Hybrid Cryptosystem Using Polybius and Elgamal Algorithm Over the Gaussian Integers
DOI:
https://doi.org/10.24237/ASJ.02.01.707BKeywords:
Polybius, Elgamal Algorithm, Gaussian integerAbstract
In composition theory, computer security, and engineering are all closely related fields under which cryptography, a technology that deals with data security, falls. However, the complexity of cryptographic systems must be increased due to the attackers' use of powerful computers. El Gamal encryption and the Polybius square were bypassed in this study's attempt to increase data security. As this hybridization was done in a Gaussian environment. The ciphertext produced by the Polybius box aims to strengthen the hybrid cipher. The simulation results show that the proposed technique creates a unique ciphertext that is immune from brute force or repeated attacks since it does not resemble any pattern of plaintext.
References
S. Dey, J. Nath, and A. Nath, An Integrated Symmetric Key Cryptographic Method – Amalgamation of TTJSA Algorithm, Advanced Caesar Cipher Algorithm, Bit Rotation, and Reversal method: SJA Algorithm, Int. J. Mod. Educ. Comput. Sci., vol. 4, no. 5, pp. 1–9, 2012. https://doi.org/10.5815/ijmecs.2012.05.01
W. Stallings, Cryptography and Network Security Principles and Practices. Prentice Hall, 2015.
M. S. Hossain Biswas et al., A systematic study on a classical cryptographic cipher to design the smallest cipher, Int. J. Sci. Res. Publ., vol. 9, no. 12, pp. 507–11, 2019.
Have I. Hussein & Wafaa M. Abdullah (2021) An efficient ElGamal cryptosystem scheme, International Journal of Computers and Applications, 43:10, 1088-1094, DOI: 10.1080/1206212X.2019.1678799
Rajitha Ranasinghe & Pabasara Athukorala (2021) A generalization of the ElGamal public-key cryptosystem, Journal of Discrete Mathematical Sciences and Cryptography, DOI: 10.1080/09720529.2020.1857902
Dissanayake, W. D. M. G. M. (2018). An Improvement of the Basic El-Gamal Public Key Cryptosystem. International Journal of Computer Applications Technology and Research, 7(02), 40-44.
Irawadi, S. (2020, October). Discrete Logarithmic Improvement for ElGamal Cryptosystem Using Matrix Concepts. In 2020 8th International Conference on Cyber and IT Service Management (CITSM) (pp. 1-5). IEEE.
Stillwell, J. (2003). The Gaussian integers. In: Elements of Number Theory. Undergraduate Texts in Mathematics. Springer, New York, NY. https://doi.org/10.1007/978-0-387-21735-2_6
Koval, A. (2016). Algorithm for Gaussian Integer Exponentiation. In: Latifi, S. (eds) Information Technology: New Generations. Advances in Intelligent Systems and Computing, vol 448. Springer, Cham. https://doi.org/10.1007/978-3-319-32467-8_93
Naganuma, K., Suzuki, T., Tsuji, H., & Kimura, T. (2020). Study of Safe Elliptic Curve Cryptography over Gaussian Integer. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 103(12), 1624-1628.
Zahhafi, L., Khadir, O. (2021). A Secure Variant of the Fiat and Shamir Authentication Protocol Using Gaussian Integers. In: Melliani, S., Castillo, O. (eds) Recent Advances in Intuitionistic Fuzzy Logic Systems and Mathematics. Studies in Fuzziness and Soft Computing, vol 395. Springer, Cham. https://doi.org/10.1007/978-3-030-53929-0_14
D. Salomon, “Data Privacy and Security: Encryption and Information Hiding,” Springer, (2003).
C. Christensen, “Review of Secret History: The Story of Cryptology by Craig P. Bauer,” Cryptologia, vol. 38 no. 2, (2014), pp. 192-193.
D. Salomon, “Elements of Cryptography,” Foundations of Computer Security. Springer London, (2006), pp. 263-284.
D. Salomon, “Coding for data and computer communications,” Springer, (2006).
Chandan Kumar, Sandip Dutta, Soubik Chakraborthy, A Hybrid Polybius-Playfair Music Cipher, International Journal of Multimedia and Ubiquitous Engineering,2015.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 CC BY 4.0
This work is licensed under a Creative Commons Attribution 4.0 International License.