International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 176 - Number 15 |
Year of Publication: 2020 |
Authors: Steve Okyere-Gyamfi, J. B. Hayfron Acquah, Vivian Akoto-Adjepong |
10.5120/ijca2020920017 |
Steve Okyere-Gyamfi, J. B. Hayfron Acquah, Vivian Akoto-Adjepong . An Enhanced Asymmetric Cryptosystem using Multiple Key System. International Journal of Computer Applications. 176, 15 ( Apr 2020), 18-26. DOI=10.5120/ijca2020920017
An increase in network technology development has its own downside; thus as more connections are established with various global computer networks daily, the more exposed the connected systems are to unauthorized access, thus making security of data very important to address. Internet based transaction applications such as internet banking, online shopping, etc., involves sharing of very sensitive information between two or more parties that should be confidential. This requires very secure end-to-end connections that will ensure the data integrity, confidentiality, authenticity, etc. Cryptography is one of the most reliable and best, if not the best way to keep sensitive data from unauthorized users. This implies a good cryptosystem that maximizes security of the information been transferred and minimizes a substantial amount of delay time is needed. This is dependent on the particular cryptosystem one chooses to secure information. Also of the two known types of cryptosystems, the best in security is asymmetric cryptosystems, which uses two different keys; one for encryption and the other for decryption, whiles symmetric cryptosystems use the same key for both encryption and decryption. The essential features of asymmetric cryptosystems that determines their efficiency and security are; encryption computation time, decryption computation time, performance, encryption throughput, decryption throughput, throughput, randomness, key length and Operation per Instruction (O/I). This research seeks to examine these properties of some asymmetric cryptosystems and subsequently develop a proposed cryptosystem that is more secure and efficient. The results of this research clearly demonstrate that, the proposed cryptosystem has better results for all the properties stated above.