An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)

dc.authoridMisra, Sanjay/0000-0002-3556-9331
dc.authorscopusid57476998100
dc.authorscopusid56962766700
dc.authorscopusid57476613900
dc.authorscopusid56811478400
dc.authorscopusid8402817900
dc.authorwosidSengul, Gokhan/G-8213-2016
dc.authorwosidMisra, Sanjay/K-2203-2014
dc.contributor.authorŞengül, Gökhan
dc.contributor.authorMisra, Sanjay
dc.contributor.authorMısra, Sanjay
dc.contributor.authorAbayomi-Alli, Olusola
dc.contributor.authorSengul, Gokhan
dc.contributor.otherComputer Engineering
dc.date.accessioned2024-07-05T15:17:49Z
dc.date.available2024-07-05T15:17:49Z
dc.date.issued2022
dc.departmentAtılım Universityen_US
dc.department-temp[Mojisola, Falowo O.; Febisola, C. Falayi] Fed Univ Agr Abeokuta, Dept Comp Sci, Abeokuta, Ogun State, Nigeria; [Misra, Sanjay] Ostfold Univ Coll, Dept Comp Sci & Commun, Halden, Norway; [Abayomi-Alli, Olusola] Kaunas Univ Technol Kaunas, Dept Software Engn, Kaunas, Lithuania; [Sengul, Gokhan] Atilim Univ, Dept Comp Engn, Ankara, Turkeyen_US
dc.descriptionMisra, Sanjay/0000-0002-3556-9331en_US
dc.description.abstractThe recent innovations in network application and the internet have made data and network security the major role in data communication system development. Cryptography is one of the outstanding and powerful tools for ensuring data and network security. In cryptography, randomization of encrypted data increases the security level as well as the Computational Complexity of cryptographic algorithms involved. This research study provides encryption algorithms that bring confidentiality and integrity based on two algorithms. The encryption algorithms include a well-known RSA algorithm (1024 key length) with an enhanced bit insertion algorithm to enhance the security of RSA against different attacks. The security classical RSA has depreciated irrespective of the size of the key length due to the development in computing technology and hacking system. Due to these lapses, we have tried to improve on the contribution of the paper by enhancing the security of RSA against different attacks and also increasing diffusion degree without increasing the key length. The security analysis of the study was compared with classical RSA of 1024 key length using mathematical evaluation proofs, the experimental results generated were compared with classical RSA of 1024 key length using avalanche effect in (%) and computational complexity as performance evaluation metrics. The results show that RBMRSA is better than classical RSA in terms of security but at the cost of execution time. (C) 2022 THE AUTHORS. Published by Elsevier B.V. on behalf of Faculty of Computers and Information, Cairo University.en_US
dc.identifier.citation5
dc.identifier.doi10.1016/j.eij.2022.02.001
dc.identifier.endpage301en_US
dc.identifier.issn1110-8665
dc.identifier.issn2090-4754
dc.identifier.issue2en_US
dc.identifier.scopus2-s2.0-85125713502
dc.identifier.scopusqualityQ1
dc.identifier.startpage291en_US
dc.identifier.urihttps://doi.org/10.1016/j.eij.2022.02.001
dc.identifier.urihttps://hdl.handle.net/20.500.14411/1798
dc.identifier.volume23en_US
dc.identifier.wosWOS:000830938400011
dc.identifier.wosqualityQ2
dc.language.isoenen_US
dc.publisherCairo Univ, Fac Computers & informationen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectComputational complexityen_US
dc.subjectExhaustive search attacken_US
dc.subjectRandomizationen_US
dc.subjectBit insertionen_US
dc.subjectAvalanche effecten_US
dc.titleAn improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)en_US
dc.typeArticleen_US
dspace.entity.typePublication
relation.isAuthorOfPublicationf291b4ce-c625-4e8e-b2b7-b8cddbac6c7b
relation.isAuthorOfPublication53e88841-fdb7-484f-9e08-efa4e6d1a090
relation.isAuthorOfPublication.latestForDiscoveryf291b4ce-c625-4e8e-b2b7-b8cddbac6c7b
relation.isOrgUnitOfPublicatione0809e2c-77a7-4f04-9cb0-4bccec9395fa
relation.isOrgUnitOfPublication.latestForDiscoverye0809e2c-77a7-4f04-9cb0-4bccec9395fa

Files

Collections