A Proposed Method for Text Encryption using Symmetric and Asymmetric Cryptosystems

International Journal of Computer Trends and Technology (IJCTT)          
© 2017 by IJCTT Journal
Volume-50 Number-2
Year of Publication : 2017
Authors : HayderRaheem Hashim, Mohammed Abdul HameedJasemAlkufi
DOI :  10.14445/22312803/IJCTT-V50P117


HayderRaheem Hashim, Mohammed Abdul HameedJasemAlkufi "A Proposed Method for Text Encryption using Symmetric and Asymmetric Cryptosystems". International Journal of Computer Trends and Technology (IJCTT) V50(2):94-100, August 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
This proposed method focuses on encrypting texts that are written in English or Arabic language using symmetric and asymmetric cryptosystems respectively.Thesymmetric and asymmetric cryptosystems presentedby Vigenere Cipher and RSA Cryptosystem respectively. Therefore, a plaintext encrypted using Vigenere Cipher, then the obtained ciphertext must be encrypted again using RSA Cryptosystem in a way that makes this method programmed using MATLAB.Therefore, this suggested method has a higher level of security than either Vigenere Cipher or RSA Cryptosystem since its security relies on the hardness of factoring the product of two large prime numbers, the factoring problem and on the secrecy of the keyword of the Vigenere Cipher. Therefore, this method gives us the confidence of using Vigenere cipher over text messages as a part of asymmetric cryptography and suggests a new method for encrypting text messages.

[1]B Kaliski.(2006).The Mathematics of the RSA Public-Key Cryptosystem. RSA Laboratories.
[2] K.H.Rosen, “Inroduction to Cryptography,” in Elementary of Number Theory and Its Applications, 5th ed. Boston, United State of America, 2005, ISBN-10:0201870738.
[3] J.Buchman,” Introduction to cryptography,” United State of America, Springer Science & Business Media, 2013.
[4] T.Okamoto,andS. Uchiyama.(1998).A new public-key cryptosystem as secure as factoring. In Advances in Crypto log.SpringerBerlin Heidelberg.
[5] R. S. Douglas”Cryptography,” in Theory and Practice: Discrete Mathematics and Its Applications, United State Of America,Taylor and Francis Group, 2006.
[6] D.Boneh.(1999).Twenty years of attacks on the RSA cryptosystem. Notices of the AMS.46(2), pp. 203- 213.
[7] J. Hoffstein, J. Pipher, and J.H. Silverman,”An Introduction to Mathematical Cryptography,”New York, United State of America,Springer, Science +Business, Media, LLC, 233,2008.
[8]Damgård, Ivan, and MaciejKoprowski.(2001).Practical threshold RSA signatures without a trusted dealer.Springer Berlin Heidelberg.
[9] Z. Kartit,andM. El Marraki. (2015). Applying Encryption Algorithm to Enhance Data Security in Cloud Storage.Engineering Letters. 23(4).
[10]Goyal, Dinesh, and Vishal Srivastava.(2012).RDA Algorithm: Symmetric Key Algorithm. International Journal Of Information and Communication Technology Research. 2(4).
[11] W. Trappe, and L.C. Washington,”Introduction toCryptography with Coding Theory,” 2nded. New Jersey,United State of America, Prentice Hall, 2002.
[12] M. G. AL-Saidi, Nadia and Md. Said, MohamadRushdan and M. Ahmed, Adil. (2011).Efficiency analysis for public key systems based on fractal functions.Journal of Computer Science, 7 (4). pp. 526-532.
[13] Ali, Zulkarnain M., Nawara MA Makhzoum, and AlhassanMakhzoum. (2012). Computation of private key based on Divide-By-Prime for luccryptosystems.Journal of Computer Science 8 (4).
[14] Ismail, Eddie Shahril, and S. Baharudin. (2012).Secure hybrid mode-based cryptosystem.American Journal of Applied Sciences 9(3).
[15] H.R.Hashim (2014).H-Rabin cryptosystem. J. Math. Stat., 10: 304-308.DOI:10.3844/jmssp.2014.304.308.
[16]P. S.Narkhede, S.M. Ajabe,andDandage, P. B. Zope,” A Review of Public Key Cryptography for Secure Communication Using RSA,” presented at theNational Conference “CONVERGENCE”, 2015.

Vigenere Cipher, RSA Cryptosystem, Encryption, Decryption, MATLAB.