CERS Algorithm: An Enhanced Security System Using Hybrid Cryptosystem
DOI:
https://doi.org/10.65141/ject.v1i2.n7Keywords:
Chaos-based system, El Gamal cryptosystem, RSA algorithm, Schnorr digital signature, Hybrid CryptosystemAbstract
Communication and information exchange through the internet have a significant risk of information leakage owing to security issues. In this paper, a new hybrid cryptosystem design is proposed in order to accomplish high-security communication. The Schnorr authentication algorithm is used in this research to ensure a high degree of data security and authentication by integrating RSA, El Gamal, and Chaos-based cryptosystems. The process begins with El Gamal's key generation scheme. El Gamal is well-known for its ability to compute complex discrete logarithms, and when paired with RSA, its abilities are dependent on the difficult process of factorization of large prime integers. Multiple key schemes were generated using the chaotic system. Finally, the Schnorr was utilized to verify the original sender of the message.
References
Al-Shabi, M. A. (2019). A survey on symmetric and asymmetric cryptography algorithms in information security. International Journal of Scientific and Research Publications (IJSRP), 9(3), 8779. https://doi.org/10.29322/ijsrp.9.03.2019.p8779
Alegro, J. K. P., Arboleda, E. R., Pereña, M. R., & Dellosa, R. M. (2019). Hybrid Schnorr, RSA, and AES cryptosystem. International Journal of Scientific and Technology Research, 8(10), 1770–1776. https://www.ijstr.org/final-print/oct2019/Hybrid-Schnorr-Rsa-And-Aes-Cryptosystem-.pdf
Arboleda, E. R. (2019). Secure and fast chaotic El Gamal cryptosystem. International Journal of Engineering and Advance Technology (IJEAT), 8(5), 1693–1699. https://www.ijeat.org/wp-content/uploads/papers/v8i5/E7532068519.pdf
Bansal, V. P., & Singh, S. (2016). A hybrid data encryption technique using RSA and Blowfish for cloud computing on FPGAs. In 2015 2nd International Conference on Recent Advances in Engineering and Computational Sciences (RAECS 2015) (pp. 1–5). https://doi.org/10.1109/RAECS.2015.7453367
Chinnasamy, P., Padmavathi, S., Swathy, R., & Rakesh, S. (2021). Efficient data security using hybrid cryptography on cloud computing. In Lecture Notes in Networks and Systems (Vol. 145, pp. 537–547). Springer. https://doi.org/10.1007/978-981-15-7345-3_46
Enriquez, M., Garcia, D. W., & Arboleda, E. R. (2017). Enhanced hybrid algorithm of secure and fast chaos-based AES, RSA, and ElGamal cryptosystems. Indian Journal of Science and Technology, 10(27), 1–14. https://doi.org/10.17485/ijst/2017/v10i27/105001
Espalmado, J. M. B., & Arboleda, E. R. (2017). DARE algorithm: A new security protocol by integration of different cryptographic techniques. International Journal of Electrical and Computer Engineering, 7(2), 1032–1041.
Kocarev, L. (2013). Cryptography. IEEE Transactions on Circuits and Systems, 60(1), 5–21. https://doi.org/10.1109/7384.963463
Kumari, P., Kumar, U., & Singh, S. K. (2019). Schnorr digital signature to improve security using quantum cryptography. Springer Singapore. https://doi.org/10.1007/978-981-13-3185-5
Magsino, J. P., Arboleda, E. R., & Corpuz, R. R. (2019). Enhancing security of El Gamal encryption scheme using RSA and chaos algorithm for e-commerce application. International Journal of Scientific and Technology Research, 8(11). https://www.ijstr.org/final-print/nov2019/Enhancing-Security-Of-El-Gamal-Encryption-Scheme-Using-Rsa-And-Chaos-Algorithm-For-E-commerce-Application.pdf
Maxwell, G., Poelstra, A., Seurin, Y., & Wuille, P. (2019). Simple Schnorr multi-signatures with applications to Bitcoin. Designs, Codes and Cryptography, 87(9), 2139–2164. https://doi.org/10.1007/s10623-019-00608-x
Mo, F., Hsu, Y. C., Chang, H. H., Pan, S. C., Yan, J. J., & Liao, T. L. (2017). Design of an improved RSA cryptosystem based on synchronization of discrete chaotic systems. In Proceedings of the 2016 International Conference on Information System and Artificial Intelligence (ISAI 2016) (pp. 9–13). https://doi.org/10.1109/ISAI.2016.0012
Padmavathi, B., & Kumari, S. (2017). A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique. Semantic Scholar. https://www.semanticscholar.org/paper/A-Survey-on-Performance-Analysis-of-DES-%2C-AES-and-Padmavathi-Kumari/a9de08631272bec3ef1082fc5f4f532a55d131ce
Rivera, L. B., Bay, J. A., Arboleda, E. R., Pereña, M. R., & Dellosa, R. M. (2019). Hybrid Cryptosystem Using RSA, DSA, Elgamal, And AES. International Journal of Scientific & Technology Research, 8(10), 1777–1781. https://www.researchgate.net/publication/336818536_Hybrid_Cryptosystem_Using_RSA_DSA_Elgamal_And_AES
Singh, G., & Supriya, S. (2013). A study of encryption algorithms (RSA, DES, 3DES, and AES) for information security. International Journal of Computer Applications, 67(19), 33–38. https://doi.org/10.5120/11507-7224
Ukwuoma, H., Studies, S., & Hammawa, M. (2015). Optimized key generation for RSA encryption. Innovative Systems Design and Engineering, 6(11), 35–45.
Vekariya, M. (2015). Comparative analysis of cryptographic algorithms and advanced cryptographic algorithms. International Journal of Computer Engineering and Sciences, 1(1), 1.




