Study of Multi-Level Cryptography Algorithm: Multi-Prime RSA and DES

Full Text (PDF, 930KB), PP.22-29

Views: 0 Downloads: 0

Author(s)

Surinder Kaur 1,* Pooja Bharadwaj 1 Shivani Mankotia 1

1. Bharati Vidyapeeth‟s College of Engineering, Department of Information Technology, Delhi, 110063, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2017.09.03

Received: 28 Apr. 2017 / Revised: 12 May 2017 / Accepted: 5 Jul. 2017 / Published: 8 Sep. 2017

Index Terms

RSA algorithm, DES, encryption, decryption, n-prime RSA, Data Encryption Standard, Multi-level encryption

Abstract

The purpose of this study is to implement and observe parameters like time and memory for implementation of multi-level encryption using the Data Encryption Standard (DES) and a modified version of the RSA Algorithm, the multi-prime RSA. The average values are calculated for each parameter after using a different number of primes and the results have been illustrated graphically and in tabular form for clarity of conclusions. The advantages and reasoning for using this approach have also been listed in the study.

Cite This Paper

Surinder Kaur, Pooja Bharadwaj, Shivani Mankotia,"Study of Multi-Level Cryptography Algorithm: Multi-Prime RSA and DES", International Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.9, pp.22-29, 2017.DOI: 10.5815/ijcnis.2017.09.03

Reference

[1] H E. Milanov, "The RSA algorithm," June 2009, 2009.

[2] H. M. Bahig, A. Bhery, and D. I. Nassr. Cryptanalysis of multi-prime RSA with small prime difference. In Information and Communications Security, pages 33–44. Springer, 2012.

[3] Alani, M.M.," A DES96 - improved DES security ", 7th International Multi-Conference on Systems, Signals and Devices, Amman, 27-30 June 2010

[4] Chourasia S., Singh K.N. (2016) An Efficient Hybrid Encryption Technique Based on DES and RSA for Textual Data. In: Satapathy S., Mandal J., Udgata S., Bhateja V. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 433. Springer, New Delhi.

[5] Wuling Ren; Zhiqian Miao, “A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication,” Modeling, Simulation and Visualization Methods (WMSVM), Second International Conference on, vol., no., pp. 221, 225, 15–16 May 2010.

[6] Coppersmith, D. "The Data Encryption Standard (DES) and Its Strength Against Attacks." IBM Journal of Research and Development, May 1994, pp. 243 -250.

[7] Atul Kahate, “Cryptography and Network Security, 2nd Ed,” Tata McGraw hill, 2009, PP. 87-2004.

[8] Chourasia S., Singh K.N. (2016) An Efficient Hybrid Encryption Technique Based on DES and RSA for Textual Data. In: Satapathy S., Mandal J., Udgata S., Bhateja V. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 433. Springer, New Delhi.

[9] A. A. A. Gutub and F. A. A. Khan, "Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems," 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), Kuala Lumpur, 2012, pp. 116-121.

[10] Kuppuswamy, Prakash, Khalidi, Saeed Q.Y., “Hybrid encryption/decryption technique using new public key and symmetric key algorithm”, International Journal of Information and Computer Security pg.372-382, 2014/01/01.

[11] Amanjot Kaur, Manisha Bhardwaj, “Hybrid Encryption for Cloud Database Security”, [IJESAT] International Journal of Engineering Science & Advanced Technology, Volume-2, Issue-3, 737 – 741, ISSN: 2250–3676.

[12] W. Ren and Z. Miao, "A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication," 2010 Second International Conference on Modeling, Simulation and Visualization Methods, Sanya, 2010, pp. 221-225.

[13] Rivest, R. L., Shamir, A., Adelmann, L.: “A method for obtaining digital signature and public –key cryptosystems”, Commun. ACM, 1978, VOL. 21, pp. 120-126.

[14] Penchalaiah, N. and Seshadri, R. “Effective Comparison and Evaluation of DES and Rijndael Algorithm (AES)”, International Journal of Computer Science and Engineering, Vol. 02, No. 05, 2010, 1641-1645.

[15] Stallings, William; “Cryptography and Network Security Principles and Practices”; Fourth Edition; Pearson Education; Prentice Hall; 2009.