular Public Key Cryptography based algorithm mainly used for digital
signatures, encryption/decryption etc. It is based on the mathematical scheme of factorization of very large
integers which is a compute-intensive process and takes very long time as well as power to perform.
Several scientists are working throughout the world to increase the speedup and to decrease the power
consumption of RSA algorithm while keeping the security of the algorithm intact. One popular technique
which can be used to enhance the performance of RSA is parallel programming. In this paper we are
presenting the survey of various parallel implementations of RSA algorithm involving variety of hardware
and software implementations.
This document discusses securely sharing data in multi-owner cloud environments for dynamic groups. It proposes a method for securely sharing data files with other users in a group on an untrusted cloud. The method supports dynamic groups where new users can access files uploaded before joining without contacting owners. User revocation is achieved through a revocation list without updating other users' secret keys. Encryption overhead is constant, independent of revoked users. The scheme provides secure access control and preserves user privacy by hiding identities from the cloud.
This document discusses searchable encryption systems and the current state of data security. It covers common uses of encryption like SSL and describes limitations of early encryption methods like Yao's Garbled Circuits. The document then focuses on fully homomorphic encryption, which allows computations on encrypted data without decrypting it first. While promising, homomorphic encryption has limitations in speed and potential security issues that require more research to address.
This document discusses the OSI security architecture and its key concepts of security attacks, mechanisms, and services. It defines security attacks as any action compromising information security, security mechanisms as tools to detect, prevent or recover from attacks, and security services as services enhancing security. The document then discusses common types of security attacks like passive attacks involving unauthorized access and active attacks involving modifying information. It also outlines various cryptographic attacks against cryptosystems like ciphertext-only, known plaintext, chosen plaintext, and brute force attacks. Finally, it describes the main security services provided by cryptography as confidentiality, data integrity, authentication, and non-repudiation.
An Enhanced Encryption Technique using BCD and Bit ComplementationIRJET Journal
This document proposes an encryption technique that uses binary coded decimal (BCD) and bit complementation. The technique encrypts the key first using a two's complement before encrypting the data with the encrypted key. This provides three levels of encryption. The algorithm uses basic binary operations and computation, making it faster than other algorithms. An experimental analysis showed it outperformed similar variants in terms of performance. The document provides background on symmetric key cryptography and reviews related work on other encryption algorithms.
SECURE CLOUD STORAGE USING DENIABLE ATTRIBUTE BASED ENCRYPTIONadeij1
Cloud storage services are a lot of well-liked today . To secure information from those that don't have access, several encoding schemes are projected. Most of the projected schemes assume cloud storage service suppliers or trustworthy third parties handling key management are trustworthy and can't be hacked; but, in follow, some entities could intercept communications between users and cloud storage suppliers and so compel storage suppliers to unleash user secrets by victimisation government power or alternative means that. During this case, encrypted information are assumed to be identified and storage suppliers are requested to unleash user secrets. Since it's tough to fight against outside coercion, we tend to aimed to create Associate in Nursing encoding theme that might facilitate cloud storage suppliers avoid this plight. We provide cloud storage suppliers means that to make pretend user secrets. Given such pretend user secrets, outside coercers will solely obtained solid information from a user’s keep cipher text. Once coercers suppose the received secrets are real, they'll be happy and a lot of significantly cloud storage suppliers won't have discovered any real secrets. Therefore, user privacy continues to be protected.
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
This document compares the performance of the RSA and RC4 encryption algorithms. An application was developed to encrypt text and image files of varying sizes (10-200KB) using RSA and RC4. The encryption time (TE) for each algorithm on each file size was measured and recorded. The results showed that RC4 had significantly faster encryption times than RSA for all file sizes, both for text and image files. However, RSA is considered more securely than RC4. In conclusion, while RSA is more secure, RC4 has better performance and faster encryption/decryption speeds compared to RSA.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
UNIT - 2
SYMMETRIC CIPHERS: Symmetric Cipher Model, Substitution Techniques,
Transposition Techniques, Simplified DES, Data encryption standard (DES), The strength of
DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of
Operation, Evaluation Criteria for Advanced Encryption Standard, The AES Cipher.
This document analyzes the RC4 encryption algorithm and examines how its performance is affected by changing parameters like encryption key length and file size. Experimental tests were conducted to measure encryption time for different key lengths and file types. The results show encryption time increases with longer keys and larger files, and are modeled mathematically. The document also provides background on encryption methods, how RC4 works, and compares stream and block ciphers.
Encryption is a technique that transforms a code from an understandable into an incomprehensible code. Many methods can be applied to an encryption process. One such method is RSA. RSA works by appointing on byte values. The value is obtained from character conversion to ASCII code. This algorithm is based on the multiplication of two relatively large primes. Applications of the RSA algorithm can be used in data security. This research provides RSA algorithm application on data security system that can guarantee data confidentiality. RSA algorithm is known as a very secure algorithm. This algorithm works with the number of bits in the search for prime numbers. The larger the bits, the less chance of ciphertext can be solved. The weakness of this method is the amount of ciphertext capacity will be floating in line with the number of prime numbers used. Also, to perform the process of encryption and decryption, RSA requires a relatively long time than other algorithms. The advantage of RSA is that complicated ciphertext is solved into plaintext.
Implementation of De-Duplication AlgorithmIRJET Journal
The document describes an implementation of a data de-duplication algorithm using convergent encryption. It discusses how data de-duplication works to reduce storage usage by identifying and removing duplicate copies of data. Convergent encryption is used, which generates the same encrypted form of a file from the original file's hash, allowing duplicate encrypted files to be de-duplicated while preserving privacy. The algorithm divides files into blocks, generates hashes for each block, and encrypts the file blocks using the hashes as keys. When a file is uploaded, its hash is checked against existing hashes to identify duplicates, with duplicates replaced by pointers to the stored copy. This allows efficient de-duplication while encrypting data for privacy and security when stored
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
This document discusses and analyzes various cryptographic algorithms used for network security. It begins with definitions of key cryptographic terms like plain text, cipher text, encryption, decryption, and keys. It then describes different types of cryptographic schemes, including symmetric, asymmetric, and hash functions. Specific algorithms are analyzed like DES, AES, RSA, and Diffie-Hellman. Factors to consider when selecting a cryptographic algorithm like speed, memory requirements, security needs, and data type are also discussed. Overall the document provides a comprehensive overview and comparison of cryptographic algorithms and their applications for network security.
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
The document compares and analyzes different encryption techniques. It summarizes the Data Encryption Standard (DES), Triple DES (3DES), and Advanced Encryption Standard (AES). DES uses a 56-bit key and 64-bit block size, while 3DES extends DES to 168 bits for improved security. AES was developed later to replace DES and uses 128, 192, or 256 bit keys and block sizes. The document concludes that AES is more secure than DES and 3DES based on its longer key lengths and that it is the symmetric encryption algorithm of choice for future applications.
Securing sensitive and important information from intruders is a tedious task in the 21st century. In order to protect information different ciphering techniques has been used. Quantum Cryptography has taken a new path in the field of crypto systems where all the presently used crypto systems are classified as classical cryptography systems. Classical cryptography systems use mathematical formulas where quantum cryptography uses the principles of photon polarization and heisenberg uncertainty principle. As the south
asian region is developing rapidly in almost all the sectorsthe need of securing information has become a difficult task. Therefore, the need of starting extensive research on quantum cryptography for the south asian region to safeguard information from intruders has been the purpose of this study. Comparative study of the growth of the telecommunication sector in the south asian region and how quantum
cryptography could assist in securing information has been discussedas results.In the end, details of the need to research on quantum cryptography in the south asian region to overcome future predicted cyber threats are also discussed.
Design of Hybrid Cryptography Algorithm for Secure CommunicationIRJET Journal
This document proposes a hybrid cryptography model to securely transmit information between parties. It aims to achieve confidentiality, authentication, and integrity simultaneously. The proposed model uses a combination of symmetric and asymmetric encryption algorithms. Specifically, it uses Diffie-Hellman key exchange for key agreement, RSA and private key encryption for authentication and confidentiality, SHA-1 for integrity verification, and RC5 symmetric encryption for encrypting the ciphertext and message digest. The model encrypts data using a symmetric key, then encrypts that symmetric key using the receiver's public key for transmission. This allows the receiver to decrypt the symmetric key using their private key and then decrypt the message for authentication and confidentiality.
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
he Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data‟s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it‟s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
This document discusses database access pattern protection using a partial shuffle scheme. It proposes a new encryption algorithm called Reverse Encryption Algorithm (REA) that aims to provide security while limiting performance degradation from encryption. It also discusses prior work on Private Information Retrieval (PIR) techniques and their limitations. The key idea of the proposed scheme is to introduce a trusted component that shuffles only a portion of the database periodically, providing privacy assurances similar to PIR but with lower computation costs than a full database shuffle each time.
File transfer using cryptography techniquesmiteshkumar82
The document discusses implementing IT auditing mechanisms for cloud computing applications to ensure security. It proposes using checklists based on cloud computing deployment and service models to audit the lifecycle of cloud applications like customer relationship management. The goal is to present implications for large enterprises and achieve desired security levels by designing and implementing IT auditing techniques. Practical investigations show IT auditing can assure security, regulations, and compliance for enterprise applications in the cloud.
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsIJNSA Journal
The RSA algorithm is one of the most commonly used efficient cryptographic algorithms. It provides the required amount of confidentiality, data integrity and privacy. This paper integrates the RSA Algorithm with round -robin priority scheduling scheme in order to extend the level of security and reduce the effectiveness of intrusion. It aims at obtaining minimal overhead, increased throughput and privacy. In this method the user uses the RSA algorithm and generates the encrypted messages that are sorted priority-wise and then sent. The receiver, on receiving the messages decrypts them using the RSA algorithm according to their priority. This method reduces the risk of man -in-middle attacks and timing attacks as the encrypted and decrypted messages are further jumbled based on their priority. It also reduces the power monitoring
attack risk if a very small amount of information is exchanged. It raises the bar on the standards of
information security, ensuring more efficiency.
This document is a thesis submitted by Thivya Devaraj to the University of Limerick for the degree of Master of Engineering in Information and Network Security. The thesis focuses on Password Authenticated Key Exchange (PAKE) protocols. It includes chapters on literature review of existing PAKE protocols, algorithms used such as RSA, AES, and hashing, an overview of the Encrypted Key Exchange protocol, implementation of a PAKE protocol using Java, results, and conclusions. The document provides background on PAKE protocols and evaluates existing approaches before proposing an implementation.
“SECURITY” in this contemporary scenarios has become a more sensible issue either it may be in the “REAL WORLD” or in the “CYBER WORLD”. In the real world as opposed to the cyber world information gathering often precedes an attack. Today the illicit activities of the hackers are growing by leaps and bounds. However; fortunately, the antagonists reacted promptly and resurrected the internet world from the brink of prostration. Tersely quoting some security ditherers - hijackers, Eavesdropping, hacking, mapping, packet sniffing, spoofing, etc.
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONIJNSA Journal
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted in Internet. The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel. With advanced technologies in computer hardware and software, these standards seem not to be as secure and fast as one would like. In
this paper we propose a encryption technique which provides security to both the message and the secret key achieving confidentiality and authentication. The Symmetric algorithm used has two advantages over traditional schemes. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the security level is higher due to the inherent poly-alphabetic nature of the substitution mapping method used here, together with the translation and transposition operations performed in the algorithm. Asymmetric algorithm RSA is worldwide known for its high security. In this paper a detailed report of the process is presented and analysis is done comparing our proposed technique with familiar techniques
Modified RSA-based algorithm: a double secure approachTELKOMNIKA JOURNAL
Security algorithms like RSA are becoming increasingly important for communications to provide companies, organizations, and users around the world, secure applications who rely heavily on them in their daily work. Security algorithms use different acquaintances among companies which might belong to various countries or even cities. Such data should essentially be encrypted to make sure that there is security in transportation. Thus, the current research paper leads to the novel system of security for the safe transfer of data. This paper examines the general principles of encryption and focuses on the development of RSA and the complexity of the encryption key so that it becomes more secure in the applications used. In this project, we will work on the RSA algorithm by adding some complexity to the 3keys (3k). This addition will increase the security and complexity of the algorithm's speed while maintaining encryption and decryption time. The paper also presents an approach by means of public key encryption to enhance cryptographic security. Moreover, double security is provided by the algorithm of RSA. This novel RSA algorithm was investigated in MATLAB. Numerical results for the various parameters such as Mean Square Error (MSE), correlation and Bit Error Ratio (BER) were implemented for the encryption of the message. The experimental results demonstrated that the proposed algorithm for 3 keys has small error rate in the retrieval of the encoded text
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
This document discusses image cryptography using the RSA algorithm. It begins with an abstract that provides an overview of encrypting images through a combination of RSA encryption and a 2-bit rotation mechanism. The document then reviews literature on modifications made to the original RSA algorithm. It discusses current applications of RSA, including uses in email encryption, cloud services, and digital signatures. The design architecture and working of the RSA algorithm are explained. The document concludes that image encryption using RSA is efficient and secure, though further research is needed to develop quantum-resistant encryption systems.
This document summarizes a research paper that proposes a new approach for complex encryption and decryption of data. The approach uses a combination of public key infrastructure and RC6 algorithm. It divides plaintext into blocks, uses one block as an encryption key, and inserts the key into the ciphertext based on a private position. Performance analysis shows the proposed approach encrypts and decrypts data faster than the AES algorithm. Security analysis indicates the approach is secure against known attacks based on correlation analysis and information entropy tests. The approach provides improved security and performance for encrypting network data.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
UNIT - 2
SYMMETRIC CIPHERS: Symmetric Cipher Model, Substitution Techniques,
Transposition Techniques, Simplified DES, Data encryption standard (DES), The strength of
DES, Differential and Linear Cryptanalysis, Block Cipher Design Principles and Modes of
Operation, Evaluation Criteria for Advanced Encryption Standard, The AES Cipher.
This document analyzes the RC4 encryption algorithm and examines how its performance is affected by changing parameters like encryption key length and file size. Experimental tests were conducted to measure encryption time for different key lengths and file types. The results show encryption time increases with longer keys and larger files, and are modeled mathematically. The document also provides background on encryption methods, how RC4 works, and compares stream and block ciphers.
Encryption is a technique that transforms a code from an understandable into an incomprehensible code. Many methods can be applied to an encryption process. One such method is RSA. RSA works by appointing on byte values. The value is obtained from character conversion to ASCII code. This algorithm is based on the multiplication of two relatively large primes. Applications of the RSA algorithm can be used in data security. This research provides RSA algorithm application on data security system that can guarantee data confidentiality. RSA algorithm is known as a very secure algorithm. This algorithm works with the number of bits in the search for prime numbers. The larger the bits, the less chance of ciphertext can be solved. The weakness of this method is the amount of ciphertext capacity will be floating in line with the number of prime numbers used. Also, to perform the process of encryption and decryption, RSA requires a relatively long time than other algorithms. The advantage of RSA is that complicated ciphertext is solved into plaintext.
