Trusted Data Transmission Using Data Scrambling Security Method with Asymmetric Key Algorithm for Synchronization
Abstract
Security is a major concern of the internet world because the development of the Internet requires the security of data transmission. The security method helps us to store valuable information and send it over an insecure network so that it can not be read by anyone except the intended recipient. Security algorithm uses data randomization method. This method of data information randomization has a low computation time with a large number of bits when compared to other encryption algorithms. In general, the encryption algorithm is used to encrypt data information, but in this research the encryption algorithm is used for synchronization between the sender and the intended recipient. Number of bits on asymmetric key algorithm for synchronization are the 64-bits, 512-bits and 1024-bits. We will prove that security methods can secure data sent with low computational time with large number of bits. In the result will be shown the value of computing time with variable number of bits sent. When data are sent by 50 bytes, encryption time required 2 ms using 1024 bits for synchronization technique asymmetric key algorithm.Â
Downloads
References
W. Stallings, Crypto. and Network Security: Principles and Practice, 5th edition, Prentice Hall, 2010.
B. Aiden A., and M. A. Forcinito. Cryptography, information theory, and error-correction: a handbook for the 21st century. Vol. 68. John Wiley & Sons, 2011.
R. L. Rivest, A. Shamir, and L. Adleman. "A method for obtaining digital signatures and public-key cryptosystems." Communications of the ACM 21.2 (1978): 120-126.
S. Gurpreet. "A study of encryption algorithms (RSA, DES, 3DES and AES) for information security." International Journal of Computer Applications 67.19 (2013).
P. Madhumita. "Performance analysis of encryption algorithms for security." Signal Processing, Communication, Power and Embedded System (SCOPES), 2016 International Conference on. IEEE, 2016.
M. B. Kumar, D. Bhattacharyya, and S. Kumar Bandyopadhyay. "Designing and performance analysis of a proposed symmetric cryptography algorithm." Communication Systems and Network Technologies (CSNT), 2013 International Conference on. IEEE, 2013.
A. Jamal Abelfatah Morad. "A Randomized Encryption Scheme." Computational Science and Computational Intelligence (CSCI), 2015 International Conference on. IEEE, 2015.W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135.
S. Souvik, and M. Sen. "Encoding algorithm using bit level encryption and decryption technique." Computer, Electrical & Communication Engineering (ICCECE), 2016 International Conference on. IEEE, 2016.
Aiswarya, P. M., et al. "Binary RSA encryption algorithm." Control, Instrumentation, Communication and Computational Technologies (ICCICCT), 2016 International Conference on. IEEE, 2016.
A. I. George, and H. M. Leena. "Enhanced RSA Algorithm with Varying Key Sizes for Data Security in Cloud." Computing and Communication Technologies (WCCCT), 2017 World Congress on. IEEE, 2017.
Karthik et al. “Hybrid Cryptographic Technique Using OTP:RSA.†International Conference On Intelligent Techniques In Control, Optimization And Signal Processing 2017 International Conference on. IEEE, 2017.
C. Punit, et al. "ACAFP: Asymmetric key based cryptographic algorithm using four prime numbers to secure message communication. A review on RSA algorithm." Industrial Automation and Electromechanical Engineering Conference (IEMECON), 2017 8th Annual. IEEE, 2017.
H. Rizky Pratama et al. "Covert Communication in MIMO-OFDM System Using Pseudo Random Location of Fake Subcarriers." EMITTER International Journal of Engineering Technology 4.1 (2016): 150-163.
C. Aumüller, P. Bier, W. Fischer, et al "Fault attacks on RSA with CRT: Concrete results and practical countermeasures." International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, 2002.
A. Berzati, C. Canovas-Dumas., L. Goubin, "A survey of differential fault analysis against classical RSA implementations." Fault Analysis in Cryptography. Springer, Berlin, Heidelberg, 2012. 111-124.
R. Bhaskar, G. Hegde, and P. R. Vaya. "An efficient hardware model for RSA Encryption system using Vedic mathematics." Procedia Engineering 30 (2012): 124-128.
J. H. Hong, and C. W. Wu. "RSA public key crypto-processor core design and hierarchical system test using IEEE 1149 family." National Tsing-Hua University, Taiwan, Doctoral dissertation (2000).
Copyright (c) 2018 EMITTER International Journal of Engineering Technology
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The copyright to this article is transferred to Politeknik Elektronika Negeri Surabaya(PENS) if and when the article is accepted for publication. The undersigned hereby transfers any and all rights in and to the paper including without limitation all copyrights to PENS. The undersigned hereby represents and warrants that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required. The undersigned represents that he/she has the power and authority to make and execute this assignment. The copyright transfer form can be downloaded here .
The corresponding author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors. This agreement is to be signed by at least one of the authors who have obtained the assent of the co-author(s) where applicable. After submission of this agreement signed by the corresponding author, changes of authorship or in the order of the authors listed will not be accepted.
Retained Rights/Terms and Conditions
- Authors retain all proprietary rights in any process, procedure, or article of manufacture described in the Work.
- Authors may reproduce or authorize others to reproduce the work or derivative works for the author’s personal use or company use, provided that the source and the copyright notice of Politeknik Elektronika Negeri Surabaya (PENS) publisher are indicated.
- Authors are allowed to use and reuse their articles under the same CC-BY-NC-SA license as third parties.
- Third-parties are allowed to share and adapt the publication work for all non-commercial purposes and if they remix, transform, or build upon the material, they must distribute under the same license as the original.
Plagiarism Check
To avoid plagiarism activities, the manuscript will be checked twice by the Editorial Board of the EMITTER International Journal of Engineering Technology (EMITTER Journal) using iThenticate Plagiarism Checker and the CrossCheck plagiarism screening service. The similarity score of a manuscript has should be less than 25%. The manuscript that plagiarizes another author’s work or author's own will be rejected by EMITTER Journal.
Authors are expected to comply with EMITTER Journal's plagiarism rules by downloading and signing the plagiarism declaration form here and resubmitting the form, along with the copyright transfer form via online submission.