09 - Chapter 5
09 - Chapter 5
09 - Chapter 5
CHAPTER 5
5.1 INTRODUCTION
The chapter deals with RSA algorithms steps and contributions of the
proposed method in sections 5.1 and 5.2. Enhanced and modified RSA
cryptosystem key generation, encryption, decryption steps are discussed in
sections 5.2 and 5.3. Experimental results and performance evaluation of the
proposed algorithm, comparative analysis against security
attacks are explained in the later sections. Finally, a summary of the work is
discussed.
Figure 5.1 shows the overall public key cryptographic process. Here,
key value is playing a major role. It is used to convert plaintext into cipher text
and vice-versa. Cryptography uses two keys are private key, and the public key.
Anyone with the public key can send an encrypted message to the corresponding
communicating party. However, the receiver only can decrypt the received
message with his private key. Based on the key-value, cryptographic process is
divided into two types that are symmetric key cryptography and asymmetric key
cryptography. Symmetric key cryptography refers to the process of encryption
and decryption depending on only one key. Similarly, asymmetric key
cryptography refers to the process of encryption and decryption depending on
private and public key.
Step 3: M‟= M e mod n; M‟ cipher text, M plain text, Public key (e, n) (5.4)
It takes two prime numbers and calculates the n, pi(n) value. Then “e”
is a public key value, and it can be chosen by the user who chooses it.
The private key value is “d” is calculated from Equation (5.3). The encryption
and decryption process is done with the help of Equations (5.4) and (5.5).
A. Advantages
It uses complex mathematics, and is safe and secure in digital
information transmission.
RSA involves the factorization of prime numbers. It is very hard to
break.
RSA uses a public key for the encryption process, and it is easy to
share the public key.
B. Disadvantages
RSA algorithm becomes very slow when very large data need to be
encrypted.
Public key reliability verification is required with the help of a third
party.
The known public key attracts the attacker to break the cipher text
into plaintext.
C. Applications
In the present days, RSA is used in many commercial applications
(Sangwon et al. 2020). Web servers and browsers use RSA to ensure security in
the web traffic. It provides email authenticity and privacy, and Remote login
sessions in various business applications that depend on RSA for secure
transmission. It is used to secure payment transactions in electronic credit cards.
5
Step 4: Choose random variable “e” value and “e” is public key
value
Step 5: “e” is a public key, “d “is a private key is calculate by
the following expression
d*e mod Pi(n)=1 (5.8)
6
d QK
Step 8: Decryption Process M=(C mod (n)) mod n (5.10)
The proposed system consists of three major processes. They are as follows
Key generation
Encryption
Decryption
Figure 5.2 shows the process flow of the proposed method. In the first
step, four prime numbers are selected to provide high confidentiality in the body
sensed data transmission. Then, the n value is calculated using Equation (5.6).
7
Later, Pi (n) is computed using Equation (5.7). Here, "e" is a public key value,
and "d" is a private key value. The public-key value is chosen, and the private
key value is derived from Equation (5.8). Secret quantum key QK is generated
based on EBB84QCP. The encryption and decryption process is done by using
Equations (5.9) and (5.10).
Four prime numbers are chosen for key generation, encryption and
decryption process Kapoor (2018). Here sensitive information transmission
depends on these prime numbers and in process of the factorization and
multiplication operations.
No
YES
Compare and find
out the matched
bits from qubit and checkbit
Frame the quantum key value Ignore not matched Alice’s qubit and Bob’s checkbit values
XOR -operation
Not matched Alice’s qubit in the quantum key generation process
FigureKey
Secret quantum 5.3forQuantum key generation process
encryption and
decryption process
8
n=p∗q∗r∗s (5.6)
Step 2: Binary value with quantum basis comparison produces the qubit value.
Step 3: Receiver (Bob)can select their quantum basis and random binary
value.
Step 4: Receiver's binary value with quantum basis comparison produces the
check bit value.
Step 5: Now, qubit and check bits are compared and frame the matched bits.
Step 6: Matched bits and Sender's unmatched bits performs the bitwise
operator. This process frames the secret quantum key for secure
communication.
5.3.2 EMRSACS-Encryption
5.3.3 EMRSACS-Decryption
The decryption takes cipher text, private key value, quantum key
value as the inputs. This process converts cipher text into plaintext by using
Equation (5.10). Modulus operation has been performed in the process.
The proposed system takes key size values are 64, 96,150,208,298
bits for key generation, encryption, and decryption process. The performance of
proposed method is assessed by key generation time, encryption time and
decryption time, memory requirements, total execution time and energy
consumption. The security of the proposed system is evaluated against the brute
force attacks, timing attacks and mathematical attacks.
800
600 Proposed-EMRSACS
400 Key generation time (ms)
RSA Key generation time (ms)
200
0
64 96 150 208298
Key size(bits)
Figure 5.4 shows the key generation time of the RSA and
EMRSACS. As the key size and their computational are too complex, the
security also increases. The proposed system's time requirements for key
generation will be larger when compared to RSA.
