Cybersecurity Enhancement through Hybrid Encryption: Combining RSA and Vigenère Algorithms in the Cypher-X System

Main Article Content

Abir AlSideiri
https://orcid.org/0000-0001-7566-7203
Saif AlShamsi
Hajar AlBreiki
Manal AlMoqbali
Mithaa AlMaamari
Shaima AlSaadi

Abstract

In the contemporary digital landscape, the imperative issue of data security continues to be a prominent concern. Numerous encryption systems have faced challenges stemming from their intricate nature and susceptibility to cyber threats. This study introduces Cypher-X, an advanced encryption and decryption system that adeptly integrates classical algorithms, namely RSA and Vigenère, to fortify data confidentiality. This research endeavors to address prevailing concerns by focusing on three primary objectives: augmenting data security measures, evaluating system efficiency, and identifying vulnerabilities exploited by cyber adversaries. The outcomes of our investigation affirm the robust encryption capabilities of Cypher-X, underscoring its potential for further enhancement through the incorporation of multi-factor authentication and access control mechanisms. In the realm of data security, Cypher-X emerges as a beacon of hope, offering a promising solution to safeguard sensitive information in the digital sphere. It is essential to acknowledge the ongoing necessity for elucidating our research question, methodology, key findings, and practical implications as we navigate the complex landscape of data protection.

Article Details

How to Cite
1.
Cybersecurity Enhancement through Hybrid Encryption: Combining RSA and Vigenère Algorithms in the Cypher-X System. Baghdad Sci.J [Internet]. 2024 May 25 [cited 2024 Nov. 18];21(5(SI):1765. Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/10539
Section
Special Issue - (ICCDA) International Conference on Computing and Data Analytics

How to Cite

1.
Cybersecurity Enhancement through Hybrid Encryption: Combining RSA and Vigenère Algorithms in the Cypher-X System. Baghdad Sci.J [Internet]. 2024 May 25 [cited 2024 Nov. 18];21(5(SI):1765. Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/10539

References

Abdullah SA, Al Ashoor AA. Ipv6 security issues: A systematic review following prisma guidelines. Baghdad Sci J . 2022 Dec 5; 19(6 (Suppl.)): 1430-. https://doi.org/10.21123/bsj.2022.7312

Kumar L, Badal N. A review on hybrid encryption in cloud computing. In2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU) 2019 Apr 18 (pp. 1-6). IEEE. https://doi.org/10.1109/IoT-SIU.2019.8777503

AlHamdani W, Sadiq AT, Yasser YA. Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm. Baghdad Sci J. 2023; 20(2) :567-574. https://doi.org/10.21123/bsj.2022.6930

Singh P, Kumar S. Study & analysis of cryptography algorithms: RSA, AES, DES, T-DES, blowfish. Int J Eng Technol. 2017 Dec; 7(1.5): 221. https://doi.org/10.21123/bsj.2022.6930

Sood R, Kaur H. A literature review on rsa, des and aes encryption algorithms. Emerging Trends in Engineering and Management (ETEM). 2023 Feb: 57-63. https://doi.org/10.56155/978-81-955020-3-5-07

Dişkaya O, Avaroğlu E, Menken H, Emsal A. A New Encryption Algorithm Based on Fibonacci Polynomials and Matrices. Trait Signal. 2022 Oct 1; 39(5): 1453. https://doi.org/10.18280/ts.390501

Jintcharadze E, Iavich M. Hybrid implementation of Twofish, AES, ElGamal and RSA cryptosystems. In2020 IEEE East-West Design & Test Symposium (EWDTS) 2020 Sep 4 (pp. 1-5). IEEE. https://doi.org/10.1109/EWDTS50664.2020.9224901

Bevers J. The Study of Symmetric and Asymmetric Key Encryptions (Doctoral dissertation, University Honors College, Middle Tennessee State University). https://doi.org/10.18280/ts.390501

Verma R, Sharma A. Cryptography: A Comparative Analysis of AES and RSA Algorithms. Mukt Shabd Journal, ISSN. 2020; (2347-3150): 4705-16.

Loe A, Medley L, O’Connell C, Quaglia EA. Applications of timed-release encryption with implicit authentication. InInternational Conference on Cryptology in Africa 2023 Jul 13 (pp. 490-515). Cham: Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-37679-5_21

Zhang S, Xie X, Xu Y. A brute-force black-box method to attack machine learning-based systems in cybersecurity. IEEE Access. 2020 Jul 10;8: 128250-63. https://doi.org/10.1109/ACCESS.2020.3008433

AlSideiri A, Alsharida RA, Hammood M, Shakir M, Cob ZB, Al Shamsi IR, et al. Users Acceptance Online Attendance Application Using Barcode Scanner: The Case Study in al Buraimi University College (BUC) Students. In2022 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS) 2022 Jun 22 (pp. 23-28). IEEE. https://doi.org/10.1109/ICETSIS55481.2022.9888852

Khorikov V. Unit Testing Principles, Practices, and Patterns. Simon and Schuster; 2020 Jan 6.

Sandhya G, Sharma DK. Software Implementation of Plantlet Stream Cipher Using Verilog Hardware Description Language. InVLSI, Microwave and Wireless Technologies: Select Proceedings of ICVMWT 2021 2022 Sep 4 (pp. 107-118). Singapore: Springer Nature Singapore. https://doi.org/10.1007/978-981-19-0312-0_12

Hamza A, Kumar B. A review paper on DES, AES, RSA encryption standards. In2020 9th International Conference System Modeling and Advancement in Research Trends (SMART) 2020 Dec 4 (pp. 333-338). IEEE. https://doi.org/10.1109/SMART50582.2020.9336800

Sarkar A, Chatterjee SR, Chakraborty M. Role of cryptography in network security. The" essence" of network security: an end-to-end panorama. 2021: 103-43. https://doi.org/10.1007/978-981-15-9317-8_5

Khan I, Al Sadiri A, Ahmad AR, Jabeur N. Tracking student performance in introductory programming by means of machine learning. In2019 4th mec international conference on big data and smart city (icbdsc) 2019 Jan 15 (pp. 1-6). IEEE. https://doi.org/10.1109/ICBDSC.2019.8645608

AlSideiri A, Tawafak RM, AlFarsi G, Khudayer BH, Cob ZC. Development of Online Clearance System Using Web-Based System. In2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT) 2023 Feb 22 (pp. 1-6). IEEE. https://doi.org/10.1109/ICECCT56650.2023.10179667

Merkepci M, Abobala M, Allouf A. The Applications of Fusion Neutrosophic Number Theory in Public Key Cryptography and the Improvement of RSA Algorithm. Fusion: Practice and Application. 2023; 10(2): 69-74.

Erondu UI, Asani EO, Arowolo MO, Tyagi AK, Adebayo N. An encryption and decryption model for data security using vigenere with advanced encryption standard. InUsing Multimedia Systems, Tools, and Technologies for Smart Healthcare Services 2023 (pp. 141-159). IGI Global. https://doi.org/10.4018/978-1-6684-5741-2.ch009

Ugbedeojo M, Adebiyi MO, Aroba OJ, Adebiyi AA. RSA and Elliptic Curve Encryption System: A Systematic Literature Review. Int J Inf Secur Priv. 2024 Jan 1; 18(1): 1-27. https://doi.org/10.4018/IJISP.340728

Karmakar T, Biswas S, Das I, Nath S. Varibox encryption algorithm: The new generation of hybrid security measure for the era of quantum computation. J Discrete Math Sci Cryptogr. 2022 Feb 25: 1-27. https://doi.org/10.1080/09720529.2021.1968573

Challa R, Gunta V. A modified symmetric key fully homomorphic encryption scheme based on Read-Muller Code. Baghdad Sci J. 2021 Jun 20; 18(2 (Suppl.)): 0899. https://doi.org/10.21123/bsj.2021.18.2(Suppl.).0899

Similar Articles

You may also start an advanced similarity search for this article.