Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography includes two phases: Encryption and Decryption. Encryption is the process of transforming plaintext to ciphertext, whereas decryption is the reverse procedure. Encryption and decryption schemes based on Sumudu Transform are unable to give more security while communicating the information. ElGamal is a public key algorithm that is based on the discrete logarithm problem. The purpose of this study is to introduce a cryptographic method that uses the ElGamal algorithm and Sumudu Transform to improve communication security.
Introduction
I. INTRODUCTION
Cryptography is a method of protecting data. In cryptography, the procedures used to protect information are based on mathematical principles and a set of rule-based calculations known as algorithms. Cryptography consists of two components: encryption and decryption. Encryption is the process of converting normal data into an unreadable format and decryption is the act of recovering the unreadable data. Cryptography is classified into three types:
In symmetric key cryptography, the same key is used for encryption and decryption. It is fast and efficient but the drawback is that the sender and receiver must exchange the keys in secure manner. DES, AES, IDEA, RC4, Blowfish, Twofish are some Symmetric key algorithms.
Asymmetric key cryptography also known as public key cryptography that uses two different keys: a public key for encryption and private key for decryption. RSA, DSA, ElGamal, Rabin, ECC are some Asymmetric key algorithms.
II. LITERATURE REVIEW
ElGamal [5] (1985) introduced a method of public key cryptosystem and signature scheme based on discrete logarithms. The security of both systems relies on the difficulty of computing discrete logarithms over finite fields.
Watugala [21] (1993) introduced Sumudu Transform to show interesting properties which makes it easy to visualize. Thus, it is an ideal transform for control engineers and applied mathematicians.
Asiru [9] (2002) discussed the general properties of the Sumudu Transform and some special functions that occur frequently in physical and engineering applications.
Allen [1] (2008) discussed the implementation of several attacks on plain ElGamal encryption and discussed attacks which rely on the underlying mathematics.
Bodkhe and Panchal [2] (2015) introduced a new cryptographic application using Sumudu transform and private key. It is very difficult to find the private key by any other attack. After producing key, they use this key for encryption and decryption that algorithm based on Sumudu transformation and modular arithmetic.
Grewal [6] (2015) discussed ElGamal System which is a public key cryptosystem based on the discrete logarithm problem. He examined its security, advantages, disadvantages and its applications.
Tayal et. al. [14] (2017) provided an overview of network security and various techniques for improving network security. They demonstrated various schemes used in cryptography for network security purposes.
Tuncay [8] (2017) analyzed security based on Sumudu Transform in cryptography and concluded that without knowing the key, the encrypted text can be decrypted.
Dissanayake [4] (2018) studied an improvement of the basic ElGamal public key cryptosystem. The public key of the ElGamal system is not changed in this method. But, the sending structure of message and the decryption process are changed. The ElGamal cryptosystem is not secure under adaptive Chosen Ciphertext Attack (CCA). This improved cryptosystem is immune against Chosen Plaintext Attack (CPA) and Chosen Ciphertext Attack (CCA) attacks. Therefore, this improved system is very suitable for small messages or key exchanges.
Mohammadi et. al. [10] (2018) compared two public key cryptosystems. They focused on the efficient implementation and analysis of the two most popular algorithms for key generation, encryption, and decryption schemes of RSA and ElGamal. RSA is based on the difficulty of prime factorization of a very large number and the ElGamal algorithms hardness is essentially equivalent to the difficulty of finding discrete logarithm modulo a large prime number. These two systems are compared in terms of various parameters such as performance, security and speed. They concluded that RSA is more efficient for encryption than ElGamal and RSA is less efficient for decryption than ElGamal.
Ranasinghe and Athukorala [13] (2020) discussed generalization of the ElGamal public key cryptosystem. They presented a generalization to the original ElGamal system which also relies on the discrete logarithm problem. The encryption process of the scheme is improved such that it depends on the prime factorization of the plaintext. If the plaintext consists of only one distinct prime factor the new method is similar to that of the basic ElGamal algorithm. The proposed system preserves the immunity against the Chosen Plaintext Attack (CPA).
Nagalakshmi et. al. [11] (2020) proposed an implementation of ElGamal scheme for Laplace transform cryptosystem. The time analysis is compared with existing algorithms and comparison reveals that the proposed cryptosystem enhances the data security.
Thakkar and Gor [15] (2021) represented a review of literature concerned with cryptographic algorithms and mathematical transformations. The review of RSA and ElGamal algorithms aids readers in better understanding the differences between the two asymmetric key cryptographic algorithms and how they work and review of mathematical transformations helps the reader to understand how mathematical transformations are used in cryptography.
Thakkar and Gor [16] (2022) developed a cryptographic method using RSA algorithm and Kamal Transform to improve security of communication. This paper provided frequency test and statistical analysis on the proposed method.
Thakkar and Gor [17] (2022) developed a cryptographic method using ElGamal algorithm and Kamal Transform to improve security of communication. The frequency test and statistical analysis on the proposed method are provided in this work.
Thakkar and Gor [18] (2022) developed a cryptographic method using the ElGamal algorithm and Mellin Transform to improve security of communication. The frequency test and statistical analysis on the proposed method are provided in this work.
Thakkar and Gor [19] (2023) developed a cryptographic method using RSA algorithm and Mellin Transform to improve security of communication. This paper provided frequency test and statistical analysis on the proposed method.