11
The key generation process contains three different keys, and the first
key is a public key where the user can choose a key value. The second key is the
private key. This key is calculated with the help of Equation (5.8), and finally,
secret the quantum key is generated using the quantum mechanism and bitwise
operator. Key generation is essential for the encryption and decryption process.
The proposed system provides strong keys for the secure transmission of human
body physiological sensed data in medical healthcare applications. The proposed
method takes more time for key generation compared to RSA.
Table 5.2 and Figure 5.5 shows the cryptographic keys in different
sizes and corresponding encryption time. Here, RSA and EMRSACS algorithm's
encryption time is represented in milliseconds. Various key sizes 64, 96, 150,
208, 298 bits are taken for the experiment. In comparison to RSA,
the proposed EMRSACS takes more time for encryption. The encryption time is
the time required to convert the plaintext into cipher text. The conventional RSA
system encryption depends on the public, private, prime numbers factorization,
and mathematical functions. It takes less time for encryption compared to
proposed method.
12
The proposed method takes a value for the public key for
the encryption process to deliver sensitive information and provides strong
security for the encryption process with the quantum key value. The proposed
system uses the public key value, secret quantum key for encryption and secure
transmission. The proposed encryption method is not easily breakable by the
attackers.
2000 Proposed-EMRSACS
1000 RSA
0
6496150208298
Key size(bits)
It takes too long for selecting public key values by the user. The key
generation part is the core of the EMRSACS cryptographic process, and it takes
more time. The proposed method contains the secret quantum key value for
the encryption process.
decryption speed. Here, key length and complex operation in the encryption
directly affects the time requirements.
The proposed method contains the quantum key value for the
encryption and decryption process. Even attackers can take the public key from
the internet, but they cannot use that public key to break the security of the
system. EMRSACS is more secure for sensitive information transmission in the
wireless link.
Encryption time depends on the key size. A small key-value takes less
encryption time. Still, security about the data transmission is deficient.
The proposed method consists of a larger key value because security is more
important for handling the human body physiological sensed data for treatment
in the remote platform. Data encryption takes more time, but strong security is
assured in the proposed system via secret quantum key and four prime numbers
mathematical calculations.
5000
4000 Proposed-EMRSACS
3000 RSA
2000
1000
0
6496 150 208 298
Key size(bits)
If the cryptographic process takes a small value for the public key,
it makes faster encryption and decryption. However, weak keys are not suitable
for sensitive data transmission in the wireless link. Communicating parties share
their quantum key before the data transmission. It can help decrypt the data
faster, and this key value is not breakable by any attacker.
Decryption time depends on key size and input file size. If the small
prime numbers such as p, q, r s is selected for designing the key, then the
decryption process becomes too weak. If large prime numbers such as p, q, r, s
15
are chosen for designing the key, decryption consumes more time and
performance is degraded. The proposed scheme key size is large and a secret
quantum key is used for the encryption and decryption process. Here security
requirements are satisfied.
The proposed method EMRSACS takes more time for the decryption
process than RSA. Remote monitoring and treatments in medical healthcare
applications need more security requirements. All health-related services must
guarantee with their patients regarding the security of the data transmission.
The EMRSACS fulfills those requirements.
Memory space is needed for the whole cryptographic process with the
key size 298 bits in RSA is 67.50 KB, and EMRSACS is 121.23 KB. Table 5.4
shows the memory requirement of RSA and EMRSACS. Here, the EMRSACS
key generation process depends on the modular operation and complexity of the
sub modules used, whereas encryption techniques in EMRSACS depend on
modular multiplication using squaring and multiply procedures and secret
quantum keys to get the cipher text value.
E=V*I*T (5.11)
Table 5.6 shows that the proposed method takes more energy for the
total execution of cryptographic process because four prime numbers and their
mathematical calculations have taken more energy than RSA. If EMRSACS key
generation process is strong, then the vulnerabilities of attacks in the WBSN
may be not possible. Therefore, the proposed system takes more energy to
provide strong confidentiality in the WBSN.
Table 5.7 shows the comparison of security attacks in the RSA and
EMRSACS. Brute force attacks, timing attacks, and mathematical attacks affect
the RSA. The proposed system contains strong methods to avoid those attacks.
The proposed system is suitable for sensitive information communication.
Prime numbers p and q are the serious concern of the RSA system.
Mathematical attackers can try to catch the prime numbers in the cryptosystem.
Weak points in the mathematical background of the RSA system are
multiplication of prime numbers, factorization of prime numbers and prime
number selection. In the conventional RSA system, Multiplication and
factorization of two prime numbers are easily breakable. The proposed method
consists of the multiplication and factorization of four prime numbers. The
method to break this system is too complex. The proposed method provides
more security and confidentiality about the data transmission.
5.7 SUMMARY