Signature Security Development Utilizing Rivest Shamir Adleman and Affine Cipher Cryptographic Algorithms
Keywords:
Signature, Affine Cipher, Rivest Shamir Adleman, Cryptography, AlgorithmAbstract
The purpose of this research was to secure images using only Base64 security and combining Affine Cipher and Rivest Shamir Adleman cryptography in image security. The research used a qualitative descriptive method, using document study procedures, natural observations and interviews to obtain and collect data. Meanwhile, software development techniques use the Rapid Application Development (RAD) method. The results of the study, hybrid cryptography which is a combination of Affine Cipher and Rivest Shamir Adleman cryptography methods are able to overcome weaknesses in securing Base64 encoding according to the tests that have been carried out. Weaknesses in Affine Cipher cryptography can be covered with Rivest Shamir Adleman cryptography so that the value of confidentiality is better maintained and the value of integrity is also better maintained because the use of asymmetric keys in RSA cryptography is difficult to solve. In comparison, hybrid cryptography is able to disguise signature image data well, but in terms of speed it takes longer and data memory usage becomes larger compared to using only Base64 encoding.
Downloads
References
M. Ienca and P. Haselager, “Hacking the brain: brain–computer interfacing technology and the ethics of neurosecurity,” Ethics Inf. Technol., vol. 18, no. 2, pp. 117–129, 2016.
M. E. Whitman and H. J. Mattord, Principles of Information Security. Cengage Learning, 2021.
A. McLeod and D. Dolezel, “Cyber-analytics: Modeling factors associated with healthcare data breaches,” Decis. Support Syst., vol. 108, pp. 57–68, 2018.
M. G. Cains, L. Flora, D. Taber, Z. King, and D. S. Henshel, “Defining Cyber Security and Cyber Security Risk within a Multidisciplinary Context using Expert Elicitation,” Risk Anal., vol. 42, no. 8, pp. 1643–1669, Aug. 2022.
A. Aloraini and M. Hammoudeh, “A Survey on Data Confidentiality and Privacy in Cloud Computing,” in Proceedings of the International Conference on Future Networks and Distributed Systems, 2017.
L. Yang, N. Elisa, and N. Eliot, “Chapter 7 - Privacy and Security Aspects of E-Government in Smart Cities,” D. B. Rawat and K. Z. B. T.-S. C. C. and P. Ghafoor, Eds. Elsevier, 2019, pp. 89–102.
L. Kim, “Cybersecurity: Ensuring Confidentiality, Integrity, and Availability of Information BT - Nursing Informatics : A Health Informatics, Interprofessional and Global Perspective,” U. H. Hübner, G. Mustata Wilson, T. S. Morawski, and M. J. Ball, Eds. Cham: Springer International Publishing, 2022, pp. 391–410.
A. Panigrahi, A. K. Nayak, and R. Paul, “Issues and Challenges of Classical Cryptography in Cloud Computing,” in Machine Learning Approach for Cloud Data Analytics in IoT, 2021, pp. 143–165.
T. Varshney, N. Sharma, I. Kaushik, and B. Bhushan, “Authentication & Encryption Based Security Services in Blockchain Technology,” in 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), 2019, pp. 63–68.
A. Tchernykh, U. Schwiegelsohn, E. Talbi, and M. Babenko, “Towards understanding uncertainty in cloud computing with risks of confidentiality, integrity, and availability,” J. Comput. Sci., vol. 36, p. 100581, 2019.
S. Rani and H. Kaur, “Technical Review on Symmetric and Asymmetric Cryptography Algorithms,” Int. J. Adv. Res. Comput., vol. 8, no. 4, pp. 182–186, 2017.
P. Sethi and V. Kapoor, “A Proposed Novel Architecture for Information Hiding in Image Steganography by Using Genetic Algorithm and Cryptography,” Procedia Comput. Sci., vol. 87, pp. 61–66, 2016.
K. D. Abel, S. Misra, A. Agrawal, R. Maskeliunas, and R. Damasevicius, “Data Security Using Cryptography and Steganography Technique on the Cloud,” Lect. Notes Electr. Eng., vol. 834, no. 6, pp. 475–481, 2022.
M. S. Taha, M. S. Mohd Rahim, S. A. Lafta, M. M. Hashim, and H. M. Alzuabidi, “Combination of Steganography and Cryptography: A short Survey,” IOP Conf. Ser. Mater. Sci. Eng., vol. 518, no. 5, p. 52003, 2019.
C. M. S. Tan, G. P. Arada, A. C. Abad, and E. R. Magsino, “A Hybrid Encryption and Decryption Algorithm using Caesar and Vigenere Cipher,” J. Phys. Conf. Ser., vol. 1997, no. 1, p. 12021, 2021.
Z. Qowi and N. Hudallah, “Combining caesar cipher and hill cipher in the generating encryption key on the vigenere cipher algorithm,” J. Phys. Conf. Ser., vol. 1918, no. 4, p. 42009, 2021.
R. I. Masya, R. F. Aji, and S. Yazid, “Comparison of Vigenere Cipher and Affine Cipher in Three-pass Protocol for Securing Image,” in 2020 6th International Conference on Science and Technology (ICST), 2020, vol. 1, pp. 1–5.
P. N. Lone, D. Singh, V. Stoffová, D. C. Mishra, U. H. Mir, and N. Kumar, “Cryptanalysis and Improved Image Encryption Scheme Using Elliptic Curve and Affine Hill Cipher,” Mathematics, vol. 10, no. 20. 2022.
F. Mallouli, A. Hellal, N. S. Saeed, and F. A. Alzahrani, “A Survey on Cryptography: Comparative Study between RSA vs ECC Algorithms, and RSA vs El-Gamal Algorithms,” in 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), 2019, pp. 173–176.
T. S. Obaid, “Study A Public Key in RSA Algorithm,” Eur. J. Eng. Technol. Res., vol. 5, no. 4 SE-Articles, pp. 395–398, Apr. 2020.
M. M. Taher, A. R. B. H. J. Ahmad, R. S. Hameed, and S. S. Mokri, “a Literature Review of Various Steganography Methods,” J. Theor. Appl. Inf. Technol., vol. 100, no. 5, pp. 1412–1427, 2022.
I. Gunawan, Sumarno, H. S. Tambunan, E. Irawan, H. Qurniawan, and D. Hartama, “Combination of Caesar Cipher Algorithm and Rivest Shamir Adleman Algorithm for Securing Document Files and Text Messages,” J. Phys. Conf. Ser., vol. 1255, no. 1, p. 12077, 2019.
P. N. Lone, D. Singh, and U. H. Mir, “A novel image encryption using random matrix affine cipher and the chaotic maps,” J. Mod. Opt., vol. 68, no. 10, pp. 507–521, Jun. 2021.
A. Purnomo Sidik, S. Efendi, and S. Suherman, “Improving One-Time Pad Algorithm on Shamir’s Three-Pass Protocol Scheme by Using RSA and ElGamal Algorithms,” J. Phys. Conf. Ser., vol. 1235, no. 1, p. 12007, 2019.
A. E. Mezher, “Enhanced RSA cryptosystem based on multiplicity of public and private keys,” Int. J. Electr. Comput. Eng., vol. 8, no. 5, pp. 3949–3953, 2018.
H. Kim, J. S. Sefcik, and C. Bradway, “Characteristics of Qualitative Descriptive Studies: A Systematic Review,” Res. Nurs. Health, vol. 40, no. 1, pp. 23–42, Feb. 2017.
M. Rizwan and M. Iqbal, “Application of 80/20 Rule in Software Engineering Rapid Application Development (RAD) Model BT - Software Engineering and Computer Systems,” 2011, pp. 518–532.
R. Rahayu, E. W. Abbas, and J. Jumriani, “Social Studies Lesson Planning for Children with Intellectual Disabilities in the Pembina State Special School of South Kalimantan Province,” Kalimantan Soc. Stud. J., vol. 2, no. 2, pp. 160–169, 2021.
M. Sarkar and S. Ghosh, “Development of a secured optical code-division multiple access system by implementing hybrid 2D-modified Walsh code,” Opt. Eng., vol. 59, no. 10, p. 106107, Oct. 2020.
P. Singh, R. Kumar, A. K. Yadav, and K. Singh, “Security analysis and modified attack algorithms for a nonlinear optical cryptosystem based on DRPE,” Opt. Lasers Eng., vol. 139, p. 106501, 2021.
A. R. Tuasikal, D. Indra, and F. Fattah, “Analisis Perbandingan Known Plaintext dan Chosen Plaintext Pada Metode Hill Chiper,” Bul. Sist. Inf. dan Teknol. Islam (BUSITI); Vol 1, No 1 (2020)DO - 10.33096/busiti.v1i1.514 , Feb. 2020.
W. Wei, M. Woźniak, R. Damaševičius, X. Fan, and Y. Li, “Algorithm Research of Known-plaintext Attack on Double Random Phase Mask Based on WSNs,” J. Internet Technol. Vol 20, No 1, Jan. 2019.
Latha, S. ., Gundavarapu, M. R. ., Kumar, N. P. ., Parameswari, D. V. L. ., & Reddy, B. R. K. . (2023). Technology for Kisan Samanvayam: Nutrition Intelligibility of Groundnut Plant using IoT-ML Framework. International Journal on Recent and Innovation Trends in Computing and Communication, 11(3), 273–282. https://doi.org/10.17762/ijritcc.v11i3.6345
Prof. Naveen Jain. (2013). FPGA Implementation of Hardware Architecture for H264/AV Codec Standards. International Journal of New Practices in Management and Engineering, 2(01), 01 - 07. Retrieved from http://ijnpme.org/index.php/IJNPME/article/view/11
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.