Implementation of De-Duplication AlgorithmIRJET Journal
The document describes an implementation of a data de-duplication algorithm using convergent encryption. It discusses how data de-duplication works to reduce storage usage by identifying and removing duplicate copies of data. Convergent encryption is used, which generates the same encrypted form of a file from the original file's hash, allowing duplicate encrypted files to be de-duplicated while preserving privacy. The algorithm divides files into blocks, generates hashes for each block, and encrypts the file blocks using the hashes as keys. When a file is uploaded, its hash is checked against existing hashes to identify duplicates, with duplicates replaced by pointers to the stored copy. This allows efficient de-duplication while encrypting data for privacy and security when stored
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
This document discusses and analyzes various cryptographic algorithms used for network security. It begins with definitions of key cryptographic terms like plain text, cipher text, encryption, decryption, and keys. It then describes different types of cryptographic schemes, including symmetric, asymmetric, and hash functions. Specific algorithms are analyzed like DES, AES, RSA, and Diffie-Hellman. Factors to consider when selecting a cryptographic algorithm like speed, memory requirements, security needs, and data type are also discussed. Overall the document provides a comprehensive overview and comparison of cryptographic algorithms and their applications for network security.
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
The document compares and analyzes different encryption techniques. It summarizes the Data Encryption Standard (DES), Triple DES (3DES), and Advanced Encryption Standard (AES). DES uses a 56-bit key and 64-bit block size, while 3DES extends DES to 168 bits for improved security. AES was developed later to replace DES and uses 128, 192, or 256 bit keys and block sizes. The document concludes that AES is more secure than DES and 3DES based on its longer key lengths and that it is the symmetric encryption algorithm of choice for future applications.
Securing sensitive and important information from intruders is a tedious task in the 21st century. In order to protect information different ciphering techniques has been used. Quantum Cryptography has taken a new path in the field of crypto systems where all the presently used crypto systems are classified as classical cryptography systems. Classical cryptography systems use mathematical formulas where quantum cryptography uses the principles of photon polarization and heisenberg uncertainty principle. As the south
asian region is developing rapidly in almost all the sectorsthe need of securing information has become a difficult task. Therefore, the need of starting extensive research on quantum cryptography for the south asian region to safeguard information from intruders has been the purpose of this study. Comparative study of the growth of the telecommunication sector in the south asian region and how quantum
cryptography could assist in securing information has been discussedas results.In the end, details of the need to research on quantum cryptography in the south asian region to overcome future predicted cyber threats are also discussed.
Design of Hybrid Cryptography Algorithm for Secure CommunicationIRJET Journal
This document proposes a hybrid cryptography model to securely transmit information between parties. It aims to achieve confidentiality, authentication, and integrity simultaneously. The proposed model uses a combination of symmetric and asymmetric encryption algorithms. Specifically, it uses Diffie-Hellman key exchange for key agreement, RSA and private key encryption for authentication and confidentiality, SHA-1 for integrity verification, and RC5 symmetric encryption for encrypting the ciphertext and message digest. The model encrypts data using a symmetric key, then encrypts that symmetric key using the receiver's public key for transmission. This allows the receiver to decrypt the symmetric key using their private key and then decrypt the message for authentication and confidentiality.
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...IJECEIAES
he Wireless Sensor Networks (WSNs) have spread its roots in almost every application. Owing to their scattered nature of sensor nodes, they are more prone to attacks. There are certain applications e.g. military, where sensor data‟s confidentiality requirement during transmission is essential. Cryptography has a vital role for achieving security in WSNs.WSN has resource constraints like memory size, processing speed and energy consumption which bounds the applicability of existing cryptographic algorithms for WSN. Any good security algorithms has higher energy consumption by the nodes, so it‟s a need to choose most energy-efficient cryptographic encryption algorithms for WSNs. This paper surveys different asymmetric algorithms such as RSA, Diffie-Hellman, DSA, ECC, hybrid and DNA cryptography. These algorithms are compared based on their key size, strength, weakness, attacks and possible countermeasures in the form of table.
This document discusses database access pattern protection using a partial shuffle scheme. It proposes a new encryption algorithm called Reverse Encryption Algorithm (REA) that aims to provide security while limiting performance degradation from encryption. It also discusses prior work on Private Information Retrieval (PIR) techniques and their limitations. The key idea of the proposed scheme is to introduce a trusted component that shuffles only a portion of the database periodically, providing privacy assurances similar to PIR but with lower computation costs than a full database shuffle each time.
File transfer using cryptography techniquesmiteshkumar82
The document discusses implementing IT auditing mechanisms for cloud computing applications to ensure security. It proposes using checklists based on cloud computing deployment and service models to audit the lifecycle of cloud applications like customer relationship management. The goal is to present implications for large enterprises and achieve desired security levels by designing and implementing IT auditing techniques. Practical investigations show IT auditing can assure security, regulations, and compliance for enterprise applications in the cloud.
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsIJNSA Journal
The RSA algorithm is one of the most commonly used efficient cryptographic algorithms. It provides the required amount of confidentiality, data integrity and privacy. This paper integrates the RSA Algorithm with round -robin priority scheduling scheme in order to extend the level of security and reduce the effectiveness of intrusion. It aims at obtaining minimal overhead, increased throughput and privacy. In this method the user uses the RSA algorithm and generates the encrypted messages that are sorted priority-wise and then sent. The receiver, on receiving the messages decrypts them using the RSA algorithm according to their priority. This method reduces the risk of man -in-middle attacks and timing attacks as the encrypted and decrypted messages are further jumbled based on their priority. It also reduces the power monitoring
attack risk if a very small amount of information is exchanged. It raises the bar on the standards of
information security, ensuring more efficiency.
This document is a thesis submitted by Thivya Devaraj to the University of Limerick for the degree of Master of Engineering in Information and Network Security. The thesis focuses on Password Authenticated Key Exchange (PAKE) protocols. It includes chapters on literature review of existing PAKE protocols, algorithms used such as RSA, AES, and hashing, an overview of the Encrypted Key Exchange protocol, implementation of a PAKE protocol using Java, results, and conclusions. The document provides background on PAKE protocols and evaluates existing approaches before proposing an implementation.
“SECURITY” in this contemporary scenarios has become a more sensible issue either it may be in the “REAL WORLD” or in the “CYBER WORLD”. In the real world as opposed to the cyber world information gathering often precedes an attack. Today the illicit activities of the hackers are growing by leaps and bounds. However; fortunately, the antagonists reacted promptly and resurrected the internet world from the brink of prostration. Tersely quoting some security ditherers - hijackers, Eavesdropping, hacking, mapping, packet sniffing, spoofing, etc.
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONIJNSA Journal
This paper puts forward a safe mechanism of data transmission to tackle the security problem of information which is transmitted in Internet. The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel. With advanced technologies in computer hardware and software, these standards seem not to be as secure and fast as one would like. In
this paper we propose a encryption technique which provides security to both the message and the secret key achieving confidentiality and authentication. The Symmetric algorithm used has two advantages over traditional schemes. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the security level is higher due to the inherent poly-alphabetic nature of the substitution mapping method used here, together with the translation and transposition operations performed in the algorithm. Asymmetric algorithm RSA is worldwide known for its high security. In this paper a detailed report of the process is presented and analysis is done comparing our proposed technique with familiar techniques
Modified RSA-based algorithm: a double secure approachTELKOMNIKA JOURNAL
Security algorithms like RSA are becoming increasingly important for communications to provide companies, organizations, and users around the world, secure applications who rely heavily on them in their daily work. Security algorithms use different acquaintances among companies which might belong to various countries or even cities. Such data should essentially be encrypted to make sure that there is security in transportation. Thus, the current research paper leads to the novel system of security for the safe transfer of data. This paper examines the general principles of encryption and focuses on the development of RSA and the complexity of the encryption key so that it becomes more secure in the applications used. In this project, we will work on the RSA algorithm by adding some complexity to the 3keys (3k). This addition will increase the security and complexity of the algorithm's speed while maintaining encryption and decryption time. The paper also presents an approach by means of public key encryption to enhance cryptographic security. Moreover, double security is provided by the algorithm of RSA. This novel RSA algorithm was investigated in MATLAB. Numerical results for the various parameters such as Mean Square Error (MSE), correlation and Bit Error Ratio (BER) were implemented for the encryption of the message. The experimental results demonstrated that the proposed algorithm for 3 keys has small error rate in the retrieval of the encoded text
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
This document discusses image cryptography using the RSA algorithm. It begins with an abstract that provides an overview of encrypting images through a combination of RSA encryption and a 2-bit rotation mechanism. The document then reviews literature on modifications made to the original RSA algorithm. It discusses current applications of RSA, including uses in email encryption, cloud services, and digital signatures. The design architecture and working of the RSA algorithm are explained. The document concludes that image encryption using RSA is efficient and secure, though further research is needed to develop quantum-resistant encryption systems.
