Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem

Main Article Content

Saja Mohammed Suhael
Zaynab Anwer Ahmed
https://orcid.org/0000-0001-6768-2104
Abir Jaafer Hussain

Abstract

Cipher security is becoming an important step when transmitting important information through networks. The algorithms of cryptography play major roles in providing security and avoiding hacker attacks. In this work two hybrid cryptosystems have been proposed, that combine a modification of the symmetric cryptosystem Playfair cipher called the modified Playfair cipher and two modifications of the asymmetric cryptosystem RSA called the square of RSA technique and the square RSA with Chinese remainder theorem technique. The proposed hybrid cryptosystems have two layers of encryption and decryption. In the first layer the plaintext is encrypted using modified Playfair to get the cipher text, this cipher text will be encrypted using squared RSA to get the final cipher text. This algorithm achieved higher security to data but suffers from a long computational time. So Chinese remainder theorem has been used in the second hybrid cryptosystem to obtain less encryption and decryption time. The simulation results indicated that using the modified Playfair with the proposed square RSA has improved security. Moreover, using the Chinese remainder theorem achieved less encryption and decryption time in comparison to our first proposed and the standard algorithms.

Article Details

How to Cite
1.
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem. Baghdad Sci.J [Internet]. 2024 Jan. 1 [cited 2025 Jan. 23];21(1):0151. Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/8361
Section
article

How to Cite

1.
Proposed Hybrid Cryptosystems Based on Modifications of Playfair Cipher and RSA Cryptosystem. Baghdad Sci.J [Internet]. 2024 Jan. 1 [cited 2025 Jan. 23];21(1):0151. Available from: https://bsj.uobaghdad.edu.iq/index.php/BSJ/article/view/8361

References

Din M, Pal SK, Muttoo SK, Madan S. A Hybrid Computational Intelligence-based Technique for Automatic Cryptanalysis of Playfair Ciphers. Def Sci J. 2020; 70(6): 612–618. http://dx.doi.org/10.14429/DSJ.70.15749

Somsuk K. A new methodology to find private key of RSA based on euler totient function. Baghdad Sci J. 2021; 18(2): 338–348. http://dx.doi.org/10.21123/bsj.2021.18.2.0338

Khudhair ZN, Nidhal A, El Abbadii NK. Text Multilevel Encryption Using New Key Exchange Protocol. Baghdad Sci J. 2022; 19(3): 619–630. http://dx.doi.org/10.21123/bsj.2022.19.3.0619

Ibraheem NA, Hasan MM. Combining several substitution cipher algorithms using circular queue data structure. Baghdad Sci J. 2020;17(4): 1320–1327. http://dx.doi.org/10.21123/bsj.2020.17.4.1320

Amalia Budiman MA, Sitepu R. File text security using Hybrid Cryptosystem with Playfair Cipher Algorithm and Knapsack Naccache-Stern Algorithm. J Phys. 2018; 978(1): 1–8. http://dx.doi.org/10.1088/1742-6596/978/1/012114

Sohail A, Wasiq K, Abir H. Phishing Attacks and Websites Classification Using Machine Learning and Multiple Datasets (A Comparative Analysis), Int Conf Comput. Springer. 2020; 12465: 301–313. http://dx.doi.org/10.1007/978-3-030-60796-8_26

Salih RK, Yousif MS. Hybrid encryption using playfair and RSA cryptosystems. Int J Nonlinear Anal Appl. 2021; 12(2): 2345–2350. http://dx.doi.org/10.22075/IJNAA.2021.5379

Hemanth PN, Abhinay Raja N, Yadav N. Secure message transfer using RSA algorithm and improved playfair cipher in cloud computing. 2nd Int Conf Converg Technol. (I2CT). IEEE. 2017; 931–936. http://dx.doi.org/10.1109/I2CT.2017.8226265

Chauhan SS, Singh H, Gurjar RN. Secure Key Exchange using RSA in Extended Playfair Cipher Technique. Int J Comput Appl. 2014; 104(15): 13–19. http://dx.doi.org/10.5120/18277-9180

Samir R, Abdulkader H, Hussein R. Improved RSA security using Chinese Remainder Theorem and Multiple Keys. Futur Comput Informatics J. 2019; 4(1): 1–9. http://dx.doi.org/10.54623/fue.fcij.4.1.1

Mathur SK, Srivastava S. Extended 16x16 Play-Fair Algorithm for Secure Key Exchange Using RSA Algorithm. Int J Futur Revolut Comput Sci Commun Eng. 2018; 4(2): 496–502. http://www.ijsir.in/images/pdf/paper9/paper12.pdf

Balaraman D, Veerasamy M, Balaji V. An Efficient Cryptosystem Using Playfair Cipher Together With Graph Labeling Techniques. J Phys. 2021; 1964(2): 1–15. http://dx.doi.org/10.1088/1742-6596/1964/2/022016

Sumarsono, Anshari M, Mujahidah A. Expending technique cryptography for plaintext messages by modifying playfair cipher algorithm with matrix 5 x 19. Int Conf Electr Eng Comput Sci. (ICECOS). IEEE. 2019: 10–13. http://dx.doi.org/10.1109/icecos47637.2019.8984560

Villafuerte RS, Sison AM, Medina RP. I3D-Playfair: An Improved 3D Playfair Cipher Algorithm. IEEE Eurasia Conf IOT, Commun Eng. IEEE. 2019; 538–541. http://dx.doi.org/10.1109/ECICE47484.2019.8942655

Challa RK, Gunta VK. A modified symmetric key fully homomorphic encryption scheme based on Read-Muller Code. Baghdad Sci J. 2021; 18(2): 899–906. http://dx.doi.org/10.21123/bsj.2021.18.2(Suppl.).0899

Yakub S, Gbolagade K. An improved rsa cryptosystem based on thread and crt. e-Academia . 2017; 6(2): 70–79. https://www.researchgate.net/publication/328430355

Zakariyau YB, Jibril LM, Usman AM, Garba A. Combined model of 9x9 Playfair and RSA for securing confidential information. J Comput Sci Appl. An Int J Niger Comput Soc. 2015; 22(12): 48–53. https://www.researchgate.net/publication/305766008

Iqbal Z, Gola KK, Gupta B, and Kandpal M. Dual level security for key exchange using modified RSA public key encryption in playfair technique. Int J Comput Appl. 2015; 111(13): 5–9. http://dx.doi.org/10.5120/19596-1408

Somsuk K. The new integer factorization algorithm based on Fermat’s Factorization Algorithm and Euler’s theorem. Int J Electr Comput Eng. 2020; 10(2): 1469–1476. http://dx.doi.org/10.11591/ijece.v10i2.pp1469-1476

Douglas RS, Maura BP. Cryptography Theory and Practice. fourth edi. Boca Raton: CRC Press, Taylor & Francis Group; 2018: 1–580. https://www.ic.unicamp.br/~rdahab/cursos/mo421-mc889/Welcome_files/Stinson-Paterson_CryptographyTheoryAndPractice-CRC%20Press%20%282019%29.pdf