Cybersecurity Enhancement through Hybrid Encryption: Combining RSA and Vigenère Algorithms in the Cypher-X System
Main Article Content
Abstract
In the contemporary digital landscape, the imperative issue of data security continues to be a prominent concern. Numerous encryption systems have faced challenges stemming from their intricate nature and susceptibility to cyber threats. This study introduces Cypher-X, an advanced encryption and decryption system that adeptly integrates classical algorithms, namely RSA and Vigenère, to fortify data confidentiality. This research endeavors to address prevailing concerns by focusing on three primary objectives: augmenting data security measures, evaluating system efficiency, and identifying vulnerabilities exploited by cyber adversaries. The outcomes of our investigation affirm the robust encryption capabilities of Cypher-X, underscoring its potential for further enhancement through the incorporation of multi-factor authentication and access control mechanisms. In the realm of data security, Cypher-X emerges as a beacon of hope, offering a promising solution to safeguard sensitive information in the digital sphere. It is essential to acknowledge the ongoing necessity for elucidating our research question, methodology, key findings, and practical implications as we navigate the complex landscape of data protection.
Received 28/12/2023
Revised 19/04/2024
Accepted 21/04/2024
Published 25/05/2024
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
Abdullah SA, Al Ashoor AA. Ipv6 security issues: A systematic review following prisma guidelines. Baghdad Sci J . 2022 Dec 5; 19(6 (Suppl.)): 1430-. https://doi.org/10.21123/bsj.2022.7312
Kumar L, Badal N. A review on hybrid encryption in cloud computing. In2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU) 2019 Apr 18 (pp. 1-6). IEEE. https://doi.org/10.1109/IoT-SIU.2019.8777503
AlHamdani W, Sadiq AT, Yasser YA. Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm. Baghdad Sci J. 2023; 20(2) :567-574. https://doi.org/10.21123/bsj.2022.6930
Singh P, Kumar S. Study & analysis of cryptography algorithms: RSA, AES, DES, T-DES, blowfish. Int J Eng Technol. 2017 Dec; 7(1.5): 221. https://doi.org/10.21123/bsj.2022.6930
Sood R, Kaur H. A literature review on rsa, des and aes encryption algorithms. Emerging Trends in Engineering and Management (ETEM). 2023 Feb: 57-63. https://doi.org/10.56155/978-81-955020-3-5-07
Dişkaya O, Avaroğlu E, Menken H, Emsal A. A New Encryption Algorithm Based on Fibonacci Polynomials and Matrices. Trait Signal. 2022 Oct 1; 39(5): 1453. https://doi.org/10.18280/ts.390501
Jintcharadze E, Iavich M. Hybrid implementation of Twofish, AES, ElGamal and RSA cryptosystems. In2020 IEEE East-West Design & Test Symposium (EWDTS) 2020 Sep 4 (pp. 1-5). IEEE. https://doi.org/10.1109/EWDTS50664.2020.9224901
Bevers J. The Study of Symmetric and Asymmetric Key Encryptions (Doctoral dissertation, University Honors College, Middle Tennessee State University). https://doi.org/10.18280/ts.390501
Verma R, Sharma A. Cryptography: A Comparative Analysis of AES and RSA Algorithms. Mukt Shabd Journal, ISSN. 2020; (2347-3150): 4705-16.
Loe A, Medley L, O’Connell C, Quaglia EA. Applications of timed-release encryption with implicit authentication. InInternational Conference on Cryptology in Africa 2023 Jul 13 (pp. 490-515). Cham: Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-37679-5_21
Zhang S, Xie X, Xu Y. A brute-force black-box method to attack machine learning-based systems in cybersecurity. IEEE Access. 2020 Jul 10;8: 128250-63. https://doi.org/10.1109/ACCESS.2020.3008433
AlSideiri A, Alsharida RA, Hammood M, Shakir M, Cob ZB, Al Shamsi IR, et al. Users Acceptance Online Attendance Application Using Barcode Scanner: The Case Study in al Buraimi University College (BUC) Students. In2022 ASU International Conference in Emerging Technologies for Sustainability and Intelligent Systems (ICETSIS) 2022 Jun 22 (pp. 23-28). IEEE. https://doi.org/10.1109/ICETSIS55481.2022.9888852
Khorikov V. Unit Testing Principles, Practices, and Patterns. Simon and Schuster; 2020 Jan 6.
Sandhya G, Sharma DK. Software Implementation of Plantlet Stream Cipher Using Verilog Hardware Description Language. InVLSI, Microwave and Wireless Technologies: Select Proceedings of ICVMWT 2021 2022 Sep 4 (pp. 107-118). Singapore: Springer Nature Singapore. https://doi.org/10.1007/978-981-19-0312-0_12
Hamza A, Kumar B. A review paper on DES, AES, RSA encryption standards. In2020 9th International Conference System Modeling and Advancement in Research Trends (SMART) 2020 Dec 4 (pp. 333-338). IEEE. https://doi.org/10.1109/SMART50582.2020.9336800
Sarkar A, Chatterjee SR, Chakraborty M. Role of cryptography in network security. The" essence" of network security: an end-to-end panorama. 2021: 103-43. https://doi.org/10.1007/978-981-15-9317-8_5
Khan I, Al Sadiri A, Ahmad AR, Jabeur N. Tracking student performance in introductory programming by means of machine learning. In2019 4th mec international conference on big data and smart city (icbdsc) 2019 Jan 15 (pp. 1-6). IEEE. https://doi.org/10.1109/ICBDSC.2019.8645608
AlSideiri A, Tawafak RM, AlFarsi G, Khudayer BH, Cob ZC. Development of Online Clearance System Using Web-Based System. In2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT) 2023 Feb 22 (pp. 1-6). IEEE. https://doi.org/10.1109/ICECCT56650.2023.10179667
Merkepci M, Abobala M, Allouf A. The Applications of Fusion Neutrosophic Number Theory in Public Key Cryptography and the Improvement of RSA Algorithm. Fusion: Practice and Application. 2023; 10(2): 69-74.
Erondu UI, Asani EO, Arowolo MO, Tyagi AK, Adebayo N. An encryption and decryption model for data security using vigenere with advanced encryption standard. InUsing Multimedia Systems, Tools, and Technologies for Smart Healthcare Services 2023 (pp. 141-159). IGI Global. https://doi.org/10.4018/978-1-6684-5741-2.ch009
Ugbedeojo M, Adebiyi MO, Aroba OJ, Adebiyi AA. RSA and Elliptic Curve Encryption System: A Systematic Literature Review. Int J Inf Secur Priv. 2024 Jan 1; 18(1): 1-27. https://doi.org/10.4018/IJISP.340728
Karmakar T, Biswas S, Das I, Nath S. Varibox encryption algorithm: The new generation of hybrid security measure for the era of quantum computation. J Discrete Math Sci Cryptogr. 2022 Feb 25: 1-27. https://doi.org/10.1080/09720529.2021.1968573
Challa R, Gunta V. A modified symmetric key fully homomorphic encryption scheme based on Read-Muller Code. Baghdad Sci J. 2021 Jun 20; 18(2 (Suppl.)): 0899. https://doi.org/10.21123/bsj.2021.18.2(Suppl.).0899