Optimized Rivest, Shamir and Adleman (RSA) for Network Inter-Layer Communication
Main Article Content
Abstract
This paper examines the use of Optimized Rivest, Shamir and Adleman (RSA) for Network Inter-Layer Communication. RSA is an algorithm used for secure data transmission which is based on the difficulty of factoring large prime numbers. It is an efficient public-key cryptography method used for authenticating messages and digital signatures. We examine the performance of RSA in network inter-layer communication and compare it to other methods. To achieve this appropriate key sizes of AES- 256 bits to balance security and performance were chosen for a good balance between security and performance. Key Generation, load balancing and performance monitoring were also considered to fine-tune the implementation using this optimization technique. Our results show that RSA performs well in terms of both security and performance, making it a viable choice for secure network inter-layer communication. The computational complexity of RSA encryption is greatly reduced, according to simulation results, using the suggested approach. Overall, the suggested method enhances the RSA cryptographic protocol's functionality when used for inter-layer communication in networked systems. The findings demonstrated that RSA had a faster encryption time than AES, leading to a high throughput for the RSA approach.
Downloads
Article Details
References
Abdeldaym, R. S., Abd Elkader, H. M., & Hussein, R. (2019). Modified RSA algorithm using two public key and Chinese remainder theorem. IJ of Electronics and Information Engineering, 10(1), 51-64.
Al Busafi, S., & Kumar, B. (2020, December). Review and Analysis of Cryptography Techniques. In 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART) (pp. 323-327). IEEE.
Jintcharadze, E., & Iavich, M. (2020, September). Hybrid implementation of Twofish, AES, ElGamal and RSA cryptosystems. In 2020 IEEE East-West Design & Test Symposium (EWDTS) (pp. 1-5). IEEE.
Jirwan, N., Singh, A., & Vijay, S. (2013). Review and analysis of cryptography techniques. International Journal of Scientific & Engineering Research, 4(3), 1-6.
Lindquist, D. (2020). Does Internet Use Reduce Birth Rates?: A Cross-Country Study of 44 Lower-Middle-Income Countries Between 2000 and 2017.
Mallouli, F., Hellal, A., Saeed, N. S., & Alzahrani, F. A. (2019, June). A survey on cryptography: comparative study between RSA vs ECC algorithms, and RSA vs El-Gamal algorithms. In 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) (pp. 173-176). IEEE.
Marcon, Y., Bishop, T., Avraam, D., Escriba-Montagut, X., Ryser-Welch, P., Wheater, S., ... & González, J. R. (2021). Orchestrating privacy-protected big data analyses of data from different resources with R and DataSHIELD. PLoS computational biology, 17(3), e1008880.
Nepal, S. (2010). Enhanced Security Encryption for Data Storage Using Multiple Keys (Doctoral dissertation, Department of Computer Science and Information Technology).
Nisha, S., & Farik, M. (2017). RSA Public Key Cryptography Algorithm. A Review. International Journal of Scientific and Technological Research, 6, 187-191.
Perwej, Y., Abbas, S. Q., Dixit, J. P., Akhtar, N., & Jaiswal, A. K. (2021). A systematic literature review on the cyber security. International Journal of scientific research and management, 9(12), 669-710.
Rahim, R., & Ikhwan, A. (2016). Cryptography technique with modular multiplication block cipher and playfair cipher. Int. J. Sci. Res. Sci. Technol, 2(6), 71-78.
Saho, N. J. G., & Ezin, E. C. (2020, October). Comparative study on the performance of elliptic curve cryptography algorithms with cryptography through RSA algorithm. In CARI 2020-Colloque Africain sur la Recherche en Informatique et en Mathématiques Apliquées.
Sari, I. C., Zarlis, M., & Tulus, T. (2020, February). Optimization of data encryption modeling using RSA cryptography algorithm as security e-mail data. In Journal of Physics: Conference Series (Vol. 1471, No. 1, p. 012068). IOP Publishing.
Sarkar, A., Chatterjee, S. R., & Chakraborty, M. (2021). Role of cryptography in network security. The" Essence" of Network Security: An End-to-End Panorama, 103-143.
Sharma, M. (2018). Review on Cryptography in Network security. International of Engineering Research and Technology, 2(3).
Sihotang, H. T., Efendi, S., Zamzami, E. M., & Mawengkang, H. (2020, November). Design and implementation of Rivest Shamir Adleman’s (RSA) cryptography algorithm in text file data security. In Journal of Physics: Conference Series (Vol. 1641, No. 1, p. 012042). IOP Publishing.
Subedar, Z., & Araballi, A. (2020). Hybrid cryptography: Performance analysis of various cryptographic combinations for secure communication. International Journal of Mathematical Sciences and Computing (IJMSC), 6(4), 35-41.
Zaw, T. M., Thant, M., & Bezzateev, S. V. (2019, June). Database security with AES encryption, elliptic curve encryption and signature. In 2019 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF) (pp. 1-6). IEEE.
 
								