Hybrid Security RSA Algorithm in Application of Web Service Jayraj Gondaliya Electrical Engineering and Computer Science Texas A&M University- Kingsville Kingsville, TX USA jayraj_laljibhai.gondaliya@st udents.tamuk.edu Jinisha Savani Electrical Engineering and Computer Science Texas A&M University- Kingsville Kingsville, TX USA jinishasavani@gmail.com Vivek Sheetal Dhaduvai Electrical Engineering and Computer Science Texas A&M University- Kingsville Kingsville, TX USA vivek_sheetal.dhaduvai@stud ents.tamuk.edu Gahangir Hossain Electrical Engineering and Computer Science Texas A&M University- Kingsville Kingsville, TX USA gahangir.hossain@tamuk.edu Abstract—A new hybrid security algorithm is presented for RSA cryptosystem named as Hybrid RSA. The system works on the concept of using two different keys- a private and a public for decryption and encryption processes. The value of public key (P) and private key (Q) depends on value of M, where M is the product of four prime numbers which increases the factorizing of variable M. moreover, the computation of P and Q involves computation of some more factors which makes it complex. This states that the variable x or M is transferred during encryption and decryption process, where x represents the multiplication of two prime numbers A and B. thus, it provides more secure path for encryption and decryption process. The proposed system is compared with the RSA and enhanced RSA (ERSA) algorithms to measure the key generation time, encryption and decryption time which is proved to be more efficient than RSA and ERSA. Keywords: RSA, Cryptosystem, Network Security, Cyber systems I. INTRODUCTION The ability to securely store and transfer sensitive information has proved critical factor in success. It is important to secure Data for a confidential transmission. It becomes essential to protect information from unauthorized users. This information should be available and open only for the authorized users and protected by disclosing and making it unavailable for unauthorized users. Thus confidentiality integrity and availability becomes the most important factors for secure data transmission. In recent times, cryptography has turned into battleground. It is a method of storing and transmitting data in a form so that only those for whom it is intended can read and process it. Two main classes of cryptography are “symmetric or secret key” and “asymmetric or public key” cryptography. In symmetric cryptography, the system use same key for both encryption and decryption processes. Whereas in asymmetric cryptography, two different keys are used- one key is public which serves the encryption process while the another is private key which is assigned for the decryption process. The public key cryptography is more secure than private key cryptography. The security of encryption scheme depends on the length of the key and the computational work. Motivated by the research trends and challenges, Hybrid RSA algorithm with four prime numbers has been proposed. Here the keys are independent of variable x or M. Moreover, it is possible to eliminate the transfer of x or M by replacing it with a newly computed value of x for the process of encryption or decryption. As the key generation time increases with increase in the speed of encryption or decryption, it becomes challenging to attack the system and the proposed technique becomes secure. II. LITERATURE REVIEW A. Algorithm Many algorithms have been proposed for public cryptography. In RSA algorithm, it is assumed that it is difficult to find the factor of large integers and hard to find the decryption key. But as decryption was based directly on variable x; it was easy to factorize and derive the key. To improve the security enhanced RSA (ERSA) was proposed by considering the third prime number to increase complexity; but the original message can be acquired directly. Thus direct attack may harm both RSA and ERSA. A new algorithm with some new factors were computed to increase the complexity in encryption as well as decryption process. But use of many parameters overloaded the system. A new algorithm was introduced to overcome the advantages where the factor was replaced by a new factor which was difficult to trace back as it was the product of two prime numbers. But this achieved increase in time complexity. 149 2018 1st International Conference on Data Intelligence and Security 978-1-5386-5762-1/18/$31.00 ©2018 IEEE DOI 10.1109/ICDIS.2018.00032 Authorized licensed use limited to: Univ of Texas at Dallas. Downloaded on March 16,2024 at 18:16:02 UTC from IEEE Xplore. Restrictions apply.