CRYPTOGRAPHIC METHOD TO ENHANCE
DATA SECURITY USING RSA ALGORITHM AND MELLIN TRANSFORM
Akash Thakkar 1, Ravi Gor 2
1 Research
scholar, Department of Applied Mathematical Science, Actuarial Science and
Analytics, Gujarat University, India
2 Department
of Applied Mathematical Science, Actuarial Science and Analytics, Gujarat
University, India
|
ABSTRACT |
||
Cryptography
is the technique of using mathematical algorithms to encrypt and decrypt the information. The process of converting plaintext to
ciphertext is known as encryption, whereas the process of converting
ciphertext to plaintext is known as decryption. Encryption and decryption
methods based on Mellin Transform are unable to
provide more security while transmitting the information. RSA algorithm is an
Asymmetric key cryptography algorithm. The purpose of this study is to
present a cryptographic method that uses the RSA algorithm and Mellin Transform to improve communication security. |
|||
Received 11 March 2023 Accepted 10 April 2023 Published 26 April 2023 Corresponding Author Akash
Thakkar, akashthakkar@gujaratuniversity.ac.in DOI 10.29121/IJOEST.v7.i2.2023.490 Funding: This research
received no specific grant from any funding agency in the public, commercial,
or not-for-profit sectors. Copyright: © 2023 The
Author(s). This work is licensed under a Creative Commons
Attribution 4.0 International License. With the
license CC-BY, authors retain the copyright, allowing anyone to download,
reuse, re-print, modify, distribute, and/or copy their contribution. The work
must be properly attributed to its author. |
|||
Keywords: Cryptography,
Encryption, Decryption, RSA Algorithm, Mellin
Transform |
1. INTRODUCTION Thakkar and Gor (2022), Thakkar and Gor (2022)
Cryptography is one of the most utilized techniques for data security. The techniques used to protect data in cryptography are based on mathematical concepts and a set of rule-based calculations known as algorithms. Two crucial cryptographic functions are encryption and decryption. Normal data is transformed into an unreadable form through encryption, and the reverse is accomplished through decryption. There are three main categories of cryptography:
· Symmetric key cryptography (secret key cryptography)
· Asymmetric key cryptography (public key cryptography)
· Hash Function
Symmetric key cryptography is a type of encryption where the same
key is used to both encrypt and decrypt the data. Symmetric key cryptography is
quick and easy, but it has the drawback that the sender and receiver must
securely exchange keys. DES, AES, IDEA, RC4, Blowfish, Twofish
are some Symmetric key algorithms.
Asymmetric key cryptography is also known as public-key
cryptography. A pair of keys is used to encrypt and decrypt the data in
Asymmetric key cryptography. Data is encrypted with the public key and
decrypted with the corresponding private key. RSA, DSA, ElGamal,
Rabin, ECC are some Asymmetric key algorithms.
1) RSA
ALGORITHM Rivest (1978),
Thakkar and
Gor (2021)
RSA is public key cryptosystem developed by Rivest R.,
Shamir A., Adleman L. in 1978. RSA algorithm is widely used for secure data
transmission. There
are mainly three phases in RSA algorithm.
1)
Key Generation
2)
Encryption algorithm
3)
Decryption algorithm
1)
key Generation
RSA involves two keys: public key and private key. Public key is used
for encryption and private key is used for decryption of data.
1)
Choose two prime numbers and
2)
Find such that
3)
Find the Phi of,
4)
Choose ansuch that and such that and share no divisors other than 1.
5)
Determine such that
Public Key: and Private Key:
2)
Encryption algorithm
The process of converting Plain Text into Cipher Text is called as
Encryption process.
3)
Decryption algorithm
The process of converting Cipher Text into Plain Text is called as
Decryption process.
Some integral transforms contribute to the process of
cryptography. The features of integral transforms are used to create encryption
and decryption methods.
2) MELLIN
TRANSFORM (MT) Johar (2019),
Santana (2014)
The Mellin Transform is an integral
transform named after mathematician Hjalmar Mellin
(1854-1933). The Mellin Transform is extremely useful
for certain applications including solving Laplace equations.
Let a function defined for all positive values of, then the Mellin Transform of is defined by
Properties
of Mellin Transform:
1) Scaling:
2) Inverse of independent variable:
3) Multiplication by Power of .
4) Derivative:
5) Where:
6) Convolution:
2. LITERATURE REVIEW
Rivest
et al. (1978) introduced a method
namely RSA to encrypt and decrypt the data. The RSA algorithm is the most widely
used public key cryptography algorithm. One of the reason RSA has become most
widely used is because it has two keys, one is for encryption and other one is
for decryption. Thus, it is promising confidentiality, integrity, authenticity and non-repudiation of data.
Milanov (2009) concluded that RSA is a strong encryption algorithm that has stood a partial test of time. RSA is a public key cryptosystem that enables secure communications and digital signatures. Its security is based in part on the difficulty of factoring large numbers.
Malhotra & Singh (2013) studied various cryptographic algorithms. They provided a study of the research work done in cryptography field and various cryptographic algorithms being used. It is recapitulated that RSA is being used widely. This paper presented the current scenario and can provide a direction to naive users.
Santana
(2014) developed a scheme in cryptography whose construction is based on the
application of Mellin Transform.
Lone
and Uddin (2016) studied common attacks on RSA and its variants with possible
countermeasures.
Nisha and Farik (2017) reviewed RSA public key cryptography algorithm. They examined its strengths and weaknesses and propose novel solutions to overcome the weakness.
Tayal
et al. (2017) provided an overview of network security and various techniques for
improving network security. They demonstrated various schemes used in
cryptography for network security purposes.
Mohammadi et al. (2018) compared two public key
cryptosystems. They focused on the efficient implementation and analysis of the
two most popular algorithms for key generation, encryption, and decryption
schemes of RSA and ElGamal. RSA is based on the
difficulty of prime factorization of a very large number and the ElGamal algorithms hardness is essentially equivalent to
the difficulty of finding discrete logarithm modulo a large prime number. These
two systems are compared in terms of various parameters such as performance, security,
and speed. They concluded that RSA is more efficient for encryption than ElGamal and RSA is less efficient for decryption than ElGamal.
Johar (2019) presented basic
introduction of Mellin Transform and its examples.
Mok
and Chuah (2019) studied brute force attack on RSA cryptosystem. They concluded that
prime factorization attack is the most efficient way on RSA cryptanalysis.
Nagalakshmi et al. (2019) provided the conditions for the RSA Cryptosystem based on the Laplace
transform techniques. The proposed algorithm was implemented using a high-level
programme, and its time complexity was tested using RSA cryptosystem
algorithms. The comparison shows that the proposed algorithm improves data
security when compared to RSA cryptosystem algorithms and the use of the
Laplace transform in cryptosystem schemes.
Thakkar and Gor
(2021) represented a review of literature concerned
with cryptographic algorithms and mathematical transformations. The review of
RSA and ElGamal algorithms aids readers in better
understanding the differences between the two asymmetric key cryptographic
algorithms and how they work and review of
mathematical transformations helps the reader to understand how mathematical
transformations are used in cryptography.
Thakkar and Gor
(2022) developed a cryptographic method using RSA algorithm and Kamal
Transform to enhance communication security. This paper provided frequency test
and statistical analysis on the proposed method.
Thakkar and Gor
(2022) presented a cryptographic method using ElGamal
algorithm and Kamal Transform to improve security of communication. The
frequency test and statistical analysis on the proposed method are provided in
this work.
Thakkar and Gor (2022) provided a
cryptographic method using the ElGamal algorithm and Mellin Transform to improve security of communication. The
frequency test and statistical analysis on the proposed method are provided in
this paper.
3. PROPOSED ALGORITHM OF THE MATHEMATICAL MODEL
The proposed method is RSA algorithm with application of Mellin Transform (RSA-MT). The proposed work is to improve
security of communication. When two people want to transfer the data, they will
follow the given steps for encryption and decryption. The following method
provides an overview of the proposed cryptographic scheme.
1) Method
of Key Generation
Following are the steps involved in Key Generation.
Step 1: Generate four large random prime numbers
Step 2:
Calculate and
Step 3: Select
the public exponent , such that
Step 4: Find
the secret exponent , such that
Step 5: Generate
polynomial using public exponent . i.e.,
2) Method
of Encryption
Following are the steps involved in Encryption.
Step 1: Select the plain text , convert into ASCII code integer
Step 2: Calculate
Step 3: Generating
function from that we get
Step 4: Take
Mellin Transform of a function. i.e.,
Step 5: Choose
and get
Step 6: Find
such that
Step 7: Find
such that and (value of )
Step 8: Calculate
cipher text then get integer of cipher text
Step 9: Each
integer of cipher text is converted to its construct by ASCII
character are stored as the cipher text
Following are the steps involved in Decryption.
