Browsing by Author "Dawson, John Kwao"
Now showing 1 - 3 of 3
Results Per Page
Sort Options
- ItemAn enhanced RSA algorithm using Gaussian interpolation formula(Int. J. Computer Aided Engineering and Technology, 2022) Dawson, John Kwao; Twum, Frimpong; Missah, Yaw Marfo; Acquah-Hayfron, James Benjamin; Ayawli, Ben Beklisi Kwame; 0000-0002-7436-5550; 0000-0002-1869-7542; 0000-0002-2926-681X; 0000-0001-6935-9431; 0000-0002-1550-184XData security is a crucial concern that ought to be managed to help protect vital data. Cryptography is one of the conventional approaches for securing data and is generally considered a fundamental data security component that provides privacy, integrity, confidentiality and authentication. In this paper, a hybrid data security algorithm is proposed by integrating traditional RSA and Gaussian interpolation formulas. The integration raises the security strength of RSA to the fifth degree. The Gaussian first forward interpolation is used to encrypt the ASCII values of the message after which the traditional RSA is used to encrypt and decrypt the message in the second and third levels. The last stage employs Gaussian backward interpolation to decrypt the data again. The integration helps to cater to the factorisation problem of the traditional RSA. Comparative analysis was performed using four different algorithms: RSA, SRNN, two-key pair algorithms and the proposed algorithm. It is proven that when the data size is small, the encryption and decryption times are lower for the proposed algorithm but higher when the data size is big.
- ItemEnsuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme(PLOS One, 2023-02-09) Dawson, John Kwao; Twum, Frimpong; Hayfron-Acquah, James Benjamin; Missah, Yaw Marfo; 0000-0002-7436-5550; 0000-0002-1869-7542; 0000-0001-6935-9431; 0000-0002-2926-681XThe amount of data generated by electronic systems through e-commerce, social networks, and data computation has risen. However, the security of data has always been a challenge.The problem is not with the quantity of data but how to secure the data by ensuring its confi dentiality and privacy. Though there are several research on cloud data security, this study proposes a security scheme with the lowest execution time. The approach employs a non linear time complexity to achieve data confidentiality and privacy. A symmetric algorithm dubbed the Non-Deterministic Cryptographic Scheme (NCS) is proposed to address the increased execution time of existing cryptographic schemes. NCS has linear time complex ity with a low and unpredicted trend of execution times. It achieves confidentiality and pri vacy of data on the cloud by converting the plaintext into Ciphertext with a small number of iterations thereby decreasing the execution time but with high security. The algorithm is based on Good Prime Numbers, Linear Congruential Generator (LGC), Sliding Window Algorithm (SWA), and XOR gate. For the implementation in C#, thirty different execution times were performed and their average was taken. A comparative analysis of the NCS was performed against AES, DES, and RSA algorithms based on key sizes of 128kb, 256kb, and 512kb using the dataset from Kaggle. The results showed the proposed NCS execution times were lower in comparison to AES, which had better execution time than DES with RSA having the longest. Contrary, to existing knowledge that execution time is relative to data size, the results obtained from the experiment indicated otherwise for the proposed NCS algorithm. With data sizes of 128kb, 256kb, and 512kb, the execution times in milliseconds were 38, 711, and 378 respectively. This validates the NCS as a Non-Deterministic Cryptographic Algorithm. The study findings hence are in support of the argument that data size does not determine the execution time of a cryptographic algorithm but rather the size of the security key.
- ItemReconnoitering Security Algorithms Performance in the Cloud: Systematic Literature Review based on the Prisma Archetype(Journal of Theoretical and Applied Information Technology, 2023-03-31) Dawson, John Kwao; Twum, Frimpong; Hayfron-Acquah, James Benjamin; Missah, Yaw Marfo; 0000-0002-7436-5550; 0000-0002-1869-7542; 0000-0001-6935-9431; 0000-0002-2926-681XIndustries and academia have embraced cloud computing for their day-to-day activities. A lot of studies have been done to unpin variants of cryptographic algorithms used to secure the cloud. This survey aims to unravel recent studies of the most employed cryptographic scheme used to secure the cloud, the type of cryptographic algorithms used, the execution time trend of the cryptographic algorithms (Linear time / Non-Linear time), the aims of these cryptographic algorithms, and identify some of the security concerns in cloud computing. The study considered published studies from 2015 to 2022 from well-known databases such as Taylor and Francis, Scopus, Research Gate, Web of Science, IEEE Xplore, Science Direct, Hindawi, Google Scholar, and ACM. A total of 72 published articles were considered to respond to the various specific objectives using the Prisma framework. The systematic literature review has revealed the usage of encryption schemes as the most employed cryptographic approach and data security and cloud security as the most researched security challenge. The security challenges that were identified are data integrity and preservation, intrusion detection, and privacy and confidentiality. It has been revealed that from 2015 to 2022, 90% of encryption algorithms depict linear time complexity. The systematic literature review has proven little usage of symmetric stream cipher algorithms to ensure the privacy and confidentiality of cloud data.