a). The RSA encryption algorithm flowchart

a). The RSA encryption algorithm flowchart

Source publication
Article
Full-text available
Network safety has become an important issue in recent years. Encryption has been developed as a solution and plays an important role in the security of information systems. Many methods are required to secure the shared data. The advanced internet, networking firms, health information and the cloud applications have significantly increased our dat...

Context in source publication

Context 1
... pad bits are created randomly to make it difficult for the attacker to handle either the plaintext or the pad bits [13]. The RSA algorithm flowchart, as shown in Figures 2(a) and 2(b). ...

Citations

... Several studies examined the integration of symmetric and asymmetric cryptographic algorithms to leverage their respective strengths. Another study [108] developed a hybrid AES-RSA algorithm that was faster and provided better performance than AES or RSA alone, demonstrating the performance benefits of a hybrid approach to network security. Another work [109] implemented a double encryption technique using sequential AES and RSA algorithms for cloud storage. ...
... Employing multilayered encryption enhances security [107]. The synergy of symmetric and asymmetric cryptography brings performance benefits [108]. Moreover, quantum cryptography fortifies security resilience [114]. ...
Article
Full-text available
Cryptographic key generation and data encryption and decryption using wearable biometric technologies is an emerging research area with significant potential for authentication and communication security. The research area is rapidly developing, and a comprehensive review of recently published literature is necessary to establish emerging challenges. This research article aims to critically investigate and synthesize current research using biometric cryptosystems that use behavior or medico-chemical characteristics, ranging from gate analysis to gaze tracking. The study will summarize the state of knowledge, identify critical research gaps, and provide insight into promising future implications and applications that can enable the realization of user-specific and resilient solutions for authentication and secure communication demands.
... In the realm of network security, Intrusion Detection Systems (IDSs) stand as pivotal components, divided into three key categories: misuse-based, anomaly-based, and specification-based. Misuse-based IDSs excel at recognizing familiar attack patterns by comparing them with stored references, yet they grapple with emerging threats [1]. On the other hand, the anomaly-based IDS model aims at exposing unexpected actions and this gives a chance to discover new types of attacks through evaluation of real activities occurring [2]. ...
Article
Full-text available
Gradually, since the number of linked computer systems that use networks linked to the Internet is raised the information that is delivered through those systems becomes more vulnerable to cyber threats. This article presents proposed algorithms based on Machine Learning (ML) that ensure early detection of cyber threats that cause network breaking through the use of the Correlation Ranking Filter feature selection method. These proposed algorithms were applied to the Multi-Step Cyber-Attack Dataset (MSCAD) which consists of 66 features. The proposed strategy will apply machine learning algorithms like Adaptive Boosting-Deep Learning (AdaBoost-Deep Learning) or (ABDL), Multi-Layer Perceptron (MLP), Bayesian Networks Model (BNM), and Random Forest (RF), the feature would be decreased to high valuable of 46 features were included with a threshold of 0.1 or higher. The accuracy would be increased when the no. of features decreased to 46 with a threshold of ≥ 0.1 with the ABDL algorithm producing an accuracy of 99.7076%. The obtained results showed that the proposed algorithm delivered a suitable accuracy of 99.6791% with the ABDL algorithm even with a higher number of features.
Article
Full-text available
تعتبر عملية حماية البيانات بزمن تنفيذ قياسي هي الهدف الاساسي للباحثين في مجال حماية البيانات باستخدام آليات أو خوارزميات التشفير، انطلاقاً من هذا المفهوم تم اقتراح أربع نماذج لحماية البيانات النصية تعتمد هذه النماذج على خوارزميتي RSA وAES مع اضافة عمليات XOR إما مع كتلة نصية ثابته وهي الكتلة الأولى m1 أو كتلة نصية ديناميكية متغيرة mi-1 وأعطت هذه النماذج درجة حماية أعلى من خوارزميتي RSA وAES من خلال حساب معدل الأنتروبي لكلٍ منها حيث بينت النتائج زيادة وتحسن قيمة الانتروبي للنماذج الأربعة عن قيمتها لخوارزميتي RSA وAES مما يثبت زيادة درجة حماية البيانات عند استخدام هذه النماذج وقد تم حساب متوسط زمن التنفيذ لإجراء التشفير وفك التشفير لهذه النماذج فتبين أن النماذج الأربعة ذات زمني تشفير وفك تشفير أقل من أزمنة خوارزمية RSA وتقارب أزمنة خوارزمية AES مما أثبت سرعة تنفيذ هذه النماذج المقترحة وقد بينت النتائج أن النموذج الأول هو الاسرع في حين أن النموذج الرابع هو الأعلى درجة حماية. The process of data protection with a standard execution time is the main goal of researchers in the field of data protection using encryption mechanisms or algorithms. Based on this concept, four models for textual data protection have been proposed. These models depend on the RSA and AES algorithms with the addition of XOR operations either with a fixed text block, which is the block The first is m1 or mi-1 variable dynamic text block, and these models gave a higher degree of protection than RSA and AES algorithms by calculating the entropy rate for each of them, where the results show increasing entropy value for four models. Their entropy values are higher than entropy values for RSA and AES algorithms. So that improve their increasing in protection data degree when those models are used and the average execution time is calculated to perform Encryption and decryption of these models to implement the encryption and to implement the decryption, it is shown that times of encryption and decryption for four models are least than times of RSA algorithm and close to times of AES, which improve that proposed models have fast execution speed. The results show that the first model is the fastest, while the fourth model is the highest degree protection.
Article
In an era where digital data is increasingly prevalent, data encryption has become essential to information security. Because databases usually contain sensitive and significant data and are a popular target for cyberattacks, robust encryption solutions are necessary. This research proposes a novel hybrid encryption method that combines symmetric and asymmetric encryption approaches to safeguard databases. The recommended approach combines the security of asymmetric encryption with the speed of symmetric encryption to provide a dependable and efficient data protection solution. This paper introduces hybrid techniques by combining the two most essential algorithms AES and RSA algorithms with XORed Operation. This hybrid encryption algorithm provides more security as compared to existing hybrid algorithms. The implementation and result are also derived in the paper.