Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Scheduling

Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography algorithms come with the various types including the symmetric key algorithms and asymmetric key algorithms. In this paper, the authors applied the most commonly used algorithm, which is the RSA algorithm together with the Chaos system and the basic security device employed in the worldwide organizations which is the Data Encryption Standard (DES) with the objective to make a hybrid data encryption. The advantage of a chaos system which is its unpredictability through the use of multiple keys and the secrecy of the RSA which is based on integer factorization’s difficulty is combined for a more secure and reliable cryptography. The key generation was made more secure by applying the DES schedule to change the keys for encryption. The main strength of the proposed system is the chaotic variable key generator that chages the value of encrypted message whenever a different number of key is used. Using the provided examples the strength of security of the proposed system was tested and demonstrated.

[1]  John Mark Espalmado,et al.  DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques , 2017 .

[2]  Yunfei Li,et al.  Parallel Analysis of an Improved RSA Algorithm , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[3]  Namita Tiwari,et al.  EFFECTIVE IMPLEMENTATION AND AVALANCHE EFFECT OF AES , 2012 .

[4]  Abdallah Karakra,et al.  A-RSA: Augmented RSA , 2016, 2016 SAI Computing Conference (SAI).

[5]  Suryadi Mt,et al.  Performance of Chaos-Based Encryption Algorithm for Digital Image , 2014 .

[6]  Edwin R. Arboleda,et al.  Enhanced Hybrid Algorithm of Secure and Fast Chaos-based, AES, RSA and ElGamal Cryptosystems , 2017 .

[7]  M. Mani Roja,et al.  Dual-Layer Video Encryption using RSA Algorithm , 2015, ArXiv.

[8]  Akash Kumar Mandal,et al.  Analysis of Avalanche Effect in Plaintext of DES using Binary Codes , 2012 .

[9]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[10]  Ye Qian,et al.  The Analysis and Application on a Fractional-Order Chaotic System , 2014 .

[11]  P. Indumathi,et al.  Secure Optical Communication Using Chaos , 2011 .

[12]  Sanjay Silakari,et al.  Secure and Fast Chaos based Encryption System using Digital Logic Circuit , 2014 .

[13]  Prashant Sharma,et al.  RSA algorithm using modified subset sum cryptosystem , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).

[14]  Jassim Mohammed Ahmed,et al.  The enhancement of computation technique by combining RSA and El-Gamal Cryptosystems , 2011, Proceedings of the 2011 International Conference on Electrical Engineering and Informatics.

[15]  Man Young Rhee,et al.  Internet Security: Cryptographic Principles, Algorithms and Protocols , 2003 .

[17]  K. Thamizhchelvy,et al.  Data Hiding Technique with Fractal Image Generation Method using Chaos Theory and Watermarking , 2014 .

[18]  Gurpreet Singh,et al.  A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security , 2013, International Journal of Computer Applications.

[19]  Yuming Guo,et al.  Research on Chaotic Firefly Algorithm and the Application in Optimal Reactive Power Dispatch , 2017 .

[20]  Nentawe Y. Goshwe,et al.  Data Encryption and Decryption Using RSA Algorithm in a Network Environment , 2013 .

[21]  Alaa Hussein Al-Hamami,et al.  Enhanced Method for RSA Cryptosystem Algorithm , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).

[22]  Mohd. Shafry,et al.  Chaos image encryption methods: a survey study , 2017 .

[23]  Amin Ramezani,et al.  Illustrate the Butterfly Effect on the Chaos Rikitake system , 2014 .

[24]  Shikha Kuchhal Security Design of TDES Using Low Power VLSI Implementation , 2013 .

[25]  Bhavana Agrawal,et al.  Implementation of AES and RSA Using Chaos System , 2013 .

[26]  Karthik,et al.  Hybrid cryptographic technique using OTP:RSA , 2017, 2017 IEEE International Conference on Intelligent Techniques in Control, Optimization and Signal Processing (INCOS).