Hybrid Algorithm using Rivest-Shamir-Adleman and Elliptic Curve Cryptography for Secure Email Communication

被引:0
作者
Assa-Agyei, Kwame [1 ]
Owa, Kayode [1 ]
Al-Hadhrami, Tawfik [1 ]
Olajide, Funminiyi [2 ]
机构
[1] Nottingham Trent Univ, Sch Sci & Technol, Nottingham, England
[2] Univ Westminster, Sch Comp Sci & Engn, London, England
关键词
RSA; ECC; Advanced Encryption Standard; encryption; decryption; signature generation; verification; key exchange time; hybrid encryption;
D O I
10.14569/IJACSA.2024.01504105
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Email serves as the primary communication system in our daily lives, and to bolster its security and efficiency, many email systems employ Public Key Infrastructure (PKI). However, the convenience of email also introduces numerous security vulnerabilities, including unauthorized access, eavesdropping, identity spoofing, interception, and data tampering. This study is primarily focused on examining how two encryption techniques, RSA and ECC, affect the efficiency of secure email systems. Furthermore, the research seeks to introduce a hybrid cryptography algorithm that utilizes both RSA and ECC to ensure security and confidentiality in the context of secure email communication. The research evaluates various performance metrics, including key exchange time, encryption and decryption durations, signature generation, and verification times, to understand how these encryption methods affect the efficiency and efficacy of secure email communication. The experimental findings highlight the advantages of ECC in terms of Key Exchange Time, making it a compelling choice for establishing secure email communication channels. While RSA demonstrates a slight advantage in encryption, decryption, and signature generation for smaller files, ECC's efficiency becomes apparent as file sizes increase, positioning it as a favorable option for handling larger attachments in secure emails. Through the comparison of experiments, it is also concluded that the hybrid encryption algorithm optimizes the key exchange times, encryption efficiency, signature generation and verification times.
引用
收藏
页码:1037 / 1047
页数:11
相关论文
共 33 条
[1]  
Abobeah R. M., 2015, Int. J. Comput. Networks Appl., V2, P64
[2]  
Ahmed S., 2022, Int. J. Sci. Res. Publ., P161, DOI [10.29322/ijsrp.12.07.2022.p12720, DOI 10.29322/IJSRP.12.07.2022.P12720]
[3]  
Al Busafi Samya, 2020, Proceedings of the 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART), P323, DOI 10.1109/SMART50582.2020.9336792
[4]   Elasticity in Cloud Computing: State of the Art and Research Challenges [J].
Al-Dhuraibi, Yahya ;
Paraiso, Fawaz ;
Djarallah, Nabil ;
Merle, Philippe .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2018, 11 (02) :430-447
[5]   Phishing Attacks: A Recent Comprehensive Study and a New Anatomy [J].
Alkhalil, Zainab ;
Hewage, Chaminda ;
Nawaf, Liqaa ;
Khan, Imtiaz .
FRONTIERS IN COMPUTER SCIENCE, 2021, 3
[6]   A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions [J].
Aslan, Omer ;
Aktug, Semih Serkant ;
Ozkan-Okay, Merve ;
Yilmaz, Abdullah Asim ;
Akin, Erdal .
ELECTRONICS, 2023, 12 (06)
[7]  
Bafandehkar M, 2013, INT CONF IT CONVERGE
[8]   Comparison of ECC and RSA Algorithm with DNA Encoding for IoT Security [J].
Bansal, Malti ;
Gupta, Shubham ;
Mathur, Siddhant .
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, :1340-1343
[9]   Scalable Implementation of Array of 8-bit-Based RSA With Large Key Size [J].
Boussif, Mohamed .
PROCEEDINGS OF THE 2022 5TH INTERNATIONAL CONFERENCE ON ADVANCED SYSTEMS AND EMERGENT TECHNOLOGIES IC_ASET'2022), 2022, :375-380
[10]  
Dubai M. J., 2011, 2011 3rd International Conference on Electronics Computer Technology (ICECT 2011), P99, DOI 10.1109/ICECTECH.2011.5941965