This document summarizes a research paper that proposes a new approach for complex encryption and decryption of data. The approach uses a combination of public key infrastructure and RC6 algorithm. It divides plaintext into blocks, uses one block as an encryption key, and inserts the key into the ciphertext based on a private position. Performance analysis shows the proposed approach encrypts and decrypts data faster than the AES algorithm. Security analysis indicates the approach is secure against known attacks based on correlation analysis and information entropy tests. The approach provides improved security and performance for encrypting network data.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
This document discusses techniques for secure and fast transmission of data in mobile ad hoc networks (MANETs). It proposes using identity-based cryptography with visual cryptography. For identity-based cryptography, the RSA cryptosystem is used to generate public and private keys, with Vedic mathematics adopted for fast calculations. Vedic mathematics allows for faster prime number calculations compared to modern mathematics. Visual cryptography allows images to be encrypted and decrypted by the human visual system without computation. The techniques aim to securely and efficiently transmit encrypted images and data in MANETs.
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGIJNSA Journal
This document summarizes a research paper that analyzes speeding up the RSA encryption algorithm using GPU programming. It begins by providing background on RSA and GPU accelerated computing. It then describes in detail the traditional RSA algorithm and various techniques for improving modular exponentiation efficiency. The document outlines a parallelized RSA algorithm designed using CUDA that assigns each character of a message to a separate GPU thread for encryption. Evaluation results showed the parallelized algorithm alleviated issues with RSA related to speed and small prime numbers.
Modern-day computer security relies heavily on cryptography as a means to protect the data that we have
become increasingly reliant on. The main research in computer security domain is how to enhance the
speed of RSA algorithm. The computing capability of Graphic Processing Unit as a co-processor of the
CPU can leverage massive-parallelism. This paper presents a novel algorithm for calculating modulo
value that can process large power of numbers which otherwise are not supported by built-in data types.
First the traditional algorithm is studied. Secondly, the parallelized RSA algorithm is designed using
CUDA framework. Thirdly, the designed algorithm is realized for small prime numbers and large prime
number . As a result the main fundamental problem of RSA algorithm such as speed and use of poor or
small prime numbers that has led to significant security holes, despite the RSA algorithm's mathematical
soundness can be alleviated by this algorithm.
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...IRJET Journal
This document discusses end-to-end encryption using Diffie-Hellman key exchange combined with RSA and AES256 encryption. It proposes a model where a server facilitates encrypted communication between two clients by first distributing Diffie-Hellman parameters. The clients then use their private keys to calculate a shared secret and encrypt it with the other client's public key before transmission to establish an encrypted channel. RSA is used to encrypt the Diffie-Hellman key exchange to prevent man-in-the-middle attacks. The document provides details on the Diffie-Hellman, RSA and AES256 algorithms and evaluates the performance of the proposed approach.
Enhancement in data security and integrity using minhash techniquenooriasukmaningtyas
Data encryption process and key generation techniques protect sensitive data against any various attacks. This paper focuses on generating secured cipher keys to raise the level of security and the speed of the data integrity checking by using the MinHash function. The methodology is based on applying the cryptographic algorithms rivest-shamir-adleman (RSA) and advanced encryption standard (AES) to generate the cipher keys. These keys are used in the encryption/decryption process by utilizing the Pearson Hash and the MinHash techniques. The data is divided into shingles that are used in the Hash function to generate integers and in the MinHash function to generate the public and the private keys. MinHash technique is used to check the data integrity by comparing the sender’s and the receiver’s encrypted digest. The experimental results show that the RSA and AES algorithms based on the MinHash function have less encryption time compared to the normal hash functions by 17.35% and 43.93%, respectively. The data integrity between two large sets is improved by 100% against the original algorithm in terms of completion time, and 77% for small/medium data and 100% for large set data in terms of memory utilization.
Today, the growth of digitalization has made the ease for livelihood for all the organizations. Cloud computing the storage provider for all the computer resources has made it easy for accessing the data from anywhere anytime. But at the same time the security for cloud data storage is the major drawback which is provided by various cryptographic algorithms. These algorithms convert the data into unreadable format, known as cipher text, Rivest, Shamir and Adleman (RSA) one of the most popularly used asymmetric algorithm. This paper gives detailed review about such different cryptographic algorithms used for the cloud data security. The comparison study is also made for the size of data and to analyze the encryption time and decryption time, which concludes that to enhance the cloud data security some addon techniques are to be used along with these cryptographic algorithms. To increase the security level and to increase the transmission speed of plaintext, integrated method will be proposed by encoding the plaintext to intermediate plaintext and then intermediate plaintext will be compressed using any one of the compression techniques to increase the compression ratio, lastly the compressed file is encrypted to further enhance the security level.
Cloud computing and a new approach in data encryption techniqueMahmuda Rahman
Cloud computing is a very growing field in this passing year. We can discuss about how to secure the data. We can discuss about the algorithm and how the algorithm is working. Then we propose some new technique to secure the data in cloud. There is no 100 percent secure system. So we want to discuss in this paper how to make the system much better and more essential. The goal of this paper is to secure the data system in cloud computing.
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...INFOGAIN PUBLICATION
Delay and disruption tolerant network (DTN) is used for long area communication in computer network, where there is no direct connection between the sender and receiver and there was no internet facility. Delay tolerant network generally perform store and forward techniques as a result intermediate node can view the message, the possible solution is using encryption techniques to protect the message. Starting stages of DTN RSA, DES, 3DES encryption algorithms are used but now a day’s attribute based encryption (ABE) techniques are used. Attribute based encryption technique can be classified in to two, key policy attribute based encryption (KPABE) and cipher policy attribute based encryption (CPABE). In this paper we perform a categorized survey on different encryption techniques presents in delay tolerant networks. This categorized survey is very helpful for researchers to propose modified encryption techniques. Finally the paper compares the performance and effectiveness of different encryption algorithms.
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
This document summarizes a research paper that proposes a hybrid encryption system using both the AES and RSA algorithms. The system first encrypts a data file with AES, using a randomly generated key. It then encrypts the AES key with RSA using the receiver's public key. These two encrypted files are combined and sent to the receiver. The receiver separates the files and decrypts the AES key with their private RSA key. Then the original data file is decrypted with AES using the retrieved key. The paper analyzes the encryption methods, provides an overview of how the system works, and evaluates its performance compared to using just AES or RSA alone. It finds that the combined system has faster encryption times than just using RSA.
Cloud computing is the emerging trend in todays world. Cloud computing is not a separate technology, it is platform which provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is that we hire everything from a third party or store our important datas in a third parties place .Here comes the major issue of how our datas are secured. In this paper, we discuss about how to protect our datas in the cloud with various cryptographic techniques. Padmapriya I | Ragini H "Cloud Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21547.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/21547/cloud-cryptography/padmapriya-i
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
Digital communication witnesses a noticeable and continuous development in many
applications in the Internet. Hence, a secure communication sessions must be provided. The
security of data transmitted across a global network has turned into a key factor on the network
performance measures. Cryptography and steganography are two important techniques that are
used to provide network security. In this paper, we conduct a comparative study of
steganography and cryptography. We survey a number of methods combining cryptography and
steganography techniques in one system. Moreover, we present a classification of these
methods, and compare them in terms of the algorithm used for encryption, the steganography
technique and the file type used for covering the information.
