AES-RSA: An Innovative Hybrid Security Framework for File Authentication, Integrity, and Data Secrecy Model
Keywords:
Advanced Encryption Standard (AES), Asymmetric Cryptography, Encryption, Decryption, Rivest-Shamir-Adleman (RSA), Symmetric CryptographyAbstract
Data secrecy, integrity, and authenticity are the main aims of cryptography. Only the intended receiver may read a confidential communication, and authenticated messages will not change in transit. A guarantee that the communication comes from the intended sender comes through authentication. Symmetric and asymmetric cryptography come within the two categories of cryptography. This study uses the key management issue associated with Advanced Encryption Standard (AES) by incorporating the Rivest-Shamir-Adleman (RSA) algorithm to mask the symmetric key. By utilizing RSA, the security of AES provides a secure method for key exchange and management. In the case of symmetric cryptography, the same key is used, unlike asymmetric cryptography; there are two keys, like a public key and a private key, as in RSA. The AES encryption method shows a strong avalanche effect. This paper proposes a novel dynamic AES-RSA hybrid algorithm that introduces modifications to the traditional AES structure. Specifically, we alter the order of the Mix Columns and Shift Rows operations and increase the number of rounds in the AES algorithm to enhance the cryptographic strength and resistance against attacks. Our experimental results demonstrate that the dynamic AES-RSA algorithm with masked key management offers improved security and resistance against cryptographic attacks. The findings of this research paper highlight the importance of robust encryption techniques in ensuring file security. The proposed modifications to the AES algorithm provide a more secure and safe approach to protecting sensitive data.
Downloads
References
Milanov, E., The RSA algorithm. RSA laboratories, pp.1-11, 2009.
Kalpana, P., & Singaraju, S., Data security in cloud computing using RSA algorithm. International Journal of research in computer and communication technology, IJRCCT, ISSN, pp.2278-5841, 2012.
Saveetha, P., & Arumugam, S., “Study on Improvement in RSA Algorithm and its Implementation”, International Journal of Computer & Communication Technology, Vol. 3(6), pp.78, 2012.
Goshwe, N. Y., “Data encryption and decryption using RSA algorithm in a network environment”, International Journal of Computer Science and Network Security (IJCSNS), Vol. 13(7), pp.9, 2013.
Kota, C. M., & Aissi, C., Implementation of the RSA algorithm and its cryptanalysis. In 2002 GSW.
Rahman, M. M., Saha, T. K., & Bhuiyan, M. A. A., “Implementation of RSA algorithm for speech data encryption and decryption”, IJCSNS International Journal of Computer Science and Network Security, Vol. 12(3), pp.74-82, 2012.
Devi, A., Sharma, A., & Rangra, A., “A review on DES, AES and blowfish for image encryption & decryption”, International Journal of Computer Science and Information Technologies, Vol. 6(3), pp.3034-3036, 2015.
Grabbe, J. O., The DES algorithm illustrated, 2010.
Adhie, R. P., Hutama, Y., Ahmar, A. S., & Setiawan, M. I., “Implementation cryptography data encryption standard (DES) and triple data encryption standard (3DES) method in communication system based near field communication (NFC)”, In Journal of Physics: Conference Series, Vol. 954, No. 1, p. 012009. IOP Publishing, 2018.
Taghipour, M., Moghadam, A., Moghadam, N. S. B., & Shekardasht, B., “Implementation of Software-Efficient DES Algorithm” Advances in Networks, Vol. 3(1), pp.7-22, 2015.
Saikumar, I., DES-Data Encryption Standard. International Research Journal of Engineering and Technology, Vol. 4(3), 2017.
Berent, A., Advanced Encryption Standard by Example. Document available at URL http://www. networkdls. com/Articles/AESbyExample. pdf (April 1 2007) Accessed: June 2013.
Gaj, K., & Chodowiec, P., Fast implementation and fair comparison of the final candidates for advanced encryption standard using field programmable gate arrays. In Topics in Cryptology—CT-RSA 2001: The Cryptographers’ Track at RSA Conference 2001 San Francisco, CA, USA, April 8–12, 2001 Proceedings (pp.84-99). Springer Berlin Heidelberg, 2001.
Stallings, W., Cryptography and network security principles and practices, 2006.
Yenuguvanilanka, J., & Elkeelany, O., Performance evaluation of hardware models of Advanced Encryption Standard (AES) algorithm. In IEEE SoutheastCon 2008 pp.222-225. IEEE, 2008.
Mohamed, A. A., & Madian, A. H., A Modified Rijndael Algorithm and it’s Implementation using FPGA. In 2010 17th IEEE International Conference on Electronics, Circuits and Systems pp.335-338. IEEE, 2010.
Pramstaller, N., Gurkaynak, F. K., Haene, S., Kaeslin, H., Felber, N., & Fichtner, W., Towards an AES crypto-chip resistant to differential power analysis. In Proceedings of the 30th European Solid-State Circuits Conference pp.307-310. IEEE, 2004.
Jain, R., Jejurkar, R., Chopade, S., Vaidya, S., & Sanap, M., AES algorithm using 512 bit key implementation for secure communication. Int. J. Innov. Res. Comput. Commun. Eng, Vol. 2(3), pp.3516-3522, 2014.
Selmane, N., Guilley, S., & Danger, J. L., Practical setup time violation attacks on AES. In 2008 Seventh European Dependable Computing Conference pp.91-96. IEEE, 2008.
Benvenuto, C. J., Galois field in cryptography. University of Washington, Vol. 1(1), pp.1-11, 2012.
Lee, H., Lee, K., & Shin, Y., Aes implementation and performance evaluation on 8-bit microcontrollers. arXiv preprint arXiv:0911.0482, 2009.
Padate, R., & Patel, A., Encryption and decryption of text using AES algorithm. International Journal of Emerging Technology and Advanced Engineering, Vol.4(5), pp.54-9, 2014.
Wright, C. P., Dave, J., & Zadok, E., Cryptographic file systems performance: What you don't know can hurt you. In Second IEEE International Security in Storage Workshop pp.47-47. IEEE, 2003.
Kretzschmar, U., Aes128–ac implementation for encryption and decryption. TI-White Paper, 2009.
Deshpande, A. M., Deshpande, M. S., & Kayatanavar, D. N., FPGA implementation of AES encryption and decryption. In 2009 international conference on control, automation, communication and energy conservation pp.1-6. IEEE, 2009.
Pletka, R., & Cachin, C., Cryptographic security for a high-performance distributed file system. In 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007) pp.227-232. IEEE, 2007.
Ors, S. B., Gurkaynak, F., Oswald, E., & Preneel, B., Power-analysis attack on an ASIC AES implementation. In International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. Vol. 2, pp.546-552. IEEE, 2004.
Han, S. J., Oh, H. S., & Park, J., The improved data encryption standard (DES) algorithm. In Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Techniques and Applications Vol. 3, pp.1310-1314. IEEE, 1996.
Zhou, X., & Tang, X., Research and implementation of RSA algorithm for encryption and decryption. In Proceedings of 2011 6th international forum on strategic technology Vol. 2, pp.1118-1121. IEEE, 2011.
Zhou, X., & Tang, X., Research and implementation of RSA algorithm for encryption and decryption. In Proceedings of 2011 6th international forum on strategic technology Vol. 2, pp.1118-1121. IEEE, 2011.
Karthigaikumar, P., & Rasheed, S., Simulation of image encryption using AES algorithm. IJCA special issue on “computational science-new dimensions & perspectives” NCCSE, pp.166-172, 2011.
Priyadarshini, S. B. B., Rath, S., Patel, S. M., Udgata, A., Mohanta, A., Ali, S. R., & Sahu, P. (2023). A Hybrid Random Image Generation Strategy (Hr-Igs) For Securing Plain Text Data In Networks. Journal of Theoretical and Applied Information Technology, 101(6).
Dumbere, D. M., & Janwe, N. J., Video encryption using AES algorithm. In Second International Conference on Current Trends in Engineering and Technology-ICCTET 2014 pp. 332-337, IEEE, 2014.
Heron, S., Advanced encryption standard (AES). Network Security, 2009(12), pp.8-12, 2009.
Radhadevi, P., & Kalpana, P. (2012). Secure image encryption using AES. International Journal of Research in Engineering and Technology, Vol.1(2), pp.115-117, 2012.
Abdullah, A. M., Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptography and Network Security, 16, pp.1-11, 2017.
Zeghid, M., Machhout, M., Khriji, L., Baganne, A., & Tourki, R. (2007). A modified AES based algorithm for image encryption. International Journal of Computer and Information Engineering, Vol. 1(3), pp.745-750, 2007.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.