A Scalable Security Communication System Based on ElGamal and RSA Schemes

Document Type : Original Article

Authors

1 Dept. of Electronics and Communication Engineering Higher Inistitute of Engineering and Technology in El-Arish North Sinai,Egypt

2 Dept. of Electronics and Electrical Communication Faculty of Electronic Engineering, Menoufia University Menoufia, Egypt

Abstract

Enhancing the security schemes in a communication system is very important, where data is transmitted through the channels and can’t be secured by physical hardware. A security schemes (i.e., cryptographic schemes) can guarantee the data integrity, confidentiality and authentication. The optimum choice of security scheme is a challenge task for communication system to be more accuracy, efficiency and safety. In this paper, we propose scalable roulette security scheme under ElGamal’s and Rivest–Shamir–Adleman’s (RSA’s) key generators. The performance of the proposed scheme is analyzed and compared with the advanced encryption standard-128 (AES-128) scheme, blowfish scheme and international data encryption (IDE) scheme. We analyze the proposed scheme with time variable and random number synchronization. Results demonstrate that throughput performance of the proposed scheme that adopts ElGamal’s and RSA’s key generators outperforms the other schemes.

Keywords


[1] J. Mason, “Introduction to Cryptography: Simple Guide for Beginners,” TheBestVPN.com, 26-Feb-2018. [Online]. Available: https://thebestvpn.com/cryptography/. 
[2] K. Lee, S.-Y. Lee, C. Seo, and K. Yim, “TRNG (True Random Number Generator) Method Using Visible Spectrum for Secure Communication on 5G Network,” IEEE Access, vol. 6, pp. 12838–12847, 2018.
[3] A. R. Chowdhury, J. Mahmud, A. R. M. Kamal, and M. A. Hamid, “MAES: Modified Advanced Encryption Standard for Resource Constraint Environments,” 2018 IEEE Sensors Applications Symposium (SAS), 2018.
[4] T. F. G. Quilala, A. M. Sison, and R. P. Medina, “Modified Blowfish Scheme,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 12, no. 1, p. 38, 2018.
[5] H. K. Sahu, V. Jadhav, S. Sonavane, and R. Sharma, “Cryptanalytic Attacks on IDEA Block Cipher,” Defence Science Journal, vol. 66, no. 6, p. 582, 2016.
[6] M. A. Islam, M. A. Islam, N. Islam, and B. Shabnam, “A Modified and Secured RSA Public Key Cryptosystem Based on ‘n’ Prime Numbers,” Journal of Computer and Communications, vol. 06, no. 03, pp. 78–90, 2018.
[7] W. Dissanayake, “An Improvement of the Basic El-Gamal Public Key Cryptosystem,” International Journal of Computer Applications Technology and Research, vol. 07, no. 02, pp. 045–052, 2018.
[8] A. K. Azad and M. Y. Mollah, “EAES: Extended Advanced Encryption Standard with Extended Security,” Advances in Science, Technology and Engineering Systems Journal, vol. 3, no. 3, pp. 51–56, 2018.
[9] S. Oukili and S. Bri, “High Throughput Parallel Implementation of Blowfish Scheme,” Applied Mathematics & Information Sciences, vol. 10, no. 6, pp. 2087–2092, 2016.
[10] T. F. G. Quilala, A. M. Sison, and R. P. Medina, “Modified Blowfish Scheme,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 12, no. 1, p. 38, 2018.
[11] R. Rahim, M. Mesran, and A. P. U. Siahaan, “Data Security with International Data Encryption Scheme,” 2017.
[12] M. E. Pamukov, V. Poulkov, A. Mihovska, N. R. Prasad, and R. Prasad, “Lightweight Robust Cryptographic Combiner for Mobile Devices: Crypto Roulette,” 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), 2014.
[13] Tutorialspoint.com, “Advanced Encryption Standard,” www.tutorialspoint.com. [Online]. Available: https://www.tutorialspoint.com/cryptography/advanced_encryption_standard.htm.
[14] I am a cybersecurity researcher with a background in cryptography and malware reverse engineering. and BSc, MSc 2014 @ MIT (AI, Deep Learning). Former Competitive Programmer., “Encryption with Blowfish,” The One-Time Pad | Commonlounge.
[Online]. Available: https://www.commonlounge.com/discussion/d95616beecc148daaa23f35178691c35.
[15] Study.com. [Online]. Available: https://study.com/academy/lesson/blowfish-encryption-strength-example.html. [Accessed: 21-Dec-2018].
[16] H. K. Sahu, V. Jadhav, S. Sonavane, and R. Sharma, “Cryptanalytic Attacks on IDEA Block Cipher,” Defence Science Journal, vol. 66, no. 6, p. 582, 2016.
[17] K. K. Chennam, L. Muddana, and R. K. Aluvalu, “Performance Analysis of Various Encryption Schemes for Usage in Multistage Encryption for Securing Data in Cloud,” 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2017.
[18] K. Shahbazi, M. Eshghi, and R. F. Mirzaee, “Design and Implementation of an ASIP-Based Cryptography Processor for AES, IDEA, and MD5,” Engineering Science and Technology, an International Journal, vol. 20, no. 4, pp. 1308–1317, 2017.
[19] Swathi S. V., II Lahari P. M., III Bindu A. Thomas,”Encryption Schemes: A Survey”, International Journal of Advanced Research in Computer Science & Technology (IJARCST 2016),Vol. 4, Issue 2 (Apr. -Jun. 2016).
[20] B. F. Vajargah and R. Asghari, “A Novel Pseudo-Random Number Generator for Cryptographic Applications,” Indian Journal of Science and Technology, vol. 9, no. 6, Apr. 2016.
[21] M. Enriquez, D. W. Garcia, and E. Arboleda, “Enhanced Hybrid Scheme of Secure and Fast Chaos-based, AES, RSA and ElGamal Cryptosystems,” Indian Journal of Science and Technology, vol. 10, no. 27, pp. 1–14, Jan. 2017.
[22] M. Y. Rhee, Internet Security: Cryptographic Principles, Schemes and Protocols. Chichester: Wiley, 2005.
[23] F. H. Hsiao, “Chaotic Synchronization Cryptosystems Combined with RSA Encryption Scheme,” Fuzzy Sets and Systems, vol. 342, pp. 109–137, 2018.
Volume 28, ICEEM2019-Special Issue
ICEEM2019-Special Issue: 1st International Conference on Electronic Eng., Faculty of Electronic Eng., Menouf, Egypt, 7-8 Dec.
2019
Pages 169-176