A Novel Approach for Safeguarding Kurdish Text Files via Modified AES-OTP and Enhanced RSA Cryptosystem on Unreliable Networks
DOI:
https://doi.org/10.23918/eajse.v10i2p8Keywords:
Cryptography, Encryption, Decryption, Symmetric Key, Asymmetric Key, AES-CBC cryptosystem, RSA Cryptosystem, Kurdish Alphabet, One Time PadAbstract
In line with the growth of the e-governate, the Kurdistan Regional Government is actively adopting digital transformation, which underscores the urgent requirement for distinct encryption methods that are practical for the Kurdish alphabet in the fields of administration and digital governance. This paper provides a new method for encrypting and decrypting classified text files in the Kurdish alphabet using the modified Advanced Encryption Standard (AES) cipher system with the adoption of Cipher Block Chaining (CBC) mode based on a one-time pad (OTP) cipher. The provided work also uses the modified RSA cipher system to transmit randomly generated secret keys for both AES and OTP via untrustworthy channels. The modified RSA cipher system is based on randomly selecting two large co-prime numbers under the restriction, each having at most two factors, instead of two large prime numbers.
References
[1] W. Easttom, Modern Cryptography Applied Mathematics for Encryption and Information Security, 2nd ed., SpringerLink, 2022. https://link.springer.com/book/10.1007/978-3-031-12304-7
[2] W. Stallings, Cryptography and Network Security: Principles and Practice, 8th, Ed., Pearson, 2020. ISBN-13: 9780135764213 [3] M. Stamp, Information Security: Principles and Practice, 2rd ed., Wiley, 2011. https://doi.org/10.1002/9781118027974.
[4] Mustafa Emad Hameed; Masrullizam Mat Ibrahim; Nurulfajar Abd Manap; and Ali A. Mohammed, A lossless compression and encryption mechanism for remote monitoring of ECG data using Huffman coding and CBC-AES., vol. 111, Future generation computer systems, 2020, pp. 829-840. https://doi.org/10.1016/j.future.2019.10.010
[5] Steve Boby George; Sanjay Jaimy; Sebin Jose; Edwin Daji; Agnel Antony, "A Novel Model To Overcome Drawbacks Of Present Cloud Storage Models Using AES 256 CBC Encryption," International Journal of Computer Applications, vol. 183, pp. 30-35, 2021. https://doi.org/10.5120/ijca2021921481
[6] "Advancing Cloud Image Security via AES Algorithm Enhancement Techniques," Zahraa A. Mohammed; Hadeel Qasem Gheni; Zahraa Jabbar Hussein; Ali Kadhum M. Al-Qurabat;, vol. 14, no. 1, pp. 12694-12701, 2024. https://doi.org/10.48084/etasr.6601
[7] Douglas Robert Stinson, Maura Paterson, Cryptography Theory and Practice, 4th, Ed., NewYourk, USA: Chapman and Hall/CRC, 2018. https://doi.org/10.1201/9781315282497
[8] Mr.B.TAMILARASAN, Dr.R.SRINIVASAN , Dr.S.DHIVYA, Dr.E.K.SUBRAMANIAN, Dr.C.GOVINDASAMY, CRYPTOGRAPHY AND NETWORK SECURITY: PRINCIPLES AND PRACTICE, vol. 47, Indea: SK Research Group of Companies, 2023, pp. 1967-1986. ISBN: 8119980530, 9788119980536
[9] Ahmed Hashim Mohammed; Rawaa Mohammed Abdul Hussein, "A security services for internet of thing smart health care," TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 2, no. 4, pp. 772-779, 2022. https://doi.org/10.12928/TELKOMNIKA.v20i4.23765
[10] O. H. Ahmed, A. M. Ahmed and S. H. Ahmed, "Improving Playfair Algorithm To Support User Verification And," International Journal Of Engineering And Computer Science, vol. 4, no. 8, pp. 14058-14062, 2015. https://doi.org/10.18535/ijecs/v4i8.78
[11] N. A. Kako, "CLASSICAL CRYPTOGRAPHY FOR KURDISH LANGUAGE," in 4th International Engineering Conference on Developments in Civil & Computer Engineering, 2018. https://doi.org/10.23918/iec2018.02.
[12] N. E. Tawfiq, "Modified Lsb For Hiding Encrypted Kurdish Text Into Digital Image," Academic Journal of Nawroz University (AJNU), vol. 7, no. 4, pp. 254-260, 2019. https://doi.org/10.25007/ajnu.v7n4a298
[13] F. Rashid, "Design and Implementation a New Approach for Enhancing Encryption and Decryption Mechanisms," SSRN Electronic Journal, 2020. https://doi.org/10.2139/ssrn.3590807
[14] M. A. Mohammed and F. S. Abed, "Cloud Storage Protection Scheme Based on Fully Homomorphic Encryption," ARO-The Scientific Journal of Koya University, vol. VIII, no. 2, pp. 40-47, 2020. https://doi.org/10.14500/aro.10590
[15] Z. H. A. A. Jabbar, Z. A. Ali and H. A. Taher, "DESIGN AND IMPLEMENTATION OF A MATHEMATICAL ENCRYPTION MODEL FOR THE CENTRAL KURDISH FONT BASED ON UNICODE," Ziyad H. Abduljabbar, Zeravan A. Ali, Hanan A.Taher, vol. 11, no. 2, pp. 273-279, 2023. https://doi.org/10.25271/sjuoz.2023.11.2.1126
[16] M. B. Abdulrazzaq, "Selective Multi Keys to Modify RSA Algorithm," Journal of Zankoy Sulaimani Part-A- (Pure and Applied Sciences), vol. 21, no. 1, pp. 99-106, 2019. https://doi.org/10.17656/jzs.10748
[17] K.Jaspin, S. Selvan, Sahana.S and Thanmai.G, "Efficient and Secure File Transfer in Cloud Through Double Encryption Using AES and RSA Algorithm," in International Conference on Emerging Smart Computing and Informatics (ESCI) ©2021 IEEE , 2021. https://doi.org/10.1109/ESCI50559.2021.9397005
[18] s. Fatima, T. Rehman, M. Fatima and M. Ali, "Comparative Analysis of AES and RSA Algorithms for Data Security in Cloud Computing," 2022. https://doi.org/10.3390/engproc2022020014
[19] D. Shivaramakrishna and M. Nagaratna, "A novel hybrid cryptographic framework for secure data storage in cloud computing: Integrating AES-OTP and RSA with adaptive key management," Alexandria Engineering Journal, pp. 275-284, 2023. https://doi.org/10.1016/j.aej.2023.10.054
[20] P. Kuppuswamy, S. Q. Y. A. K. Al-Maliki, R. John, M. Haseebuddin and A. A. S. Meeran, "A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm," Bulletin of Electrical Engineering and Informatics, vol. 12, no. 2, pp. 1148-1158, 2023. https://doi.org/10.11591/eei.v12i2.4967
Downloads
Published
Issue
Section
License
License
Eurasian J. Sci. Eng is distributed under the terms of the Creative Commons Attribution License 4.0 (CC BY-4.0) https://creativecommons.org/licenses/by/4.0/