Signature Security Development Utilizing Rivest Shamir Adleman and Affine Cipher Cryptographic Algorithms

Authors

  • Andri Sukmaindrayana Informatics Engineering, STMIK DCI, Tasikmalaya, Indonesia
  • Aneu Yulianeu Informatics Management, STMIK DCI, Tasikmalaya, Indonesia

Keywords:

Signature, Affine Cipher, Rivest Shamir Adleman, Cryptography, Algorithm

Abstract

The purpose of this research was to secure images using only Base64 security and combining Affine Cipher and Rivest Shamir Adleman cryptography in image security. The research used a qualitative descriptive method, using document study procedures, natural observations and interviews to obtain and collect data. Meanwhile, software development techniques use the Rapid Application Development (RAD) method. The results of the study, hybrid cryptography which is a combination of Affine Cipher and Rivest Shamir Adleman cryptography methods are able to overcome weaknesses in securing Base64 encoding according to the tests that have been carried out. Weaknesses in Affine Cipher cryptography can be covered with Rivest Shamir Adleman cryptography so that the value of confidentiality is better maintained and the value of integrity is also better maintained because the use of asymmetric keys in RSA cryptography is difficult to solve. In comparison, hybrid cryptography is able to disguise signature image data well, but in terms of speed it takes longer and data memory usage becomes larger compared to using only Base64 encoding.

Downloads

Download data is not yet available.

References

M. Ienca and P. Haselager, “Hacking the brain: brain–computer interfacing technology and the ethics of neurosecurity,” Ethics Inf. Technol., vol. 18, no. 2, pp. 117–129, 2016.

M. E. Whitman and H. J. Mattord, Principles of Information Security. Cengage Learning, 2021.

A. McLeod and D. Dolezel, “Cyber-analytics: Modeling factors associated with healthcare data breaches,” Decis. Support Syst., vol. 108, pp. 57–68, 2018.

M. G. Cains, L. Flora, D. Taber, Z. King, and D. S. Henshel, “Defining Cyber Security and Cyber Security Risk within a Multidisciplinary Context using Expert Elicitation,” Risk Anal., vol. 42, no. 8, pp. 1643–1669, Aug. 2022.

A. Aloraini and M. Hammoudeh, “A Survey on Data Confidentiality and Privacy in Cloud Computing,” in Proceedings of the International Conference on Future Networks and Distributed Systems, 2017.

L. Yang, N. Elisa, and N. Eliot, “Chapter 7 - Privacy and Security Aspects of E-Government in Smart Cities,” D. B. Rawat and K. Z. B. T.-S. C. C. and P. Ghafoor, Eds. Elsevier, 2019, pp. 89–102.

L. Kim, “Cybersecurity: Ensuring Confidentiality, Integrity, and Availability of Information BT - Nursing Informatics : A Health Informatics, Interprofessional and Global Perspective,” U. H. Hübner, G. Mustata Wilson, T. S. Morawski, and M. J. Ball, Eds. Cham: Springer International Publishing, 2022, pp. 391–410.

A. Panigrahi, A. K. Nayak, and R. Paul, “Issues and Challenges of Classical Cryptography in Cloud Computing,” in Machine Learning Approach for Cloud Data Analytics in IoT, 2021, pp. 143–165.

T. Varshney, N. Sharma, I. Kaushik, and B. Bhushan, “Authentication & Encryption Based Security Services in Blockchain Technology,” in 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), 2019, pp. 63–68.

A. Tchernykh, U. Schwiegelsohn, E. Talbi, and M. Babenko, “Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability,” J. Comput. Sci., vol. 36, p. 100581, 2019.

S. Rani and H. Kaur, “Technical Review on Symmetric and Asymmetric Cryptography Algorithms,” Int. J. Adv. Res. Comput., vol. 8, no. 4, pp. 182–186, 2017.

P. Sethi and V. Kapoor, “A Proposed Novel Architecture for Information Hiding in Image Steganography by Using Genetic Algorithm and Cryptography,” Procedia Comput. Sci., vol. 87, pp. 61–66, 2016.

K. D. Abel, S. Misra, A. Agrawal, R. Maskeliunas, and R. Damasevicius, “Data Security Using Cryptography and Steganography Technique on the Cloud,” Lect. Notes Electr. Eng., vol. 834, no. 6, pp. 475–481, 2022.

M. S. Taha, M. S. Mohd Rahim, S. A. Lafta, M. M. Hashim, and H. M. Alzuabidi, “Combination of Steganography and Cryptography: A short Survey,” IOP Conf. Ser. Mater. Sci. Eng., vol. 518, no. 5, p. 52003, 2019.

C. M. S. Tan, G. P. Arada, A. C. Abad, and E. R. Magsino, “A Hybrid Encryption and Decryption Algorithm using Caesar and Vigenere Cipher,” J. Phys. Conf. Ser., vol. 1997, no. 1, p. 12021, 2021.

Z. Qowi and N. Hudallah, “Combining caesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm,” J. Phys. Conf. Ser., vol. 1918, no. 4, p. 42009, 2021.