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
with the arrival of the information age and much more important information systems and communication in human
everyday life, necessity immunization information and communication strategy were also raised. The easiest way to meet this
necessity is conventional encryption algorithms. Encryption is a right tool for data protection in an unsecure channel. To this end, from
two-method symmetric key encryption and public-key cryptography are used. In this paper we examine text cryptography, one of the
most important topics in cryptography. A unique attribute of this kind of encryption has been of interest to many researchers in this
field. This paper, considering the symmetric encryption algorithm, provides a text encryption algorithm using a 128-bit key. The
proposed algorithm uses a 128-bit key, the text data using the XOR operator to convert the encrypted information. Therefore, the aim
of this method is to provide a convenient method for symmetrically encrypting data not to be easily decoded, and finally, the results of
the tests show that the proposed method is better in terms of security and speed of execution
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
This document summarizes a research paper that proposes a security architecture for cloud computing that dynamically configures cryptographic algorithms and keys based on security policies and inputs like network access risk and data sensitivity. The architecture aims to improve security while reducing costs by only using the necessary level of encryption for each situation. It describes using the Blowfish algorithm instead of AES and adjusting the key size from 128 to 448 bits depending on factors like network type and data size. Results show Blowfish has better performance than AES, especially with larger keys on larger amounts of data. The goal is to provide flexible, efficient security tailored to each user's needs.
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
Advances in communication networks have enabled organization to send confidential data such as digital images over wireless networks. However, the broadcast nature of wireless communication channel has made it vulnerable to attack from eavesdroppers. We have developed a hybrid cryptography technique, and we present its application to digital images as a means of improving the security of digital image for transmission over wireless communication networks. The hybrid technique uses a combination of a symmetric (Data Encryption Standard) and asymmetric (Rivest Shamir Adleman) cryptographic algorithms to secure data to be transmitted between different nodes of a wireless network. Three different image samples of type jpeg, png and jpg were tested using this technique. The results obtained showed that the hybrid system encrypt the images with minimal simulation time, and high throughput. More importantly, there is no relation or information between the original images and their encrypted form, according to Shannon’s definition of perfect security, thereby making the system much more secure.
A Novel Approach for Data Security in Cloud EnvironmentSHREYASSRINATH94
Businesses and enterprises are shifting their work base from traditional obsolete systems to cloud servers. The reasons of the shift are rapid deployment of an application which enables the developers to launch their applications within a short duration of time, lower cost operating models, scalability and ability to use an operational budget. The increased demand for computer-intensive applications led to a huge growth in cloud services. Security of the stored files and applications in the cloud is a major concern due to lack of standardized control of the cloud. Traditional cryptographic algorithms like AES and RSA, though robust in nature, are not lightweight in a mobile cloud environment. This paper proposes a novel cryptographic method wherein the file is first encrypted and then stored in cloud and is decrypted using the same key which is used for encryption as and when needed. The experimental results of the identified test cases indeed prove that the proposed algorithm is lightweight in nature in terms of less execution time and less processing cycles. The lightweight approach of the proposed algorithm will benefit the user to encrypt large files in cloud.
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
Number of businesses using cloud computing has increased dramatically over the last few years due to the attractive features such as scalability, flexibility, fast start-up and low costs. Services provided over the web are ranging from using provider’s software and hardware to managing security and other issues. Some of the biggest challenges at this point are providing privacy and data security to subscribers of public cloud servers. An efficient encryption technique presented in this paper can be used for secure access to and storage of data on public cloud server, moving and searching encrypted data through communication channels while protecting data confidentiality. This method ensures data protection against both external and internal intruders. Data can be decrypted only with the provided by the data owner key, while public cloud server is unable to read encrypted data or queries. Answering a query does not depend on it size and done in a constant time. Data access is managed by the data owner. The proposed schema allows unauthorized modifications detection.
Similar to Research trends review on RSA scheme of asymmetric cryptography techniques (20)
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
The document proposes using a particle swarm optimization (PSO) algorithm to optimize the hyperparameters of a convolutional neural network (CNN) for image classification. The PSO algorithm is used to find optimal values for CNN hyperparameters like the number and size of convolutional filters. In experiments on the MNIST handwritten digit dataset, the optimized CNN achieved a testing error rate of 0.87%, which is competitive with state-of-the-art models. The proposed approach finds optimized CNN architectures automatically without requiring manual design or encoding strategies during training.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
1) Researchers developed a prototype contactless transaction system using QR codes and digital payments to support physical distancing during the COVID-19 pandemic in traditional markets.
2) The system allows sellers and buyers in traditional markets to conduct fast, secure transactions via smartphones without direct cash exchange. Buyers scan sellers' QR codes to view product details and make e-wallet payments.
3) Testing showed the system's functions worked properly and users found it easy to use and useful for supporting contactless transactions and digital transformation of traditional markets. However, further development is needed to increase trust in digital payments for users unfamiliar with the technology.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
This document describes the implementation of a double-layer structure on an octagon microstrip yagi antenna (OMYA) to improve its performance at 5.8 GHz. The double-layer consists of two double positive (DPS) substrates placed above the OMYA. Simulation and experimental results show that the double-layer configuration increases the gain of the OMYA by 2.5 dB compared to without the double-layer. The measured bandwidth of the OMYA with double-layer is 14.6%, indicating the double-layer can increase both the gain and bandwidth of the OMYA.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
The document provides an overview of the key performance indicators (KPIs) for 6G wireless networks compared to 5G networks. Some of the major KPIs discussed for 6G include: achieving data rates of up to 1 Tbps and individual user data rates up to 100 Gbps; reducing latency below 10 milliseconds; supporting up to 10 million connected devices per square kilometer; improving spectral efficiency by up to 100 times through technologies like terahertz communications and smart surfaces; and achieving an energy efficiency of 1 pico-joule per bit transmitted through techniques like wireless power transmission and energy harvesting. The document outlines how 6G aims to integrate terrestrial, aerial and maritime communications into a single network to provide ubiquitous connectivity with higher
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Recycled Concrete Aggregate in Construction Part II
Research trends review on RSA scheme of asymmetric cryptography techniques
1. Bulletin of Electrical Engineering and Informatics
Vol. 10, No. 1, February 2021, pp. 487~492
ISSN: 2302-9285, DOI: 10.11591/eei.v10i1.2493 487
Journal homepage: http://beei.org
Research trends review on RSA scheme of asymmetric
cryptography techniques
Mohd Saiful Adli Mohamad1
, Roshidi Din2
, Jasmin Ilyani Ahmad3
1
School of Quantitative Science, UUM College Arts and Sciences, Universiti Utara Malaysia, Kedah, Malaysia
2
School of Computing, UUM College Arts and Sciences, Universiti Utara Malaysia, Kedah, Malaysia
3
Faculty of Computer and Mathematical Sciences, Universiti Teknologi MARA, Kedah, Malaysia
Article Info ABSTRACT
Article history:
Received Apr 9, 2020
Revised Jun 17, 2020
Accepted Jul 30, 2020
One of the cryptography classifications is asymmetric cryptography, which
uses two different keys to encrypt and decrypt the message. This paper
discusses a review of RSA scheme of asymmetric cryptography techniques.
It is trying to present the domains of RSA scheme used including in public
network, wireless sensor network, image encryption, cloud computing, proxy
signature, Internet of Things and embedded device, based on the perspective
of researchers’ effort in the last decade. Other than that, this paper reviewed
the trends and the performance metrics of RSA scheme such as security,
speed, efficiency, computational complexity and space based on the number
of researches done. Finally, the technique and strengths of the proposed
scheme are also stated in this paper.
Keywords:
Integer factorization
Public key cryptography
RSA scheme
This is an open access article under the CC BY-SA license.
Corresponding Author:
Roshidi Din,
School of Computing, UUM College Arts and Sciences,
Universiti Utara Malaysia,
06010, Sintok, Kedah, Malaysia.
Email: roshidi@uum.edu.my
1. INTRODUCTION
Data security is a main concern in communication to ensure the data is transfer securely from sender
to receiver through communication media. One of the techniques used in data security is cryptography. This
is done by changing the original message to the unreadable form before data transmission through public
network. The data is secured if the third party could not understand the original message. The process of
changing the original message or plaintext to an unreadable form or cipher text is called encryption, while the
backward process of it is called decryption. According to Mushtaque et al. [1] cryptography can be described
as a practice to keep the data secure from the illegal users. The point of cryptography is to ensure data is send
in a secure environment over network by encrypting the data to an unreadable form [2]. Other than that, in
cryptography, keys are used to ensure the confidentiality of data. Only the authorized person which has the
authority to use the key can encrypt and decrypt the message.
Basically, cryptography is classified into symmetric and asymmetric cryptography. The symmetric
cryptography mechanism involves with only a key. This key will be used by the sender and receiver in data
communication to encrypt and decrypt message respectively. One of the advantages of symmetric
cryptography is relatively fast due to only one key involves in the data communication. However, because of
this technique uses only one single key, the message is not safe if the key is seen by the unauthorized users.
Thus, it will be easy for them to decrypt the message illegally. Hence, in order to solve the problem in
symmetric cryptography, the asymmetric cryptography was initiated. The asymmetric cryptography
mechanism involves with two different keys which are known as public and private key [3]. The public key
2. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 1, February 2021 : 487 – 492
488
can be shared among the senders to encrypt whereas the private key is used to decrypt the ciphertext and kept
secret to the authorized receiver only. As long as the private key is kept secret, it is said to be secured [4].
Normally, in asymmetric cryptography, the public key is used to encrypt the original plaintext while the
private key is used to decrypt the unreadable text. Other than that, in asymmetric cryptography, many
schemes were introduced to perform the encryption and decryption process for data communication such as
Diffie-Hellman, RSA, McEliece, Goldwasser-Micali, and ElGamal.
On the other hand, those introduced schemes can be classified in different cryptography algorithms
based on the technique used. The cryptography algorithms include discrete logarithm, integer factorization,
coding theory and elliptic curve. Schemes are normally categorized to theory-based, lattices-based and codes-
based [5]. RSA scheme [6] is one of the asymmetric cryptography scheme which is categorized under integer
factorization algorithm. The scheme is depends on a two prime number factoring technique. The strength and
security of this scheme depends on the complexity of factoring the prime numbers. In order to increase the
strength including the speed in encryption and decryption of the schemes, early researchers have improved
the initial scheme by rising the number of private keys [7], by utilizing two public keys [8], three prime
numbers [9], four prime numbers [10], and ‘n’ prime numbers rather than two [11-13]. However, as the size
of the key increases, it will take more time for larger files [10, 14].
The previous literature has shown an important contribution to RSA scheme since it was created.
The performance metrics, domains and techniques are studied to perceive the trends and the research patterns
of RSA scheme in earlier studies within last decade. The continuing sections of this paper is organized with
section 2 that presents the overview of RSA scheme, section 3 demonstrates the findings gained from the
earlier studies, and discussions related to the techniques, the domains and the performance metrics of RSA
scheme between earlier researchers. Finally, section 4 will conclude the research contribution in this paper.
2. OVERVIEW OF RSA SCHEME
RSA scheme was introduced in 1978 which uses the factoring technique of two prime numbers [6].
The RSA scheme uses asymmetric cryptography system that involves two types of key; public and private
key for the encryption and decryption processes respectively. The public key is placed in a public file, and
the decryption procedure is kept secret by the user. In order to encrypt the plaintext, a pair of positive
integers is generated. In the same way, to decrypt the cipher text, a pair of positive integers is then generated.
These prime numbers are very large and the factorization of it will be hidden from others. However, by using
RSA scheme, the original message can easily be accessed by knowing the transmission of the public key if
there is no difficulty involved in the data transmission [10].
Other than that, in order to increase the security of the RSA scheme, [11] also modified the RSA
scheme based on ‘n’ prime numbers is modified. It was proposed to provide higher data security being sent
over public network where ‘n’ prime numbers are difficult to decompose and not easily breakable [12].
Hence, [15] the two prime numbers can be modified to have four prime numbers to increase the complexity
of the existing RSA scheme. RSA method assured confidentiality, integrity, authenticity, and non-
reputability. The RSA security relies on the computational power to factor the prime numbers. Thus, it is
hard to break the RSA scheme as long as it is complicated to factor the integers [16]. Therefore, the most
important thing is the proficiency in producing large prime numbers [17].
A modified scheme that based on RSA was proposed, which utilized four prime numbers, together
with two public keys for encryption and used a private key for decryption [18]. Thus, this scheme is efficient
and robust. Moreover, these two public keys are sent at different time. On the other hand, [19] another
scheme was proposed which utilizing four prime numbers. Rather than sending a public key, this proposed
scheme sends two public keys to the receiver. Moreover, the analysis of the algorithm becomes more
complicated as it uses four prime numbers and two cipher texts for each message. Hence, resulting an
increase in the security. However, the speed of RSA decryption is affected, making the chinese remainder
theorem (CRT) use it to enhance the speed. Moreover, [20] modified RSA is also proposed which is
combined with Montgomery multiplication and CRT. Although the scheme’s execution time is faster, it is
not fit for embedded device due to a large key size. Besides, the implementation of RSA encryption with
CRT which conceal multiple plaintexts in one ciphertext was also introduced [21]. Nevertheless, this scheme
speeds up the decryption process of RSA.
Khairnar and Kadam proposed a technique that implements RSA scheme using key pairs and
Euclidean algorithm to make it more secure [14]. Moreover, it avoids mathematical and brute force attacks.
However, when using this proposed scheme, the key size increased from 512 bit to 1024 bit. Therefore, it
spends more time for a larger file and only a single file can be encrypted and transmitted. Other than that, in
order to strengthen the RSA scheme, it was modified by implementing several public and private keys [22]. The
proposed scheme is depending on the key length as well as on several public and private keys to decrypt the
message. On the other hand, the RSA algorithm works by adding some complexity to the three keys [23].
3. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Research trends review on RSA scheme of asymmetric... (Mohd Saiful Adli Mohamad)
489
The proposed scheme had increased the security and complexity of the algorithm's speed while maintaining
encryption and decryption time. Besides, a secured cryptography mechanism was modified by using multiple
encryption which prevents the system from the attacks [24].
On the other hand, a different approach for image encryption was introduced [25]. This approach
encrypts the image matrix using three large prime numbers. The benefit of this scheme is it is safe against
attacks in the image transmission process. Furthermore, data is not lost in the image decryption process.
Besides, the decrypted image is totally different from the original image. Other than that, a cryptography
using RSA algorithm to encrypt images by HEX function was also proposed to generate a ciphered image
text [26, 27]. This proposed scheme is suitable for secured transmission of images over the Internet. The RSA
scheme used was modified for both numeric and images for biometrics. Biometrics will extract the
characteristics and then encrypt it using hyper image encryption algorithm [28] to be stored in a database.
This scheme had improved the recognition accuracy, thus improved security.
3. RSA SCHEME DOMAIN
This section shows the research pattern of the RSA scheme domain. It also discusses the domains,
performance metrics and techniques of RSA scheme which demonstrate the most focused area of RSA
scheme among researchers in last decade. There are many researchers’ works that have contributed in RSA
scheme based on the number of the research. Figure 1 shows the pie chart of RSA domain focused by the
most researchers.
Figure 1. Percentage of RSA scheme’s domain for the last decade
From the pie chart, it is clarified that most of the earlier researchers emphasised on public network
domain with 39.62%, followed by wireless sensor network (WSN) domain with 16.98%. Next domain is
image encryption which contributes about 11.32%. On the other hand, cloud computing and proxy signature
domain have shown the same effort by the researchers with only 11.32% each. However, Internet of Things
(IoT) and embedded device have shown the lowest percentage of the RSA domain focused by the researchers
with only 3.77% and 1.89% respectively. This is because RSA is not suitable for embedded device and IoT
which is space constraints since it has large key size [29].The main strength of RSA is security [30, 31]
which is suitable for public network and WSN to transmit the sensitive and private information [32] as shown
in Figure 2.
Figure 2 illustrates that security is the main attention of RSA [24-40], followed by efficiency [41-45]
and speed [20, 29]. However, due to large key size, RSA lack to focus the other performance evaluation used
including computational complexity, space, computational efficiency, cost and time complexity. Besides that,
based on the previous researches within the last decade, the RSA original techniques were improvised in
order to adopt the scheme into various applications as to maintain or enhance the security and speed of the
scheme. Table 1 shows the literature of the techniques applied on RSA scheme.
4. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 1, February 2021 : 487 – 492
490
Figure 2. Performance evaluation used for RSA scheme
Table 1. The summary of RSA techniques and strengths
Techniques Authors Strength
Use for prime of numbers, two public keys for
encryption and a private key for decryption
[18]
More secure, Less vulnerable to Brute-Force Attack. The public
key is sent separately twice. High communication overload
Use four prime numbers
[15] Increased the complexity–highly secured, not easily breakable
[18] The analysis of algorithm become more difficult
Use the encryption algorithm of RSA
cryptosystem with three larges prime numbers to
encrypt the corresponding matrix
[24]
Strong security mechanism for data security by using multiple
encryptions
[9]
Faster than the original algorithm in encryption and decryption
process and generating public and privacy key
Strengthen the RSA algorithm by using multiple
public and private keys
[21]
RSA depends not only on the key length to decrypt the
message. It also depends on several public and private keys
Work on the RSA algorithm by adding some
complexity three keys
[23]
Increase the security complexity algorithms speed while
maintaining encryption and decryption time
Modify the RSA algorithm with N prime number
[13]
In this algorithm encryption is done binary file it so can
applicable for any kind of data
[11]
Increased security
Provide more efficiency and readability
Modify the RSA algorithm with N prime number
using K-Nearest algorithm
[12]
Not easy to decompose because it depends on prime numbers
Reduce the redundant messages occurred in RSA- can save
space
Modify the RSA cryptosystem by increasing the
number of private keys
[7] Gives the RSA cryptosystem a higher security
Combine Montgomery multiplication, Chinese
remainder theorem (CRT) with RSA Scheme
[20] Execution time faster
RSA algorithm that uses Chinese remainder
theorem (CRT) with purposes of the concealing
multiple plaintexts in one chipper-text
[21]
The new algorithm can also take advantages of current methods
that speed up the decryption process of RSA
Based on the table, it can be stated that many techniques introduced by the earlier researchers in
order to enhance the security, efficiency and speed of the scheme. The technique is about modifying the
prime number as well as modifying the key. The larger the number of prime numbers and the larger the key,
the more complicated the scheme, thus it will increase the scheme security.
4. CONCLUSION
This paper has presented and studied on several RSA schemes since last decade. Based on the
literature survey, it can be concluded that even the RSA schemes’ weakness has a large key size, the strength
is security and it can be implemented on such applications that are based on the Internet technology. It also
shows that there are many efforts that have been proposed by previous researchers in the last decade.
ACKNOWLEDGEMENTS
The authors wish to thank the Ministry of Higher Education Malaysia in funding the grant under the
Fundamental Research Grant Scheme (FRGS), S/O Code 14450 with Research and Innovation Management
Centre, Universiti Utara Malaysia, Kedah for the administration of this study.
5. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Research trends review on RSA scheme of asymmetric... (Mohd Saiful Adli Mohamad)
491
REFERENCES
[1] M. D. A. Mushtaque, H. Dhiman, S. Hussain, and S. Maheshwari, “Evaluation of DES, TDES, AES, blowfish and
twofish encryption algorithm: Based on space complexity,” International Journal of Engineering Research &
Technology, vol. 3 no. 4. pp. 283-286, 2014.
[2] S. K. Rakeshkumar, “Performance analysis of data encryption standard algorithm & proposed data encryption
standard algorithm,” International Journal of Engineering Research and Development, vol. 7, no. 10, pp. 11-20, 2013.
[3] L. Wang, H. Zhao, and G. Bai, “A cost-efficient implementation of public-key cryptography on embedded
systems”, 2007 Int. Workshop on Electron Devices and Semiconductor Technology (EDST), pp. 194-197, 2007.
[4] A. V Meier, “The elgamal cryptosystem,” Joint Advanced Students Seminar, 2005.
[5] J. Buchmann, F. Göpfert, T. Güneysu, T. Oder, and T. Pöppelmann, “High-performance and lightweight lattice-
based public-key encryption,” Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and
Security, pp. 2-9, 2016.
[6] R. L. Rivest, Adi Shamir, and Leonard Adleman, “A method for obtaining digital signatures and public key crypto
systems,” Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
[7] H. R. Hashim, “A new modification of RSA cryptosystem based on the number of the private keys,” American
Scientific Research Journal for Engineering, Technology, and Sciences, no. 24, no. 1, pp. 270-279, 2016.
[8] S. Mathur and D. Gupta, “A modified RSA approachfor encrypting and decrypting text and images using multi-
power , multi public keys, multi prime numbers and k- nearest neighbor algorithm,” AICTC '16: Proceedings of the
Int. Conf. on Advances in Information Communication Technology & Computing, vol. 1, no. 54, pp. 1-6, 2016.
[9] A. H. Al-Hamami and I. A. Aldariseh, “Enhanced method for RSA cryptosystem algorithm,” 2012 International
Conference on Advanced Computer Science Applications and Technologies (ACSAT), pp. 402-408, 2012.
[10] M. Thangavel, P. Varalakshmi, M. Murrali, and K. Nithya, “An enhanced and secured RSA key generation scheme
(ESRKGS),” Journal of Information Security and Applications, vol. 20, pp. 3-10, 2015.
[11] B. P. U. Ivy, P. Mandiwa, and M. Kumar, “A modified RSA cryptosystem based on ‘n’ prime numbers,”
International Journal of Engineering and Computer Science, vol. 1, no. 2, pp. 62-66, 2012.
[12] A. K. Hussain, “A modified RSA Algorithm for security enhancement and redundant messages elimination using k-
nearest neighbor algorithm,” International Journal of Innovative Science, Engineering & Technology, vol. 2, no. 1,
pp. 159-163, 2015.
[13] Md Wasim and P. Paul, “Implementing the information security using modified RSA algorithm with the help of N
prime number,” International Journal of Innovative Research in Computer and Communication Engineering, vol.
4, no. 10, pp. 18055-18062, 2016.
[14] D. B. Khairnar and P. S. Kadam, “Secure RSA: Pair wise key distribution using modified RSA algorithm,”
International Journal of Advanced Research in Computer Science and Software Engineering, vol. 6, no. 4,
pp. 383-387, 2016.
[15] P. K. Panda and S. Chatoppadhyay, “ A Hybrid Security Algorithm for RSA Cryptosystem, ” In 2017 4th
International Conference on Advanced Computing and Communication Systems, IEEE, pp. 1-6, 2017.
[16] D. Aggarwal and U. Maurer, “Breaking RSA generically is equivalent to factoring,” IEEE Transactions on
Information Theory, vol. 62, no. 11, pp. 6251-6259, Nov. 2016.
[17] Xin Zhou and Xiaofei Tang, “Research and implementation of RSA algorithm for encryption and decryption”,
Proceedings of 2011, 6th International Forum on Strategic Technology, pp. 1118-1121, 2011.
[18] R. Ghosh, “An efficient and robust modified RSA based security,” Journal of Computer Science Engineering and
Information Technology Research, vol. 6, no. 2, pp. 15-22, 2016.
[19] M. Bayat and M. R. Aref, “An Antribute-based tripartite Key Agreement Protocol,” International Journal of
Communication Systems, vol. 28, no. 8, pp. 1419-1431, 2015.
[20] L. Qiu, Z. Liu, G. C. C. F. Pereira, and H. Seo, “Implementing RSA for sensor nodes in smart cities,” Personal and
Ubiquitous Computing, vol. 21, no. 5, pp. 807-813, 2017.
[21] A. Mansour, A. Davis, M. Wagner, R. Bassous, H. Fu, and Y. Zhu, “Multi - asymmetric cryptographic RSA
scheme,” Proceedings of the 12th Annual Conference on Cyber and Information Security Research, pp. 1-8, 2017.
[22] A. E. Mezher, “Enhanced RSA cryptosystem based on multiplicity of public and private keys,” International
Journal of Electrical and Computer Engineering, vol. 8, no. 5, pp. 3949-3953, 2018.
[23] I. Al-Barazanchi, S. A. Shawkat, M. H. Hameed, and K. S. L. Al-badri, “Modified RSA-based algorithm: A double
secure approach,” TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 17, no. 6,
pp. 2818-2825, 2019.
[24] A. Chavan, A. Jadhav, S. Kumbhar, and I. Joshi, “Data transmission using RSA algorithm,”International Research
Journal of Engineerin and Technology, vol. 6, no. 3, pp. 34-36, 2019.
[25] K. D. M. AlSabti and H. R. Hashim, “A new approach for image encryption in the modified RSA cryptosystem
using MATLAB,” Global Journal of Pure and Applied Mathematics, vol. 12, no. 4, pp. 3631-3640, 2016.
[26] S. Anandakumar, “Image cryptography using RSA algorithm in network security” International Journal of
Computer Science Engineering and Technology, vol. 5, no. 9, pp. 326-30, 2015.
[27] A. S. Al Najjar, “Implementation color-images cryptography using RSA algorithm,” International Journal Advance
Research in Computer Science Software Engineering, vol. 7, no. 11, pp. 181-185, 2017.
[28] D. Jagadiswary and D. Saraswady, “Estimation of modified RSA cryptosystem with hyper image encryption
algorithm,” Indian Journal of Science and Technology, vol. 10, no. 7, pp. 1-5, 2017.
[29] U. Gulen, A. Alkhoidary, and S. Baktir, “Implementing RSA for wireless sensor nodes,” Sensors (Switzerland),
vol. 19, no. 13, p. 2864, 2019.
6. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 1, February 2021 : 487 – 492
492
[30] C. Meshram, “Discrete Logarithm and Integer Factorization using ID-based Encryption,” Bulletin of Electrical
Engineering and Informatics, vol. 4, no. 2, pp. 160-168, 2015.
[31] E. R. Arboleda, J. L. Balaba, and J. C. L. Espineli, “Chaotic rivest-shamir-adlerman algorithm with data encryption
standard scheduling,” Bulletin of Electrical Engineering and Informatics, vol. 6, no. 3, pp. 219-227, 2017.
[32] N. A. Hasan and Alaa K. Farhan, “Security improve in ZigBee protocol based on RSA public algorithm in WSN,”
Engineering and Technology Journal, vol. 37, no. 3B, pp. 67-73, 2019.
[33] W. Liang and Z. Yonggui, “A new personal information protection approach based on RSA cryptography,” 2011
IEEE International Symposium on IT in Medicine and Education, pp. 591-593, 2011.
[34] R. Minni, K. Sultania, S. Mishra, and D. R. Vincent, “An algorithm to enhance security in RSA,” 2013 Fourth
International Conference on Computing, Communications and Networking Technologies (ICCCNT), pp. 1-4, 2013.
[35] N. Tahat, A. A. Tahat, M. Abu-Dalu, R. B. Albadarneh, A. E. Abdallah, and O. M. Al-Hazaimeh, “A new RSA
public key encryption scheme with chaotic maps,” International Journal of Electrical and Computer Engineering,
vol. 10, no. 2, pp. 1430-1437, 2020.
[36] G. Zhao, X. Yang, B. Zhou, and W. Wei, “RSA-based digital image encryption algorithm in wireless sensor
networks” 2010 2nd International Conference on Signal Processing Systems, pp. V2-640-V2-643, 2010.
[37] R. Kayalvizhi, M. Vijayalakshmi, and V. Vaidehi, “Energy analysis of RSA and ELGAMAL algorithms for
wireless sensor networks,” International Conference on Network Security and Applications, pp. 172-180, 2010.
[38] G. Sharma, S. Bala, and A. K. Verma, “An improved RSA-based certificateless signature scheme for wireless
sensor networks,” International Journal of Network Security, vol. 18, no. 1, pp. 82-89, 2016.
[39] J. Singh, V. Kumar, and R. Kumar, “An RSA based certificateless signature scheme for wireless sensor networks,”
2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pp. 443-447, 2015.
[40] P. Satapathy, N. Pandey, and S. K. Khatri, “NFC car keys by using RSA cryptography in WSN security,” 2019 3rd
International conference on Electronics, Communication and Aerospace Technology (ICECA), pp. 143-147, 2019.
[41] Abdullah Said Alkalbani, T. Mantoro, and A. O. M. Tap, “Comparison between RSA hardware and software
implementation for WSNs security schemes,” Proceeding of the 3rd International Conference on Information and
Communication Technology for the Moslem World (ICT4M), pp. E84-E89, 2010.
[42] C-Y. Cheng, I-C. Lin, and S-Y. Huang, “An RSA-like scheme for multiuser broadcast authentication in wireless
sensor networks,” International Journal of Distributed Sensor Networks, vol. 11, no. 9, p. 743623, 2015.
[43] R. Kumar and H. K. Verma, “An advanced secure (t, n) threshold proxy signature scheme based on RSA
cryptosystem for known signers,” 2010 IEEE 2nd International Advance Computing Conference (IACC),
pp. 293-298, 2010.
[44] L. Deng, H. Huang, and Y. Qu, “Identity based proxy signature from RSA without pairings,” International Journal
of Network Security, vol. 19, no. 2, pp. 229-235, 2017.
[45] M. R. Asaar, M. Salmasizadeh, and W. Susilo, “A short identity-based proxy ring signature scheme from RSA,”
Computer Standards & Interfaces, vol. 38, pp. 144-151, 2015.
BIOGRAPHIES OF AUTHORS
Mohd Saiful Adli Mohamad received his Bachelor of Science in Mathematic and Master of
Science in Mathematic from Universiti Teknologi Malaysia (UTM) in 2006 and 2008 respectively. He
later completed his Ph.D from Universiti Kebangsaan Malasysia (UKM) in 2017. He is currently a
Senior Lecturer in School of Quantitative Science in UUM with research interests in developing
cryptographic algorithm for long-term security.
Roshidi Din received his Bachelor of Information Technology and Master of Science in Information
Technology degrees from Universiti Utara Malaysia (UUM) in 1996 and 1999 respectively. He later
completed his Ph.D from Universiti Sains Malaysia (USM) in 2015. He is currently at the School of
Computing, UUM. His current research interests are more on the application of Discrete
Mathematics in various areas especially in Information Security, Steganography and Steganalysis,
and Natural Language Steganology.
Jasmin Ilyani Ahmad received his Bachelor of Science in Mathematic and Master of Science in
Mathematic from Universiti Putra Malaysia (UPM). She is a Senior Lecturer in Universiti Teknologi
Mara (UiTM) at Sungai Petani, Kedah, Malaysia. Currently, she is a Ph.D student, School of
Computing (SOC), Awang Had Salleh Graduate School (AHSGS), Universiti Utara Malaysia, Sintok,
Kedah, Malaysia.