HomeIsabela State University Linker: Journal of Engineering, Computing and Technologyvol. 1 no. 2 (2024)

CERS Algorithm: An Enhanced Security System Using Hybrid Cryptosystem

Justine Jhorryeth P. Burgos | Paula Bianca S. Dimapilis | Edwin R. Arboleda | Jericho M. Bojorcelo | John Benedict A. De Vila

Discipline: Computer Science

 

Abstract:

Communication and information exchange through the internet have a significant risk of information leakage owing to security issues. In this paper, a new hybrid cryptosystem design is proposed in order to accomplish high-security communication. The Schnorr authentication algorithm is used in this research to ensure a high degree of data security and authentication by integrating RSA, El Gamal, and Chaos-based cryptosystems. The process begins with El Gamal's key generation scheme. El Gamal is well-known for its ability to compute complex discrete logarithms, and when paired with RSA, its abilities are dependent on the difficult process of factorization of large prime integers. Multiple key schemes were generated using the chaotic system. Finally, the Schnorr was utilized to verify the original sender of the message.



References:

  1. Al-Shabi, M. A. (2019). A survey on symmetric and asymmetric cryptography algorithms in information security. International Journal of Scientific and Research Publications (IJSRP), 9(3), 8779. https://doi.org/10.29322/ijsrp.9.03.2019.p8779
  2. Alegro, J. K. P., Arboleda, E. R., Pereña, M. R., & Dellosa, R. M. (2019). Hybrid Schnorr, RSA, and AES cryptosystem. International Journal of Scientific and Technology Research, 8(10), 1770–1776. https://www.ijstr.org/final-print/oct2019/Hybrid-Schnorr-Rsa-And-Aes-Cryptosystem-.pdf
  3. Arboleda, E. R. (2019). Secure and fast chaotic El Gamal cryptosystem. International Journal of Engineering and Advance Technology (IJEAT), 8(5), 1693–1699. https://www.ijeat.org/wp-content/uploads/papers/v8i5/E7532068519.pdf
  4. Bansal, V. P., & Singh, S. (2016). A hybrid data encryption technique using RSA and Blowfish for cloud computing on FPGAs. In 2015 2nd International Conference on Recent Advances in Engineering and Computational Sciences (RAECS 2015) (pp. 1–5). https://doi.org/10.1109/RAECS.2015.7453367
  5. Chinnasamy, P., Padmavathi, S., Swathy, R., & Rakesh, S. (2021). Efficient data security using hybrid cryptography on cloud computing. In Lecture Notes in Networks and Systems (Vol. 145, pp. 537–547). Springer. https://doi.org/10.1007/978-981-15-7345-3_46
  6. Enriquez, M., Garcia, D. W., & Arboleda, E. R. (2017). Enhanced hybrid algorithm of secure and fast chaos-based AES, RSA, and ElGamal cryptosystems. Indian Journal of Science and Technology, 10(27), 1–14. https://doi.org/10.17485/ijst/2017/v10i27/105001
  7. Espalmado, J. M. B., & Arboleda, E. R. (2017). DARE algorithm: A new security protocol by integration of different cryptographic techniques. International Journal of Electrical and Computer Engineering, 7(2), 1032–1041.
  8. Kocarev, L. (2013). Cryptography. IEEE Transactions on Circuits and Systems, 60(1), 5–21. https://doi.org/10.1109/7384.963463
  9. Kumari, P., Kumar, U., & Singh, S. K. (2019). Schnorr digital signature to improve security using quantum cryptography. Springer Singapore. https://doi.org/10.1007/978-981-13-3185-5
  10. Magsino, J. P., Arboleda, E. R., & Corpuz, R. R. (2019). Enhancing security of El Gamal encryption scheme using RSA and chaos algorithm for e-commerce application. International Journal of Scientific and Technology Research, 8(11). https://www.ijstr.org/final-print/nov2019/Enhancing-Security-Of-El-Gamal-Encryption-Scheme-Using-Rsa-And-Chaos-Algorithm-For-E-commerce-Application.pdf
  11. Maxwell, G., Poelstra, A., Seurin, Y., & Wuille, P. (2019). Simple Schnorr multi-signatures with applications to Bitcoin. Designs, Codes and Cryptography, 87(9), 2139–2164. https://doi.org/10.1007/s10623-019-00608-x
  12. Mo, F., Hsu, Y. C., Chang, H. H., Pan, S. C., Yan, J. J., & Liao, T. L. (2017). Design of an improved RSA cryptosystem based on synchronization of discrete chaotic systems. In Proceedings of the 2016 International Conference on Information System and Artificial Intelligence (ISAI 2016) (pp. 9–13). https://doi.org/10.1109/ISAI.2016.0012
  13. Padmavathi, B., & Kumari, S. (2017). A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique. Semantic Scholar. https://www.semanticscholar.org/paper/A-Survey-on-Performance-Analysis-of-DES-%2C-AES-and-Padmavathi-Kumari/a9de08631272bec3ef1082fc5f4f532a55d131ce
  14. Rivera, L. B., Bay, J. A., Arboleda, E. R., Pereña, M. R., & Dellosa, R. M. (2019). Hybrid Cryptosystem Using RSA, DSA, Elgamal, And AES. International Journal of Scientific & Technology Research, 8(10), 1777–1781. https://www.researchgate.net/publication/336818536_Hybrid_Cryptosystem_Using_RSA_DSA_Elgamal_And_AES
  15. Singh, G., & Supriya, S. (2013). A study of encryption algorithms (RSA, DES, 3DES, and AES) for information security. International Journal of Computer Applications, 67(19), 33–38. https://doi.org/10.5120/11507-7224
  16. Ukwuoma, H., Studies, S., & Hammawa, M. (2015). Optimized key generation for RSA encryption. Innovative Systems Design and Engineering, 6(11), 35–45.
  17. Vekariya, M. (2015). Comparative analysis of cryptographic algorithms and advanced cryptographic algorithms. International Journal of Computer Engineering and Sciences, 1(1), 1.