Performance Analysis of Hybrid Cryptographic Algorithms Rabbit Stream and Enhanced Dual RSA

Authors

  • Demonius Sarumaha Master of Informatics Program, Faculty of Computer Science and Information Technology, Universitas Sumatera Utara, Medan, Indonesia
  • Mohammad Andri Budiman Master of Informatics Program, Faculty of Computer Science and Information Technology, Universitas Sumatera Utara
  • Muhammad Zarlis Department of Information Systems, Bina Nusantara University

DOI:

https://doi.org/10.32734/jocai.v7.i1-10483

Keywords:

Rabbit Stream, Enhanced Dual RSA, Cryptography, Hybrid

Abstract

Cryptography is a technique for encoding data by encrypting plaintext into an unreadable (meaningless) form. Cryptographic methods have good and bad performance depending on the type of algorithm we use. Therefore, the purpose of this study is to measure speed by combining the two algorithms used. The Rabbit Stream algorithm is a stream cipher algorithm whose system security depends on the generation of a key bit stream (keystream), which only guarantees 128-bit key security but has the advantage of being fast in the encryption and decryption process, while the Enhanced Dual RSA algorithm is an asymmetric algorithm to increase data protection from the Dual RSA algorithm by utilizing the Pells equation as a substitute for public key exponents. On the other hand, the algorithm in question requires a significant amount of time to encrypt messages with a large capacity when compared to the Rabbit Stream algorithm. Nonetheless, the study's findings suggest that using a hybrid method is comparatively faster for processing substantial amounts of data.

Downloads

Download data is not yet available.

References

D. Kusumaningsih, A. Pudoli, And I. Rahmadan, “Steganografi Metode End Of File Untuk Keamanan Data,†J. Telemat. Mkom, Vol. 9, No. 1, Pp. 47–55, 2017.

S. Yakoubov, V. Gadepally, N. Schear, E. Shen, And A. Yerukhimovich, “A Survey Of Cryptographic Approaches To Securing Big-Data Analytics In The Cloud,†2014 Ieee High Perform. Extrem. Comput. Conf. Hpec 2014, 2014, Doi: 10.1109/Hpec.2014.7040943.

M. A. Habib, M. Ahmad, S. Jabbar, S. H. Ahmed, And J. J. P. C. Rodrigues, “Speeding Up The Internet Of Things: Leaiot: A Lightweight Encryption Algorithm Toward Low-Latency Communication For The Internet Of Things,†Ieee Consum. Electron. Mag., Vol. 7, No. 6, Pp. 31–37, 2018, Doi: 10.1109/Mce.2018.2851722.

M. A. Budiman, M. Y. Saputra, And Handrizal, “A Hybrid Cryptosystem Using Vigenère Cipher And Rabin-P Algorithm In Securing Bmp Files,†J. Comput. Appl. Informatics, Vol. 4, No. 2, Pp. 2016–2017, 2018, [Online]. Available: Https://Www.Data-Science.Ruhr/About_Us/.

F. Akhyar, S. M. Nasution, And T. W. Purboyo, “Rabbit Algorithm For Video On Demand,†Apwimob 2015 - Ieee Asia Pacific Conf. Wirel. Mob., Pp. 208–213, 2016, Doi: 10.1109/Apwimob.2015.7374978.

B. S. Muchlis, M. A. Budiman, And D. Rachmawati, “Teknik Pemecahan Kunci Algoritma Rivest Shamir Adleman (Rsa) Dengan Metode Kraitchik,†J. Penelit. Tek. Inform. E-Issn 2541-2019, P-Issn 2541-044x, Vol. 2, No. 2, Pp. 49–64, 2017, [Online]. Available: Http://Jurnal.Polgan.Ac.Id/Index.Php/Sinkron/Article/View/75.

Y. Funabashi, A. Shibata, S. Negoro, I. Taniguchi, And H. Tomiyama, A Dynamic Programming Algorithm For Energy-Aware Routing Of Delivery Drones, Vol. 13. 2020.

M. Boesgaard, M. Vesterager, and E. Zenner, “The rabbit stream cipher,†Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 4986 LNCS, pp. 69–83, 2008, doi: 10.1007/978-3-540-68351-3_7.

O. G. Abood And S. K. Guirguis, “A Survey On Cryptography Algorithms,†Int. J. Sci. Res. Publ., Vol. 8, No. 7, 2018, Doi: 10.29322/Ijsrp.8.7.2018.P7978.

S. Verma And D. D. Garg, “Efficient Rsa Variants For Resource Constrained Environment,†Secur. Commun. Networks, No. August, Pp. 1–22, 2012.

Published

2023-01-31

How to Cite

Sarumaha, D., Mohammad Andri Budiman, & Muhammad Zarlis. (2023). Performance Analysis of Hybrid Cryptographic Algorithms Rabbit Stream and Enhanced Dual RSA. Data Science: Journal of Computing and Applied Informatics, 7(1), 35-43. https://doi.org/10.32734/jocai.v7.i1-10483