Full Paper View Go Back

Hybrid of asymmetric cryptography (RSA) and symmetric cryptography (OTP)

Khean Ouk1 , Kimsoung Lim2 , Sen Samnang Ouk3

Section:Research Paper, Product Type: Journal-Paper
Vol.8 , Issue.6 , pp.22-27, Dec-2020


Online published on Dec 31, 2020


Copyright © Khean Ouk, Kimsoung Lim, Sen Samnang Ouk . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Khean Ouk, Kimsoung Lim, Sen Samnang Ouk, “Hybrid of asymmetric cryptography (RSA) and symmetric cryptography (OTP),” International Journal of Scientific Research in Computer Science and Engineering, Vol.8, Issue.6, pp.22-27, 2020.

MLA Style Citation: Khean Ouk, Kimsoung Lim, Sen Samnang Ouk "Hybrid of asymmetric cryptography (RSA) and symmetric cryptography (OTP)." International Journal of Scientific Research in Computer Science and Engineering 8.6 (2020): 22-27.

APA Style Citation: Khean Ouk, Kimsoung Lim, Sen Samnang Ouk, (2020). Hybrid of asymmetric cryptography (RSA) and symmetric cryptography (OTP). International Journal of Scientific Research in Computer Science and Engineering, 8(6), 22-27.

BibTex Style Citation:
@article{Ouk_2020,
author = {Khean Ouk, Kimsoung Lim, Sen Samnang Ouk},
title = {Hybrid of asymmetric cryptography (RSA) and symmetric cryptography (OTP)},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {12 2020},
volume = {8},
Issue = {6},
month = {12},
year = {2020},
issn = {2347-2693},
pages = {22-27},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2168},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=2168
TI - Hybrid of asymmetric cryptography (RSA) and symmetric cryptography (OTP)
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Khean Ouk, Kimsoung Lim, Sen Samnang Ouk
PY - 2020
DA - 2020/12/31
PB - IJCSE, Indore, INDIA
SP - 22-27
IS - 6
VL - 8
SN - 2347-2693
ER -

232 Views    391 Downloads    62 Downloads
  
  

Abstract :
Cryptography is a science-art that makes communication and messages more secure on the communication media, especially for state security, and business security and personal security. In the industrial revolution 4.0, security is a key to make communication more secure and the integrity and availability of data. The combination of symmetric cryptography and symmetric cryptography, symmetric cryptography and asymmetric cryptography, asymmetric cryptography and asymmetric cryptography is the main subjective to concern on security today. One of those combinations is a hybrid algorithm which is made up of asymmetric cryptography (RSA) and symmetric cryptography (OTP). It will strengthen the secureness of communication and data. This study will propose an Algorithm scheme to increase the security of cryptography. The result of the hybrid Algorithm shows steps to encrypt and decrypt the message: First of all, the sender encrypts the block of a message with the RSA public key and then generates the OTP key to encrypt this block of message again to obtain the double ciphertext from the same plaintext and then send it to the receiver. Finally, the receiver decrypts it with the OTP key and then the RSA private key. Therefore, we can say that the security of this proposed hybrid algorithm is more highly secured and guaranteed because of covering the weakness of the RSA cryptography. In conclusion, Section V describes the hybrid algorithm is highly secured and unbreakable.

Key-Words / Index Term :
Cryptography, RSA, One Time Pad, Hybrid Algorithm, Symmetric Cryptography, Asymmetric Cryptography, Double cipher text

References :
[1]. Behrouz A. Forouzan, “Data Communication and Networking”, fifth edition, pp44-46, 2013.
[2]. James F. Kurose and Keith W. Ross, “Computer Networking: A Top-Down Approach Featuring the Internet”, pp 214-215, 2000.
[3]. M G Ristiana, R Marwati and S M Gozali, “Hybrid algorithm of RSA and one time pad cryptography”, 2019.
[4]. Shyam Nandan Kumar, “ Review on Network Security and Cryptography”, International Transaction of Electrical and Computer Engineers System, 2015, Vol. 3, No. 1, 1-11, 2015.
[5]. Nitin R. Mise, and H. C. Srinivasaiah, “A Mathematical Attack Based Algorithm to Challenge the Security of RSA Cryptosystem”, International Journal of Advancements in Research & Technology, Volume 2, Issue 6, June-2013 202 ISSN 2278-7763.
[6].Muhammad Iqbal, Muhammad Akbar Syahbana Pane,Andysah Putera Utama Siahaan, “SMS EncryptionUsing One-Time Pad Cipher” , IOSR Journal of Computer Engineering (IOSR-JCE),2016.
[7].Xiaoying Ye,Chenglian Liu, Donald Gardner3, “Weakness of RSA Cryptosystem Characteristic”, International Conference of Computational Methods in Sciences and Engineering 2018 (ICCMSE 2018).
[8]. Jon Postel,"Transmission Control Protocol," RFC 793,1981.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation