Hybrid of asymmetric cryptography (RSA) and symmetric cryptography (OTP)
Keywords:
Cryptography, RSA, One Time Pad, Hybrid Algorithm, Symmetric Cryptography, Asymmetric Cryptography, Double cipher textAbstract
Cryptography is a science-art that makes communication and messages more secure on the communication media, especially for state security, and business security and personal security. In the industrial revolution 4.0, security is a key to make communication more secure and the integrity and availability of data. The combination of symmetric cryptography and symmetric cryptography, symmetric cryptography and asymmetric cryptography, asymmetric cryptography and asymmetric cryptography is the main subjective to concern on security today. One of those combinations is a hybrid algorithm which is made up of asymmetric cryptography (RSA) and symmetric cryptography (OTP). It will strengthen the secureness of communication and data. This study will propose an Algorithm scheme to increase the security of cryptography. The result of the hybrid Algorithm shows steps to encrypt and decrypt the message: First of all, the sender encrypts the block of a message with the RSA public key and then generates the OTP key to encrypt this block of message again to obtain the double ciphertext from the same plaintext and then send it to the receiver. Finally, the receiver decrypts it with the OTP key and then the RSA private key. Therefore, we can say that the security of this proposed hybrid algorithm is more highly secured and guaranteed because of covering the weakness of the RSA cryptography. In conclusion, Section V describes the hybrid algorithm is highly secured and unbreakable.
References
Behrouz A. Forouzan, “Data Communication and Networking”, fifth edition, pp44-46, 2013.
James F. Kurose and Keith W. Ross, “Computer Networking: A Top-Down Approach Featuring the Internet”, pp 214-215, 2000.
M G Ristiana, R Marwati and S M Gozali, “Hybrid algorithm of RSA and one time pad cryptography”, 2019.
Shyam Nandan Kumar, “ Review on Network Security and Cryptography”, International Transaction of Electrical and Computer Engineers System, 2015, Vol. 3, No. 1, 1-11, 2015.
Nitin R. Mise, and H. C. Srinivasaiah, “A Mathematical Attack Based Algorithm to Challenge the Security of RSA Cryptosystem”, International Journal of Advancements in Research & Technology, Volume 2, Issue 6, June-2013 202 ISSN 2278-7763.
Muhammad Iqbal, Muhammad Akbar Syahbana Pane,Andysah Putera Utama Siahaan, “SMS EncryptionUsing One-Time Pad Cipher” , IOSR Journal of Computer Engineering (IOSR-JCE),2016.
Xiaoying Ye,Chenglian Liu, Donald Gardner3, “Weakness of RSA Cryptosystem Characteristic”, International Conference of Computational Methods in Sciences and Engineering 2018 (ICCMSE 2018).
Jon Postel,"Transmission Control Protocol," RFC 793,1981.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.