Step 1: Consider the Cipher text and key
received from the sender
Step 2: Cipher text converted to ASCII values of
Step 3: Each
integer of is converted into and get
Step 4: Calculate
and get
Step 5: Find
the polynomial assuming as a coefficient
Step 6: Apply
inverse Mellin Transform. i.e.,
and get integer
Step 7: Each integer are converted to their corresponding ASCII
code values and hence get the original plain text
Public
key:
Private
key:
4. NUMERICAL EXAMPLE
This section contains an example of an encryption and decryption method. Note that, the parameters are chosen to make computation easier, however they are not in the useable range for secure transmission.
If Alice (sender) wants to send an encrypted message to Bob (receiver).
Bob first computes his parameters using steps as given in method of Key Generation.
Step 1: Primes
Step
2: and
Step
3: , such that
Step
4: , such that
Step
5: Polynomial
using public exponent
i.e.,
Bob then sends his public key to Alice.
Alice computes his parameters to encrypt the message using steps as given in method of Encryption.
Step
1: Plain text =
“ M@th ”, ,
convert into ASCII code integer
Step
2:
Step
3:
we get,
Step
4: Take
Mellin Transform of a function. i.e.,
Step
5: Choose and
we get,
Step
6: Find such that ,
we get,
Step
7: Find
such that and (value of )
we get,
Step
8: Calculate
cipher text ,
we get,
Step
9: Each
integer of cipher text is converted to its construct by ASCII character 㬊 ᒌ ɬ ⠑ and stored as the cipher text “ 㬊ᒌɬ⠑ ”
Alice
then sends (, cipher text ) to Bob.
Bob decrypts the cipher text using steps as given in method
of Decryption.
Step 1: Consider
the Cipher text and key received from the sender
Step
2: Cipher text “ 㬊ᒌɬ⠑ ”
converted to ASCII values of
Step
3: Each
integer of is converted into
,
we get,
Step
4: Calculate
we have,
we get,
Step
5: The
polynomial assuming
as a coefficient
Step
6: Apply
inverse Mellin Transform
and get and we have (as value of )
From get integer
Step
7: Each integer are converted to them
corresponding ASCII code values and hence get the
original plain text = “ M@th ”
5. TESTING AND ANALYSIS Thakkar and Gor (2022), Thakkar and Gor (2022)
The statistical analysis and frequency testing for this proposed method are presented. The graph of RSA algorithm and proposed method RSA-MT is shown here and also compared with each other. In statistical analysis, correlation coefficients are obtained for RSA, MT, and the proposed RSA-MT.
1) Frequency
Test
Figure 1 show that the frequency of the same character in plaintext after encryption with RSA algorithm is the same, where the x-axis and y-axis represent plaintext and frequency level of ciphertext, respectively.
Figure 1
Figure 1 RSA Algorithm Ciphertext Frequency Distribution |
Figure 2 demonstrate that the frequency of each character in a plaintext change after encryption with the proposed method RSA-MT, where the x-axis and y-axis represent plaintext and frequency level of ciphertext, respectively.
Figure 2
Figure 2 The Proposed Algorithm Ciphertext Frequency Distribution |
Figure 3 show that graphical representation of the frequency distribution shown in Figure 1 and Figure 2 for each algorithm.
Figure 3
Figure 3 Ciphertext Frequency Distribution of RSA And RSA-MT |
According to the frequency test, the proposed method RSA-MT has a different frequency for each repeated character in a plaintext after encryption.
2) Statistical
Analysis
In statistics, correlation coefficients are used to assess how closely two variables are related. The aim of the proposed method of research is to examine and create an algorithm that strongly resists cryptographic attacks. The correlation shows the relationship between two values. The correlation coefficient between plaintext and ciphertext are examined. Plaintext and ciphertext are identical if the correlation coefficient is one. Plaintext and ciphertext are completely different if the correlation coefficient is near to zero. If the correlation coefficient is less than one, ciphertext is the inverse of plaintext. As a result, encryption success is associated with lower correlation coefficient values. Table shows the experimental finding and the correlation coefficient value of the proposed encryption method.
Table 1
Table 1 The Correlation Test from Plaintext to Ciphertext |
||
Message |
Algorithm |
Correlation |
Applied |
RSA |
0.19820314 |
|
MT |
0.67223518 |
|
RSA-MT |
0.05420039 |
CryPto |
RSA |
0.67704516 |
|
MT |
-0.61845471 |
|
RSA-MT |
0.29986904 |
M@th |
RSA |
0.91830612 |
|
MT |
-0.09195426 |
|
RSA-MT |
-0.40369100 |
According to the correlation test, proposed method RSA-MT is more effective than RSA and MT. Correlation coefficient values are closer to zero with the proposed method RSA-MT. However, for specific types of data (messages), RSA or MT may outperform RSA-MT. Such circumstances and conditions under which performance can be generalized are a research path to pursue.
6. CONCLUSION
One of the most crucial foundational technologies for ensuring the security of data communication is cryptography. An application of Mellin Transform for cryptography is a weak strategy since encrypted data can be deciphered using simple modular arithmetic. RSA is most widely used technique for keeping data secret. The primary method of breaking RSA still depends on how quickly huge prime numbers can be factored. The proposed research based on innovative approach that combines RSA algorithm with Mellin Transform of function to generate four huge prime numbers. Without having access to the private key, it is challenging to crack this method. As a result, the proposed method combining RSA algorithm and Mellin Transform has the potential to improve communication security.
CONFLICT OF INTERESTS
None.
ACKNOWLEDGMENTS
None.
REFERENCES
Debnath, L., and Bhatta, D. (2015). “Integral Transforms and their Applications” (3rd ed.).
Johar, M. Ashfaque (2019). “The Mellin Transform à Basic Introduction”.
Lone, A. H. and Uddin, M. (2016). “Common Attacks on RSA and its Variants with Possible Countermeasures”. International Journal of Research in Management and Technology, 5, 65-70.
Malhotra, M. & Singh, A. (2013). “Study of Various Cryptographic Algorithms”. International Journal of Scientific Engineering and Research, 1(3), 77-88.
Milanov, E. (2009). “The RSA Algorithm”. RSA Laboratories, 1-11.
Mohammadi, M., Zolghadr, A., and Purmina, M. A. (2018). “Comparison of two Public Key Cryptosystems”. Journal of Optoelectronical Nanostructures Summer, 3(3), 47-58. https://dorl.net/dor/20.1001.1.24237361.2018.3.3.5.0
Mok, C. J. and Chuah, C. W. (2019). “An Intelligence Brute Force Attack on RSA Cryptosystem”. Communications in Computational and Applied Mathematics, 1(1).
Nagalakshmi, G., Sekhar, A. C., Sankar, N. R., and Venkateswarlu, K. (2019). “Enhancing the Data Security by Using RSA Algorithm with Application of Laplace Transform Cryptosystem”. International Journal of Recent Technology and Engineering (IJRTE), 8(2).
Nisha, S., and Farik, M. (2017). “RSA Public Key Cryptography Algorithm–A Review”. International Journal of Scientific & Technology Research, 6(7), 187-191.
Rivest, R., Shamir, A., and Adleman, L. (1978). “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”. Communications of the ACM, 21(2), 120-126. https://doi.org/10.1145/359340.359342.
Santana, Y. C. (2014). “A Cryptographic Scheme of Mellin Transform”.
Singh, M. M. P. and Saha, M. (2017). “Application of Laplace - Mellin Transform to Cryptography”. International Journal of Mathematical Archive-8(7), 143-146.
Stallings, W. (2002). “Cryptography and Network Security” (3rd ed). Pearson Education.
Tayal, S., Gupta, N., Gupta, P., Goyal, D., and Goyal, M. (2017). “A Review Paper on Network Security and Cryptography”. Advances in Computational Sciences and Technology, 10(5), 763-770.
Thakkar, A. and Gor, R. (2021). “A Review paper on Cryptographic Algorithms and Mathematical Transformations”, Proceeding of International Conference on Mathematical Modelling and Simulation in Physical Sciences (MMSPS), Excellent Publishers, 324-331.
Thakkar, A. and Gor, R. (2022), “Cryptographic Method to Enhance Data Security Using Elgamal Algorithm and Mellin Transform”. IOSR Journal of Mathematics (IOSR-JM), 18(6), 12-18.
Thakkar, A. and Gor, R. (2022). “Cryptographic Method to Enhance the Data Security Using Rsa Algorithm and Kamal Transform”. IOSR Journal of Computer Engineering (IOSR-JCE), 24(3), 01-07.
Thakkar, A. and Gor, R. (2022). “Cryptographic Method to Enhance the Data Security using ElGamal Algorithm and Kamal Transform”. IOSR Journal of Computer Engineering (IOSR-JCE), 24(3), 08-14.
This work is licensed under a: Creative Commons Attribution 4.0 International License
© Granthaalayah 2014-2023. All Rights Reserved.