Securing Private Key using New Transposition Cipher Technique

The security of any public key cryptosystem depends on the private key thus, it is important that only an authorized person can have access to the private key. The paper presents a new algorithm that protects the private key using the transposition cipher technique. The performance of the proposed technique is evaluated by applying it in the RSA algorithm’s generated private keys using 512-bit, 1024-bit, and 2048-bit, respectively. The result shows that the technique is practical and efficient in securing private keys while in storage as it produced high avalanche effect.

[1]  Weigang Li,et al.  Protecting Your Own Private Key in Cloud: Security, Scalability and Performance , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).

[2]  Venkata SreeKrishna Koganti,et al.  Implementation of RSA , 2016, 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).

[3]  Babak Sokouti,et al.  An Approach in Improving Transposition Cipher System , 2009 .

[4]  Karim O. Elish,et al.  Device-based Isolation for Securing Cryptographic Keys , 2013, ANT/SEIT.

[6]  R. Kaur,et al.  Digital Signature , 2012, 2012 International Conference on Computing Sciences.

[7]  Yung-Cheol Byun,et al.  An Improved Data Encryption Standard to Secure Data Using Smart Cards , 2011, 2011 Ninth International Conference on Software Engineering Research, Management and Applications.

[8]  Carlisle M. Adams,et al.  Digital signatures for mobile users , 2014, 2014 IEEE 27th Canadian Conference on Electrical and Computer Engineering (CCECE).

[9]  Siddhartha Bhattacharyya,et al.  A study and analysis on symmetric cryptography , 2014, 2014 International Conference on Science Engineering and Management Research (ICSEMR).

[10]  Prateek Thakral,et al.  A new algorithm combining substitution & transposition cipher techniques for secure communication , 2017, 2017 International Conference on Trends in Electronics and Informatics (ICEI).

[11]  Tran Quang Duc,et al.  A Biometrics Encryption Key algorithm to protect private key in BioPKI based security system , 2009, 2009 7th International Conference on Information, Communications and Signal Processing (ICICS).

[12]  Sangita A. Jaju,et al.  A Modified RSA algorithm to enhance security for digital signature , 2015, 2015 International Conference and Workshop on Computing and Communication (IEMCON).

[14]  P. Varalakshmi,et al.  An Enhanced and Secured RSA Key Generation Scheme (ESRKGS) , 2015, J. Inf. Secur. Appl..

[15]  Vlad Yu. Budnik,et al.  Security of electronic digital signature in maritime industry , 2018, 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus).