An Improved Random Bit-Stuffing Technique With a Modified Rsa Algorithm for Resisting Attacks in Information Security (rbmrsa)

No Thumbnail Available

Date

2022

Journal Title

Journal ISSN

Volume Title

Publisher

Cairo Univ, Fac Computers & information

Open Access Color

GOLD

Green Open Access

Yes

OpenAIRE Downloads

OpenAIRE Views

Publicly Funded

No
Impulse
Top 10%
Influence
Top 10%
Popularity
Top 10%

Research Projects

Journal Issue

Abstract

The recent innovations in network application and the internet have made data and network security the major role in data communication system development. Cryptography is one of the outstanding and powerful tools for ensuring data and network security. In cryptography, randomization of encrypted data increases the security level as well as the Computational Complexity of cryptographic algorithms involved. This research study provides encryption algorithms that bring confidentiality and integrity based on two algorithms. The encryption algorithms include a well-known RSA algorithm (1024 key length) with an enhanced bit insertion algorithm to enhance the security of RSA against different attacks. The security classical RSA has depreciated irrespective of the size of the key length due to the development in computing technology and hacking system. Due to these lapses, we have tried to improve on the contribution of the paper by enhancing the security of RSA against different attacks and also increasing diffusion degree without increasing the key length. The security analysis of the study was compared with classical RSA of 1024 key length using mathematical evaluation proofs, the experimental results generated were compared with classical RSA of 1024 key length using avalanche effect in (%) and computational complexity as performance evaluation metrics. The results show that RBMRSA is better than classical RSA in terms of security but at the cost of execution time. (C) 2022 THE AUTHORS. Published by Elsevier B.V. on behalf of Faculty of Computers and Information, Cairo University.

Description

Misra, Sanjay/0000-0002-3556-9331

Keywords

Computational complexity, Exhaustive search attack, Randomization, Bit insertion, Avalanche effect, computational complexity, exhaustive search attack, Randomization, QA75.5-76.95, randomization, Computational complexity, Bit insertion, Electronic computers. Computer science, Avalanche effect, bit insertion, avalanche effect, Exhaustive search attack, VDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550

Turkish CoHE Thesis Center URL

Fields of Science

02 engineering and technology, 0202 electrical engineering, electronic engineering, information engineering

Citation

WoS Q

Q2

Scopus Q

Q1
OpenCitations Logo
OpenCitations Citation Count
16

Source

Egyptian Informatics Journal

Volume

23

Issue

2

Start Page

291

End Page

301

Collections

PlumX Metrics
Citations

CrossRef : 19

Scopus : 30

Captures

Mendeley Readers : 35

SCOPUS™ Citations

30

checked on Jan 30, 2026

Web of Science™ Citations

9

checked on Jan 30, 2026

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
3.58996223

Sustainable Development Goals

SDG data is not available