AES-RSA: An Innovative Hybrid Security Framework for File Authentication, Integrity, and Data Secrecy Model

Authors

  • Smita Rath Associate Professor, Department of Computer Science & Information Technology, Siksha ‘O’ Anusandhan Deemed to Be University, India
  • Sushree Bibhuprada B. Priyadarshini Associate Professor, Department of Computer Science & Information Technology, Siksha ‘O’ Anusandhan Deemed to Be University,India
  • Deepak Kumar Patel Associate Professor, Department of Computer Science & Information Technology, Siksha ‘O’ Anusandhan Deemed to Be University, India
  • Prabhat Kumar Sahu Associate Professor, Department of Computer Science & Information Technology, Siksha ‘O’ Anusandhan Deemed to Be University, India.
  • Nibedita Jagadev Associate Professor, Department of Computer Science and Engineering, Siksha ‘O’ Anusandhan Deemed to Be University, India
  • Monalisa Panda Associate Professor, Department of Computer Science and Engineering, Siksha ‘O’ Anusandhan Deemed to Be University, India
  • Narayan Patra Associate Professor, Department of Computer Science & Information Technology, Siksha ‘O’ Anusandhan Deemed to Be University, India
  • Sipra Sahoo Associate Professor, Department of Computer Science and Engineering, Siksha ‘O’ Anusandhan Deemed to Be University, India

Keywords:

Advanced Encryption Standard (AES), Asymmetric Cryptography, Encryption, Decryption, Rivest-Shamir-Adleman (RSA), Symmetric Cryptography

Abstract

Data secrecy, integrity, and authenticity are the main aims of cryptography. Only the intended receiver may read a confidential communication, and authenticated messages will not change in transit. A guarantee that the communication comes from the intended sender comes through authentication. Symmetric and asymmetric cryptography come within the two categories of cryptography. This study uses the key management issue associated with Advanced Encryption Standard (AES) by incorporating the Rivest-Shamir-Adleman (RSA) algorithm to mask the symmetric key. By utilizing RSA, the security of AES provides a secure method for key exchange and management. In the case of symmetric cryptography, the same key is used, unlike asymmetric cryptography; there are two keys, like a public key and a private key, as in RSA. The AES encryption method shows a strong avalanche effect. This paper proposes a novel dynamic AES-RSA hybrid algorithm that introduces modifications to the traditional AES structure. Specifically, we alter the order of the Mix Columns and Shift Rows operations and increase the number of rounds in the AES algorithm to enhance the cryptographic strength and resistance against attacks. Our experimental results demonstrate that the dynamic AES-RSA algorithm with masked key management offers improved security and resistance against cryptographic attacks. The findings of this research paper highlight the importance of robust encryption techniques in ensuring file security. The proposed modifications to the AES algorithm provide a more secure and safe approach to protecting sensitive data.

Downloads

Download data is not yet available.

References

Milanov, E., The RSA algorithm. RSA laboratories, pp.1-11, 2009.

Kalpana, P., & Singaraju, S., Data security in cloud computing using RSA algorithm. International Journal of research in computer and communication technology, IJRCCT, ISSN, pp.2278-5841, 2012.

Saveetha, P., & Arumugam, S., “Study on Improvement in RSA Algorithm and its Implementation”, International Journal of Computer & Communication Technology, Vol. 3(6), pp.78, 2012.

Goshwe, N. Y., “Data encryption and decryption using RSA algorithm in a network environment”, International Journal of Computer Science and Network Security (IJCSNS), Vol. 13(7), pp.9, 2013.

Kota, C. M., & Aissi, C., Implementation of the RSA algorithm and its cryptanalysis. In 2002 GSW.

Rahman, M. M., Saha, T. K., & Bhuiyan, M. A. A., “Implementation of RSA algorithm for speech data encryption and decryption”, IJCSNS International Journal of Computer Science and Network Security, Vol. 12(3), pp.74-82, 2012.

Devi, A., Sharma, A., & Rangra, A., “A review on DES, AES and blowfish for image encryption & decryption”, International Journal of Computer Science and Information Technologies, Vol. 6(3), pp.3034-3036, 2015.

Grabbe, J. O., The DES algorithm illustrated, 2010.

Adhie, R. P., Hutama, Y., Ahmar, A. S., & Setiawan, M. I., “Implementation cryptography data encryption standard (DES) and triple data encryption standard (3DES) method in communication system based near field communication (NFC)”, In Journal of Physics: Conference Series, Vol. 954, No. 1, p. 012009. IOP Publishing, 2018.

Taghipour, M., Moghadam, A., Moghadam, N. S. B., & Shekardasht, B., “Implementation of Software-Efficient DES Algorithm” Advances in Networks, Vol. 3(1), pp.7-22, 2015.

Saikumar, I., DES-Data Encryption Standard. International Research Journal of Engineering and Technology, Vol. 4(3), 2017.

Berent, A., Advanced Encryption Standard by Example. Document available at URL http://www. networkdls. com/Articles/AESbyExample. pdf (April 1 2007) Accessed: June 2013.

Gaj, K., & Chodowiec, P., Fast implementation and fair comparison of the final candidates for advanced encryption standard using field programmable gate arrays. In Topics in Cryptology—CT-RSA 2001: The Cryptographers’ Track at RSA Conference 2001 San Francisco, CA, USA, April 8–12, 2001 Proceedings (pp.84-99). Springer Berlin Heidelberg, 2001.