Thakkar and Gor [20] (2023) developed a cryptographic method using the RSA algorithm and Sumudu Transform to improve security of communication. The frequency test and statistical analysis on the proposed method are provided in this work.
III. PROPOSED ALGORITHM OF THE MATHEMATICAL MODEL
The proposed method is ElGamal algorithm with application of Sumudu Transform (ElGamal-ST). The proposed work is to improve security of communication. When two people want to transfer the data, they will follow the given steps for encryption and decryption.
Conclusion
Cryptography is one of the most important fundamental tools to provide security to data communication. An application of Sumudu Transform for cryptographic process is a weak scheme because encrypted data can be decrypted by elementary modular arithmetic. ElGamal is a widely used public key cryptosystem that is based on the difficulty of computing discrete logarithms over finite fields. The proposed work expands on innovative method using ElGamal algorithm with application of Sumudu Transform. It is impossible to break this method without knowing the private key. Therefore, this proposed method ElGamal-ST can provide more security of communication.
References
[1] Allen B. (2008). “Implementing several attacks on plain ElGamal encryption”, Iowa State University.
[2] Bodkhe D. S, Panchal S. K. (2015). “Use of Sumudu Transform in Cryptography”, Bulletin of the Marathwada Mathematical society, 16/2: 1-6.
[3] Debnath L. and Bhatta D. (2015). “Integral Transforms and Their Applications” (Third Edition), 978-1-4822-2358-3.
[4] Dissanayake W. D. M. G. M. (2018). “An Improvement of the Basic El-Gamal Public Key Cryptosystem”, International Journal of Computer Applications Technology and Research, 7(2), 40-44.
[5] ElGamal T. (1985). “A public key cryptosystem and a signature scheme based on discrete logarithms”, IEEE transactions on information theory, 31(4), 469-472.
[6] Grewal J. (2015). “ElGamal: Public-Key Cryptosystem”, Math and Computer Science Department, Indiana State University.
[7] Jeevitha S., Komala S., Silambarasi S., Susitha S.,Vanitha R. (2021). “An introduction of sumudu transform”, Journal of Emerging Technologies and Innovative Research (JETIR), Volume 8, Issue 7, JETIR2107602, (ISSN-2349-5162).
[8] M. Tuncay GENÇO?LU (2017). “Cryptanalysis Use of Sumudu Transform in Cryptography”, researchgate/publication/319213093.
[9] Muniru Aderemi Asiru, “Further properties of the Sumudu transform and its applications”, International Journal of Mathematical Education in Science and Technology 33 (2002).
[10] Mohammadi M., Zolghadr A., Purmina M. A. (2018). “Comparison of two Public Key Cryptosystems”, Journal of Optoelectronical Nanostructures Summer, 3(3), 47-58.
[11] Nagalakshmi G., Sekhar A. C., Sankar N. R. (2020). “An Implementation of ElGamal Scheme for Laplace Transform Cryptosystem”, International Journal of Computer Science and Engineering (IJCSE), ISSN: 2231-3850, 11(1).
[12] Paar C. and Pelzl J. (2009). “Understanding cryptography: a textbook for students and practitioners”, Springer Science & Business Media.
[13] Ranasinghe R. and Athukorala P. (2020). “A Generalization of the ElGamal public-key cryptosystem”, IACR Cryptol. ePrint Arch., 2020, 354.
[14] Tayal S., Gupta N., Gupta P., Goyal D., Goyal M. (2017). “A review paper on network security and cryptography”, Advances in Computational Sciences and Technology, 10(5), 763-770.
[15] Thakkar A. and Gor R. (2021). “A Review paper on Cryptographic Algorithms and Mathematical Transformations”, Proceeding of International Conference on Mathematical Modelling and Simulation in Physical Sciences (MMSPS), Excellent Publishers, ISBN: 978-81-928100-1-0, 324-331.
[16] Thakkar A. and Gor R. (2022). “Cryptographic method to enhance the Data Security using RSA algorithm and Kamal Transform”, IOSR Journal of Computer Engineering (IOSR-JCE), 24(3), 2022, pp. 01-07.
[17] Thakkar A. and Gor R. (2022). “Cryptographic method to enhance the Data Security using ElGamal algorithm and Kamal Transform”, IOSR Journal of Computer Engineering (IOSR-JCE), 24(3), 2022, pp. 08-14.
[18] Thakkar A. and Gor R. (2022), “Cryptographic method to enhance Data Security using ElGamal algorithm and Mellin Transform”, IOSR Journal of Mathematics (IOSR-JM), 18(6), (2022), pp. 12-18.
[19] Thakkar A. and Gor R. (2023), “Cryptographic Method to Enhance Data Security Using RSA Algorithm and Mellin Transform”, International Journal of Engineering Science Technologies (IJOEST), 7(2), pp. 63-72.
[20] Thakkar A. and Gor R. (2023), “Cryptographic method to enhance Data Security using RSA algorithm and Sumudu Transform”, Quest Journal of Research in Applied Mathematics, 9(4), pp. 48-54.
[21] Watugala G. K.: Sumudu Transform – “An Integral transform to solve differential equations and control engineering problems”, International Journal of Mathematical Education in Science and Technology, 24(1), 35 - 43, (1993).
[22] William Stallings. “Cryptography and Network Security”, ISBN 81-7758-011-6, Pearson Education, Third Edition.