Hybrid Security RSA Algorithm in Application of
Web Service
Jayraj Gondaliya
Electrical Engineering and
Computer Science
Texas A&M University-
Kingsville
Kingsville, TX USA
jayraj_laljibhai.gondaliya@st
udents.tamuk.edu
Jinisha Savani
Electrical Engineering and
Computer Science
Texas A&M University-
Kingsville
Kingsville, TX USA
jinishasavani@gmail.com
Vivek Sheetal Dhaduvai
Electrical Engineering and
Computer Science
Texas A&M University-
Kingsville
Kingsville, TX USA
vivek_sheetal.dhaduvai@stud
ents.tamuk.edu
Gahangir Hossain
Electrical Engineering and
Computer Science
Texas A&M University-
Kingsville
Kingsville, TX USA
gahangir.hossain@tamuk.edu
Abstract—A new hybrid security algorithm is presented for RSA
cryptosystem named as Hybrid RSA. The system works on the
concept of using two different keys- a private and a public for
decryption and encryption processes. The value of public key (P)
and private key (Q) depends on value of M, where M is the
product of four prime numbers which increases the factorizing
of variable M. moreover, the computation of P and Q involves
computation of some more factors which makes it complex. This
states that the variable x or M is transferred during encryption
and decryption process, where x represents the multiplication of
two prime numbers A and B. thus, it provides more secure path
for encryption and decryption process. The proposed system is
compared with the RSA and enhanced RSA (ERSA) algorithms
to measure the key generation time, encryption and decryption
time which is proved to be more efficient than RSA and ERSA.
Keywords: RSA, Cryptosystem, Network Security, Cyber
systems
I. INTRODUCTION
The ability to securely store and transfer sensitive
information has proved critical factor in success. It is
important to secure Data for a confidential transmission. It
becomes essential to protect information from unauthorized
users. This information should be available and open only for
the authorized users and protected by disclosing and making
it unavailable for unauthorized users. Thus confidentiality
integrity and availability becomes the most important factors
for secure data transmission.
In recent times, cryptography has turned into battleground.
It is a method of storing and transmitting data in a form so that
only those for whom it is intended can read and process
it. Two main classes of cryptography are “symmetric or
secret key” and “asymmetric or public key” cryptography. In
symmetric cryptography, the system use same key for both
encryption and decryption processes. Whereas in asymmetric
cryptography, two different keys are used- one key is public
which serves the encryption process while the another is
private key which is assigned for the decryption process. The
public key cryptography is more secure than private key
cryptography. The security of encryption scheme depends on
the length of the key and the computational work.
Motivated by the research trends and challenges, Hybrid
RSA algorithm with four prime numbers has been proposed.
Here the keys are independent of variable x or M. Moreover,
it is possible to eliminate the transfer of x or M by replacing
it with a newly computed value of x for the process of
encryption or decryption. As the key generation time
increases with increase in the speed of encryption or
decryption, it becomes challenging to attack the system and
the proposed technique becomes secure.
II. LITERATURE REVIEW
A. Algorithm
Many algorithms have been proposed for public
cryptography. In RSA algorithm, it is assumed that it is
difficult to find the factor of large integers and hard to find the
decryption key. But as decryption was based directly on
variable x; it was easy to factorize and derive the key. To
improve the security enhanced RSA (ERSA) was proposed by
considering the third prime number to increase complexity;
but the original message can be acquired directly. Thus direct
attack may harm both RSA and ERSA. A new algorithm with
some new factors were computed to increase the complexity
in encryption as well as decryption process. But use of many
parameters overloaded the system. A new algorithm was
introduced to overcome the advantages where the factor was
replaced by a new factor which was difficult to trace back as
it was the product of two prime numbers. But this achieved
increase in time complexity.
149
2018 1st International Conference on Data Intelligence and Security
978-1-5386-5762-1/18/$31.00 ©2018 IEEE
DOI 10.1109/ICDIS.2018.00032
Authorized licensed use limited to: Univ of Texas at Dallas. Downloaded on March 16,2024 at 18:16:02 UTC from IEEE Xplore. Restrictions apply.