R. I. Masya, R. F. Aji, and S. Yazid, “Comparison of Vigenere Cipher and Affine Cipher in Three-pass Protocol for Securing Image,” in 2020 6th International Conference on Science and Technology (ICST), 2020, vol. 1, pp. 1–5.

P. N. Lone, D. Singh, V. Stoffová, D. C. Mishra, U. H. Mir, and N. Kumar, “Cryptanalysis and Improved Image Encryption Scheme Using Elliptic Curve and Affine Hill Cipher,” Mathematics, vol. 10, no. 20. 2022.

F. Mallouli, A. Hellal, N. S. Saeed, and F. A. Alzahrani, “A Survey on Cryptography: Comparative Study between RSA vs ECC Algorithms, and RSA vs El-Gamal Algorithms,” in 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, pp. 173–176.

T. S. Obaid, “Study A Public Key in RSA Algorithm,” Eur. J. Eng. Technol. Res., vol. 5, no. 4 SE-Articles, pp. 395–398, Apr. 2020.

M. M. Taher, A. R. B. H. J. Ahmad, R. S. Hameed, and S. S. Mokri, “a Literature Review of Various Steganography Methods,” J. Theor. Appl. Inf. Technol., vol. 100, no. 5, pp. 1412–1427, 2022.

I. Gunawan, Sumarno, H. S. Tambunan, E. Irawan, H. Qurniawan, and D. Hartama, “Combination of Caesar Cipher Algorithm and Rivest Shamir Adleman Algorithm for Securing Document Files and Text Messages,” J. Phys. Conf. Ser., vol. 1255, no. 1, p. 12077, 2019.

P. N. Lone, D. Singh, and U. H. Mir, “A novel image encryption using random matrix affine cipher and the chaotic maps,” J. Mod. Opt., vol. 68, no. 10, pp. 507–521, Jun. 2021.

A. Purnomo Sidik, S. Efendi, and S. Suherman, “Improving One-Time Pad Algorithm on Shamir’s Three-Pass Protocol Scheme by Using RSA and ElGamal Algorithms,” J. Phys. Conf. Ser., vol. 1235, no. 1, p. 12007, 2019.

A. E. Mezher, “Enhanced RSA cryptosystem based on multiplicity of public and private keys,” Int. J. Electr. Comput. Eng., vol. 8, no. 5, pp. 3949–3953, 2018.

H. Kim, J. S. Sefcik, and C. Bradway, “Characteristics of Qualitative Descriptive Studies: A Systematic Review,” Res. Nurs. Health, vol. 40, no. 1, pp. 23–42, Feb. 2017.

M. Rizwan and M. Iqbal, “Application of 80/20 Rule in Software Engineering Rapid Application Development (RAD) Model BT - Software Engineering and Computer Systems,” 2011, pp. 518–532.

R. Rahayu, E. W. Abbas, and J. Jumriani, “Social Studies Lesson Planning for Children with Intellectual Disabilities in the Pembina State Special School of South Kalimantan Province,” Kalimantan Soc. Stud. J., vol. 2, no. 2, pp. 160–169, 2021.

M. Sarkar and S. Ghosh, “Development of a secured optical code-division multiple access system by implementing hybrid 2D-modified Walsh code,” Opt. Eng., vol. 59, no. 10, p. 106107, Oct. 2020.

P. Singh, R. Kumar, A. K. Yadav, and K. Singh, “Security analysis and modified attack algorithms for a nonlinear optical cryptosystem based on DRPE,” Opt. Lasers Eng., vol. 139, p. 106501, 2021.

A. R. Tuasikal, D. Indra, and F. Fattah, “Analisis Perbandingan Known Plaintext dan Chosen Plaintext Pada Metode Hill Chiper,” Bul. Sist. Inf. dan Teknol. Islam (BUSITI); Vol 1, No 1 (2020)DO - 10.33096/busiti.v1i1.514 , Feb. 2020.

W. Wei, M. Woźniak, R. Damaševičius, X. Fan, and Y. Li, “Algorithm Research of Known-plaintext Attack on Double Random Phase Mask Based on WSNs,” J. Internet Technol. Vol 20, No 1, Jan. 2019.

Latha, S. ., Gundavarapu, M. R. ., Kumar, N. P. ., Parameswari, D. V. L. ., & Reddy, B. R. K. . (2023). Technology for Kisan Samanvayam: Nutrition Intelligibility of Groundnut Plant using IoT-ML Framework. International Journal on Recent and Innovation Trends in Computing and Communication, 11(3), 273–282. https://doi.org/10.17762/ijritcc.v11i3.6345

Prof. Naveen Jain. (2013). FPGA Implementation of Hardware Architecture for H264/AV Codec Standards. International Journal of New Practices in Management and Engineering, 2(01), 01 - 07. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/11

Downloads

Published

22.07.2023

How to Cite

Sukmaindrayana, A. ., & Yulianeu, A. . (2023). Signature Security Development Utilizing Rivest Shamir Adleman and Affine Cipher Cryptographic Algorithms. International Journal of Intelligent Systems and Applications in Engineering, 11(3), 276–282. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3168

Issue

Section

Research Article