Optimization of The Gronsfeld Cipher Key Using Okamoto-Uchiyama Public-Key Cryptosystem for Data Security

All aspects of life requires security, including in computer. Cryptography is one of the methods continually developed in computer security. Combining ciphers is an effort to improve security with the expectation to increase the security level. This paper compared the execution time as a parameter between Gronsfeld cipher and optimized Gronsfeld cipher key using Okamoto-Uchiyama cryptosystem. The result of execution time was between 0.0030-0.0040 seconds for Gronsfeld cipher, and up to 0.0050 seconds for Gronsfeld cipher with key optimization using Okamoto-Uchiyama

[1]  Giorgio Di Natale,et al.  A New Secure Stream Cipher for Scan Chain Encryption , 2018, 2018 IEEE 3rd International Verification and Security Workshop (IVSW).

[2]  Rahul Johari,et al.  C3T: Cloud based Cyclic Cryptographic Technique and it’s comparative analysis with classical cipher techniques , 2018, 2018 5th International Conference on Signal Processing and Integrated Networks (SPIN).

[3]  Ratih Puspasari,et al.  Improve Security Algorithm Cryptography Vigenere Cipher Using Chaos Functions , 2018, 2018 6th International Conference on Cyber and IT Service Management (CITSM).

[4]  Indra Gunawan,et al.  Combination of Caesar Cipher Algorithm and Rivest Shamir Adleman Algorithm for Securing Document Files and Text Messages , 2019 .

[5]  Dian Rachmawati,et al.  Combination of columnar transposition cipher caesar cipher and lempel ziv welch algorithm in image security and compression , 2019, Journal of Physics: Conference Series.

[6]  An Wang,et al.  Power Attack and Protected Implementation on Lightweight Block Cipher SKINNY , 2018, 2018 13th Asia Joint Conference on Information Security (AsiaJCIS).

[7]  Bibhudendra Acharya,et al.  Privacy protection of biometric traits using modified hill cipher with involutory key and robust cryptosystem , 2010, Biometrics Technology.

[8]  Sanjay Kumar,et al.  Securing Data at rest using Hill Cipher and XOR based operations , 2018, 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA).