An Enhanced Message Encryption Approach Using Residue Number System

dc.contributor.authorAkeem Femi Kadri
dc.contributor.authorKafayat Odunayo Tajudeen
dc.contributor.authorAyisat Wuraola Asaju-Gbolagade
dc.date.accessioned2025-03-12T14:57:22Z
dc.date.available2025-03-12T14:57:22Z
dc.date.issued2024
dc.description.abstractSafe transmission of messages over the internet is ensured by data security. The data should be protected against unauthorized access and transmitted to the legal recipient safely and formally called cryptography. The well-known cryptography types are asymmetric and symmetric and different symmetric encryption algorithms such as Advanced Encryption Standard (AES), Data Encryption Standard (DES), Blowfish were proposed to protect the confidentiality of the transmitted and stored data. However, most of these symmetric techniques are vulnerable to brute-force attack because the cipher text remains unintelligible for the original data to be found. Consequently, this challenge prompted researchers to introduce Residue Number System for encryption. RNS helps to withstand the vulnerability of the encryption algorithms in brute-force attacks making transmitted and stored data more secure. Hence, this paper introduced encryption by using RNS to improve the security of transmitted data. Traditional moduli set set {𝑚1=2𝑛−1,𝑚2= 2𝑛 𝑎𝑛𝑑 𝑚3=2𝑛+1} and Chinese Remainder Theorem (CRT) were used to encrypt and decrypt the data based on information exchange. Furthermore, this is done by representing each character in the plaintext data is assigned a unique number value and which is done by converting each character into its ASCII value and the ASCII value is then converted to Excess-3 value. Thus, anytime an attacker tries to access the data, the RNS algorithm will generate residues data, this helps to discourage an attacker from further threat. The result showed that the proposed system was able to resist brute-force attacks compared to others systems. Values of n for the moduli set were dynamic against encryption and decryption of data.
dc.identifier.citation28
dc.identifier.urihttps://kwasuspace.kwasu.edu.ng/handle/123456789/4758
dc.language.isoen
dc.publisherKasu Journal of Computer Science
dc.relation.ispartofseries1
dc.titleAn Enhanced Message Encryption Approach Using Residue Number System
dc.typeArticle
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
ME AND KAFAYAH.pdf
Size:
849.31 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description: