Performance Analysis of Hybrid Cryptographic Algorithms Rabbit Stream and Enhanced Dual RSA
DOI:
https://doi.org/10.32734/jocai.v7.i1-10483Keywords:
Rabbit Stream, Enhanced Dual RSA, Cryptography, HybridAbstract
Cryptography is a technique for encoding data by encrypting plaintext into an unreadable (meaningless) form. Cryptographic methods have good and bad performance depending on the type of algorithm we use. Therefore, the purpose of this study is to measure speed by combining the two algorithms used. The Rabbit Stream algorithm is a stream cipher algorithm whose system security depends on the generation of a key bit stream (keystream), which only guarantees 128-bit key security but has the advantage of being fast in the encryption and decryption process, while the Enhanced Dual RSA algorithm is an asymmetric algorithm to increase data protection from the Dual RSA algorithm by utilizing the Pells equation as a substitute for public key exponents. On the other hand, the algorithm in question requires a significant amount of time to encrypt messages with a large capacity when compared to the Rabbit Stream algorithm. Nonetheless, the study's findings suggest that using a hybrid method is comparatively faster for processing substantial amounts of data.
Downloads
References
D. Kusumaningsih, A. Pudoli, And I. Rahmadan, “Steganografi Metode End Of File Untuk Keamanan Data,†J. Telemat. Mkom, Vol. 9, No. 1, Pp. 47–55, 2017.
S. Yakoubov, V. Gadepally, N. Schear, E. Shen, And A. Yerukhimovich, “A Survey Of Cryptographic Approaches To Securing Big-Data Analytics In The Cloud,†2014 Ieee High Perform. Extrem. Comput. Conf. Hpec 2014, 2014, Doi: 10.1109/Hpec.2014.7040943.
M. A. Habib, M. Ahmad, S. Jabbar, S. H. Ahmed, And J. J. P. C. Rodrigues, “Speeding Up The Internet Of Things: Leaiot: A Lightweight Encryption Algorithm Toward Low-Latency Communication For The Internet Of Things,†Ieee Consum. Electron. Mag., Vol. 7, No. 6, Pp. 31–37, 2018, Doi: 10.1109/Mce.2018.2851722.
M. A. Budiman, M. Y. Saputra, And Handrizal, “A Hybrid Cryptosystem Using Vigenère Cipher And Rabin-P Algorithm In Securing Bmp Files,†J. Comput. Appl. Informatics, Vol. 4, No. 2, Pp. 2016–2017, 2018, [Online]. Available: Https://Www.Data-Science.Ruhr/About_Us/.
F. Akhyar, S. M. Nasution, And T. W. Purboyo, “Rabbit Algorithm For Video On Demand,†Apwimob 2015 - Ieee Asia Pacific Conf. Wirel. Mob., Pp. 208–213, 2016, Doi: 10.1109/Apwimob.2015.7374978.
B. S. Muchlis, M. A. Budiman, And D. Rachmawati, “Teknik Pemecahan Kunci Algoritma Rivest Shamir Adleman (Rsa) Dengan Metode Kraitchik,†J. Penelit. Tek. Inform. E-Issn 2541-2019, P-Issn 2541-044x, Vol. 2, No. 2, Pp. 49–64, 2017, [Online]. Available: Http://Jurnal.Polgan.Ac.Id/Index.Php/Sinkron/Article/View/75.
Y. Funabashi, A. Shibata, S. Negoro, I. Taniguchi, And H. Tomiyama, A Dynamic Programming Algorithm For Energy-Aware Routing Of Delivery Drones, Vol. 13. 2020.
M. Boesgaard, M. Vesterager, and E. Zenner, “The rabbit stream cipher,†Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 4986 LNCS, pp. 69–83, 2008, doi: 10.1007/978-3-540-68351-3_7.
O. G. Abood And S. K. Guirguis, “A Survey On Cryptography Algorithms,†Int. J. Sci. Res. Publ., Vol. 8, No. 7, 2018, Doi: 10.29322/Ijsrp.8.7.2018.P7978.
S. Verma And D. D. Garg, “Efficient Rsa Variants For Resource Constrained Environment,†Secur. Commun. Networks, No. August, Pp. 1–22, 2012.
Published
How to Cite
Issue
Section
Copyright (c) 2023 Data Science: Journal of Computing and Applied Informatics
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
The Authors submitting a manuscript do so on the understanding that if accepted for publication, copyright of the article shall be assigned to Data Science: Journal of Informatics Technology and Computer Science (JoCAI) and Faculty of Computer Science and Information Technology as well as TALENTA Publisher Universitas Sumatera Utara as publisher of the journal.
Copyright encompasses exclusive rights to reproduce and deliver the article in all form and media. The reproduction of any part of this journal, its storage in databases and its transmission by any form or media, will be allowed only with a written permission fromData Science: Journal of Informatics Technology and Computer Science (JoCAI).
The Copyright Transfer Form can be downloaded here.
The copyright form should be signed originally and sent to the Editorial Office in the form of original mail or scanned document.