A Novel Hybrid Security Algorithm

Manisha Kumari *, Deeksha Ekka **, Nishi Yadav ***
*-** UG Scholar, Department of Computer Science and Engineering, Guru Ghasidas University, Bilaspur, Chhattisgarh, India.
*** Assistant Professor, Department of Computer Science and Engineering, Guru Ghasidas University, Bilaspur, Chhattisgarh, India.
Periodicity:March - May'2018
DOI : https://doi.org/10.26634/jit.7.2.14651

Abstract

A New Novel Hybrid Security Algorithm (NHSA) for Rivest-Shamir-Adleman (RSA) cryptosystem was proposed in this paper, which is based on Encryption algorithm using Dual Modulus and Enhanced method for RSA (ERSA) cryptosystem. Here, the computation of public keys and private keys depends on modulus values, each computed using three different prime integers. Thus complexity involved in factorizing the modulus value increases. It improves the security of RSA scheme against Brute Force Attack using double mod operation based encryption and decryption. Therefore, it is not possible to retrieve the original message for the cipher text even after determining a single public key. Also it is difficult to factorize the modulus value into its three prime factors. Thus it enhances the security of encrypted data two times. In this paper, the proposed algorithm is compared with “Encryption algorithm using dual modulus” in terms of key generation time and security of data.

Keywords

NHSA, RSA Cryptosystem, Dual Modulus, Prime Number, Encryption, Decryption.

How to Cite this Article?

Kumari,M., Ekka,D., and Yadav,N. (2018). A Novel Hybrid Security Algorithm. i-manager’s Journal on Information Technology, 7(2), 37-43. https://doi.org/10.26634/jit.7.2.14651

References

[1]. Aboud, S. J., AL-Fayoumi, M. A., Al-Fayoumi, M., & Jabbar, H. S. (2008). An efficient RSA public key encryption scheme. In Information Technology: New Generations, 2008. ITNG 2008. Fifth International Conference on (pp. 127-130). IEEE.
[2]. Al-Hamami, A. H., & Aldariseh, I. A. (2012). Enhanced method for RSA cryptosystem algorithm. In Advanced Computer Science Applications and Technologies (ACSAT), 2012 International Conference on (pp. 402- 408). IEEE.
[3]. Ambedkar, B. R., Gupta, A., Gautam, P., & Bedi, S. S. (2011). An efficient method to factorize the RSA public key encryption. In Communication Systems and Network Technologies (CSNT), 2011 International Conference on (pp. 108-111). IEEE.
[4]. Bhandari, A., Gupta, A., & Das, D. (2016). Secure algorithm for cloud computing and its applications. In Cloud System and Big Data Engineering (Confluence), th 2016 6 International Conference (pp. 188-192). IEEE.
[5]. Devkota, D., Ghimire, P., Burris, J., & Alkadi, I. (2015). Comparison of security algorithms in cloud computing. In Aerospace Conference, 2015 IEEE (pp. 1-7). IEEE.
[6]. Dongjiang, L., Yandan, W., & Hong, C. (2012). The research on key generation in RSA public-key cryptosystem. In Computational and Information Sciences (ICCIS), 2012 Fourth International Conference on (pp. 578-580). IEEE.
[7]. Goel, A. (2017). Encryption algorithm using dual modulus. In Computational Intelligence & Communication rd Technology (CICT), 2017 3 International Conference on (pp. 1-4). IEEE.
[8]. Jeeva, A. L., Palanisamy, D. V., & Kanagaram, K. (2012). Comparative analysis of performance efficiency and security measures of some encryption algorithms. International Journal of Engineering Research and Applications (IJERA), 2(3), 3033-3037.
[9]. Madaan, S., & Agrawal, R. K. (2012). Implementation of identity based distributed cloud storage encryption scheme using PHP and C for Hadoop File System. In Tier 2 Federation Grid, Cloud & High Performance Computing th Science (RO-LCG), 2012 5 Romania (pp. 74-77). IEEE.
[10]. Osseily, H. A., Haidar, A. M., & Kassem, A. (2008). Implementation of RSA Encryption using Identical Modulus Algorithm. In Information and Communication Technologies: From Theory to Applications, 2008. ICTTA rd 2008. 3 International Conference on (pp. 1-6). IEEE.
[11]. Pancholi, V. R., & Patel, B. P. (2016). Enhancement of cloud computing security with secure data storage using AES. International Journal for Innovative Research in Science and Technology, 2(9), 18-21.
[12]. Panda, P. K., & Chattopadhyay, S. (2017). A hybrid security algorithm for RSA cryptosystem. In Advanced Computing and Communication Systems (ICACCS), th 2017 4 International Conference on (pp. 1-6). IEEE.
[13]. Ramaporkalai, T. (2017). Security Algorithms in Cloud Computing. International Journal of Computer Science Trends and Technology (IJCST), 5(2), 500-503.
[14]. Suja, G. J., & Jose, S. (2016). New approach for highly secured I/O transfer with data on timer streaming. In Computing for Sustainable Global Development rd (INDIACom), 2016 3 International Conference on (pp. 885-889). IEEE.
[15]. Verma, S., & Garg, D. (2014). An Improved RSA Variant. International Journal of Advancements in Technology, 5(2), 161-169.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.