Stallings, W., Cryptography and network security principles and practices, 2006.

Yenuguvanilanka, J., & Elkeelany, O., Performance evaluation of hardware models of Advanced Encryption Standard (AES) algorithm. In IEEE SoutheastCon 2008 pp.222-225. IEEE, 2008.

Mohamed, A. A., & Madian, A. H., A Modified Rijndael Algorithm and it’s Implementation using FPGA. In 2010 17th IEEE International Conference on Electronics, Circuits and Systems pp.335-338. IEEE, 2010.

Pramstaller, N., Gurkaynak, F. K., Haene, S., Kaeslin, H., Felber, N., & Fichtner, W., Towards an AES crypto-chip resistant to differential power analysis. In Proceedings of the 30th European Solid-State Circuits Conference pp.307-310. IEEE, 2004.

Jain, R., Jejurkar, R., Chopade, S., Vaidya, S., & Sanap, M., AES algorithm using 512 bit key implementation for secure communication. Int. J. Innov. Res. Comput. Commun. Eng, Vol. 2(3), pp.3516-3522, 2014.

Selmane, N., Guilley, S., & Danger, J. L., Practical setup time violation attacks on AES. In 2008 Seventh European Dependable Computing Conference pp.91-96. IEEE, 2008.

Benvenuto, C. J., Galois field in cryptography. University of Washington, Vol. 1(1), pp.1-11, 2012.

Lee, H., Lee, K., & Shin, Y., Aes implementation and performance evaluation on 8-bit microcontrollers. arXiv preprint arXiv:0911.0482, 2009.

Padate, R., & Patel, A., Encryption and decryption of text using AES algorithm. International Journal of Emerging Technology and Advanced Engineering, Vol.4(5), pp.54-9, 2014.

Wright, C. P., Dave, J., & Zadok, E., Cryptographic file systems performance: What you don't know can hurt you. In Second IEEE International Security in Storage Workshop pp.47-47. IEEE, 2003.

Kretzschmar, U., Aes128–ac implementation for encryption and decryption. TI-White Paper, 2009.

Deshpande, A. M., Deshpande, M. S., & Kayatanavar, D. N., FPGA implementation of AES encryption and decryption. In 2009 international conference on control, automation, communication and energy conservation pp.1-6. IEEE, 2009.

Pletka, R., & Cachin, C., Cryptographic security for a high-performance distributed file system. In 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007) pp.227-232. IEEE, 2007.

Ors, S. B., Gurkaynak, F., Oswald, E., & Preneel, B., Power-analysis attack on an ASIC AES implementation. In International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. Vol. 2, pp.546-552. IEEE, 2004.

Han, S. J., Oh, H. S., & Park, J., The improved data encryption standard (DES) algorithm. In Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Techniques and Applications Vol. 3, pp.1310-1314. IEEE, 1996.

Zhou, X., & Tang, X., Research and implementation of RSA algorithm for encryption and decryption. In Proceedings of 2011 6th international forum on strategic technology Vol. 2, pp.1118-1121. IEEE, 2011.

Zhou, X., & Tang, X., Research and implementation of RSA algorithm for encryption and decryption. In Proceedings of 2011 6th international forum on strategic technology Vol. 2, pp.1118-1121. IEEE, 2011.

Karthigaikumar, P., & Rasheed, S., Simulation of image encryption using AES algorithm. IJCA special issue on “computational science-new dimensions & perspectives” NCCSE, pp.166-172, 2011.

Priyadarshini, S. B. B., Rath, S., Patel, S. M., Udgata, A., Mohanta, A., Ali, S. R., & Sahu, P. (2023). A Hybrid Random Image Generation Strategy (Hr-Igs) For Securing Plain Text Data In Networks. Journal of Theoretical and Applied Information Technology, 101(6).

Dumbere, D. M., & Janwe, N. J., Video encryption using AES algorithm. In Second International Conference on Current Trends in Engineering and Technology-ICCTET 2014 pp. 332-337, IEEE, 2014.

Heron, S., Advanced encryption standard (AES). Network Security, 2009(12), pp.8-12, 2009.

Radhadevi, P., & Kalpana, P. (2012). Secure image encryption using AES. International Journal of Research in Engineering and Technology, Vol.1(2), pp.115-117, 2012.

Abdullah, A. M., Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptography and Network Security, 16, pp.1-11, 2017.

Zeghid, M., Machhout, M., Khriji, L., Baganne, A., & Tourki, R. (2007). A modified AES based algorithm for image encryption. International Journal of Computer and Information Engineering, Vol. 1(3), pp.745-750, 2007.

Downloads

Published

24.03.2024

How to Cite

Rath, S. ., B. Priyadarshini, S. B. ., Patel, D. K. ., Sahu, P. K. ., Jagadev, N. ., Panda, M. ., Patra, N. ., & Sahoo, S. . (2024). AES-RSA: An Innovative Hybrid Security Framework for File Authentication, Integrity, and Data Secrecy Model. International Journal of Intelligent Systems and Applications in Engineering, 12(18s), 303–312. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4974

Issue

Section

Research Article

Similar Articles

You may also start an advanced similarity search for this article.