DOI QR코드

DOI QR Code

Toward a New Safer Cybersecurity Posture using RC6 & RSA as Hybrid Crypto-Algorithms with VC Cipher

  • Jenan.S, Alkhonaini (Department of Computer Science and Information, College of Science, Majmaah University) ;
  • Shuruq.A, Alduraywish (Department of Computer Science and Information, College of Science, Majmaah University) ;
  • Maria Altaib, Badawi (Department of Computer Science and Information, College of Science, Majmaah University)
  • Received : 2023.01.05
  • Published : 2023.01.30

Abstract

As our community has become increasingly dependent on technology, security has become a bigger concern, which makes it more important and challenging than ever. security can be enhanced with encryption as described in this paper by combining RC6 symmetric cryptographic algorithms with RSA asymmetric algorithms, as well as the Vigenère cipher, to help manage weaknesses of RC6 algorithms by utilizing the speed, security, and effectiveness of asymmetric algorithms with the effectiveness of symmetric algorithm items as well as introducing classical algorithms, which add additional confusion to the decryption process. An analysis of the proposed encryption speed and throughput has been conducted in comparison to a variety of well-known algorithms to demonstrate the effectiveness of each algorithm.

Keywords

References

  1. Ruziq, F., Sihombing, P., & Author, C. (2020). Combination Analysis of Data Encryption Standard (DES) Algorithm and LUC Algorithm on File Security. International Journal of Research and Review, 7(2).
  2. Erna,K,N. and Analisis,K,M. (2008) Algoritma Vigenere Cipher Dengan Mode Operasi Cipher Block Chaining (CBC).
  3. Naik, P. G., & Naik, G. R. (2014). Asymmetric key encryption using genetic algorithm. International Journal of Latest Trends in Engineering and Technology (IJLTET), 3(3), 118-128.
  4. Hoobi, M. M., Sulaiman, S. S., & AbdulMunem, I. A. (2020, November). Enhanced Multistage RSA Encryption Model. In IOP Conference Series: Materials Science and Engineering (Vol. 928, No. 3, p. 032068). IOP Publishing. https://doi.org/10.1088/1757-899X/928/3/032068
  5. Abdullah, A. M. (2017). Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptography and Network Security, 16, 1-11.
  6. Shorman, A., & Qatawneh, M. (2018). Performance improvement of double data encryption standard algorithm using parallel computation. International Journal of Computer Applications, 179, 25.
  7. Bhateja, A. K., Bhateja, A., Chaudhury, S., & Saxena, P. K. (2015). Cryptanalysis of Vigenere cipher using Cuckoo Search. Applied Soft Computing, 26, 315-324
  8. Jamaludin, J., & Romindo, R. (2020). Implementation of Combination Vigenere Cipher and RSA in Hybrid Cryptosystem for Text Security. IJISTECH (International Journal of Information System and Technology), 4(1), 471-481.
  9. Agu, E. O., Ogar Michael, O., & Okwori Anthony, O. (2019). Formation of an improved RC6 (IRC6) cryptographic algorithm. International Journal of Advanced Research in Computer Science, 10(4).
  10. Harba, E. S. I. (2017). Secure data encryption through a combination of AES, RSA and HMAC. Engineering, Technology & Applied Science Research, 7(4), 1781-1785.
  11. Paje, R. E. J., Sison, A. M., & Medina, R. P. (2019, January). Multidimensional key RC6 algorithm. In Proceedings of the 3rd International Conference on Cryptography, Security and Privacy (pp. 33-38).
  12. Gunasundari, T., & Elangovan, K. (2014). A comparative survey on symmetric key encryption algorithms. International Journal of Computer Science and Mobile Applications, 2(2), 78-.
  13. A. Sallam, E. EL-Rabaie, O. S. Faragallah. (2012) "HEVC selective encryption using RC6 block cipher technique".
  14. Rahmadani, R., Putri, T. T. A., Sriadhi, S., Sari, R. D., & Hutahaean, H. D. (2020, April). Data security system using hybrid cryptosystem RC4A-RSA algorithm. In IOP Conference Series: Materials Science and Engineering (Vol. 830, No. 3, p. 032008). IOP Publishing. https://doi.org/10.1088/1757-899X/830/3/032008
  15. Amoroso, E. ( 2006 ) Cyber Security. New Jersey: Silicon Press).
  16. Oxford University Press. (2014) Oxford Online Dictionary. Oxford: Oxford University Press. October http://www.oxforddictionaries.com/definition/english/Cybersecurity).
  17. William Stallings "Network Security Essentials (Applications and Standards)", Pearson Education, 2004.
  18. Paar C and Pelzl J 2010 Understanding Cryptography Springer Verlag Berlin Heidelberg
  19. N. Smart, (1999) Cryptography: An Introduction, 3rd Ed
  20. Agu, E. O., Ogar Michael, O., & Okwori Anthony, O. (2019). Formation of an improved RC6 (IRC6) cryptographic algorithm. International Journal of Advanced Research in Computer Science, 10(4).