Enhanced Hybrid Algorithm of Secure and Fast Chaos-based, AES, RSA and ElGamal Cryptosystems

Objectives: The principal objective of this paper is to develop an enhanced algorithm of cryptography through the hybridization of existing symmetric and asymmetric encryption. Methods/Analysis: The strength of several prevailing symmetric and asymmetric encryption were utilized in the proposed methodology. ElGamal’s key security based on difficulty of solving discrete logarithm, Chaos-based’s avalanche effect of using multiple keys, RSA’s security based on the difficulty of factorization of large numbers and AES’s S-Box mapping, which makes the encryption complex and unpredictable were adapted. Findings: The strength of security of the proposed hybrid algorithm is tested by the provided examples. It was found out that with the use of different keys in encryption, various ciphertexts were generated. The published public keys using such algorithm also make it infeasible to intrude because of the difficulty of solving discrete logarithm with large prime numbers. Furthermore, the value of the ciphertext of the proposed method is significantly different and, in some cases, larger than that of RSA’s. Applications: With this newly enhanced hybrid algorithm of data encryption, transferring and conveying of data will be much more secured.

[1]  Bhanu Prakash Lohani,et al.  International Journal of Advanced Research in Computer Science and Electronics Engineering , 2012 .

[2]  Igor N. Kovalenko,et al.  Asymmetric Cryptographic Algorithms , 2003 .

[3]  Man Young Rhee,et al.  Internet Security: Cryptographic Principles, Algorithms and Protocols , 2003 .

[4]  Pooja,et al.  Enhancing Cryptographic Security using Novel Approach based on Enhanced-RSA and Elamal: Analysis and Comparison , 2015 .

[5]  Ayushi A Symmetric Key Cryptographic Algorithm , 2010 .

[6]  Rafael Timóteo de Sousa Júnior,et al.  IDENTIFYING BANK FRAUDS USING CRISP -DM AND DECISION TREES , 2010 .

[7]  Sanjay Silakari,et al.  Secure and Fast Chaos based Encryption System using Digital Logic Circuit , 2014 .

[8]  Jacques Stern,et al.  RSA-OAEP Is Secure under the RSA Assumption , 2001, Journal of Cryptology.

[9]  K Sunitha Enhancing Privacy in Cloud Service Provider Using Cryptographic Algorithm , 2013 .

[10]  V. Krishnan Study of Symmetric key Cryptography Algorithms , 2015 .

[11]  Hayder Raheem Hashim,et al.  Image Encryption and Decryption in A Modification of ElGamal Cryptosystem in MATLAB , 2014, ArXiv.

[12]  Nivedita Bisht,et al.  Evaluating the Behavior of AluminumCorrosion in Hydrochloric Acid in thePresence Aqueous Extract of Olive Seeds , 2015 .

[13]  Mini Malhotra,et al.  A New Encryption Scheme Based on Enhanced RSA and ElGamal , 2014 .

[14]  Sangeeta Solanki,et al.  Encryption and Decryption Algorithm using ASCII values with substitution array Approach , 2013 .

[15]  Parsi Kalpana,et al.  Data Security in Cloud Computing using RSA Algorithm , 2012 .

[16]  Pawan Kumar,et al.  Domain Specific Named Entity Recognition (DSNER) from Web Documents , 2014 .

[17]  Tao Feng,et al.  Design of an Encryption-Decryption Module Oriented for Internet Information Security SOC Design , 2012, SOCO 2012.

[18]  Adnan A. Hnaif,et al.  E-VOTING PROTOCOL BASED ON PUBLIC -KEY CRYPTOGRAPHY , 2011 .

[19]  K.L.S. Sharma Data Communication and Networking , 2017 .

[20]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[21]  Ljupco Kocarev,et al.  Theory and practice of chaotic cryptography , 2007 .

[22]  Yashpalsingh Rajput,et al.  An Improved Cryptographic Technique to Encrypt Text using Double Encryption , 2014 .

[23]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .