An Improved Random Bit-Stuffing Technique With a Modified Rsa Algorithm for Resisting Attacks in Information Security (rbmrsa)
No Thumbnail Available
Date
2022
Journal Title
Journal ISSN
Volume Title
Publisher
Cairo Univ, Fac Computers & information
Open Access Color
GOLD
Green Open Access
Yes
OpenAIRE Downloads
OpenAIRE Views
Publicly Funded
No
Abstract
The recent innovations in network application and the internet have made data and network security the major role in data communication system development. Cryptography is one of the outstanding and powerful tools for ensuring data and network security. In cryptography, randomization of encrypted data increases the security level as well as the Computational Complexity of cryptographic algorithms involved. This research study provides encryption algorithms that bring confidentiality and integrity based on two algorithms. The encryption algorithms include a well-known RSA algorithm (1024 key length) with an enhanced bit insertion algorithm to enhance the security of RSA against different attacks. The security classical RSA has depreciated irrespective of the size of the key length due to the development in computing technology and hacking system. Due to these lapses, we have tried to improve on the contribution of the paper by enhancing the security of RSA against different attacks and also increasing diffusion degree without increasing the key length. The security analysis of the study was compared with classical RSA of 1024 key length using mathematical evaluation proofs, the experimental results generated were compared with classical RSA of 1024 key length using avalanche effect in (%) and computational complexity as performance evaluation metrics. The results show that RBMRSA is better than classical RSA in terms of security but at the cost of execution time. (C) 2022 THE AUTHORS. Published by Elsevier B.V. on behalf of Faculty of Computers and Information, Cairo University.
Description
Misra, Sanjay/0000-0002-3556-9331
ORCID
Keywords
Computational complexity, Exhaustive search attack, Randomization, Bit insertion, Avalanche effect, computational complexity, exhaustive search attack, Randomization, QA75.5-76.95, randomization, Computational complexity, Bit insertion, Electronic computers. Computer science, Avalanche effect, bit insertion, avalanche effect, Exhaustive search attack, VDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
Turkish CoHE Thesis Center URL
Fields of Science
02 engineering and technology, 0202 electrical engineering, electronic engineering, information engineering
Citation
WoS Q
Q2
Scopus Q
Q1

OpenCitations Citation Count
16
Source
Egyptian Informatics Journal
Volume
23
Issue
2
Start Page
291
End Page
301
PlumX Metrics
Citations
CrossRef : 19
Scopus : 30
Captures
Mendeley Readers : 35
SCOPUS™ Citations
30
checked on Jan 30, 2026
Web of Science™ Citations
9
checked on Jan 30, 2026
Google Scholar™


