An Enhanced Message Encryption Approach Using Residue Number System
dc.contributor.author | Akeem Femi Kadri | |
dc.contributor.author | Kafayat Odunayo Tajudeen | |
dc.contributor.author | Ayisat Wuraola Asaju-Gbolagade | |
dc.date.accessioned | 2025-03-12T14:57:22Z | |
dc.date.available | 2025-03-12T14:57:22Z | |
dc.date.issued | 2024 | |
dc.description.abstract | Safe transmission of messages over the internet is ensured by data security. The data should be protected against unauthorized access and transmitted to the legal recipient safely and formally called cryptography. The well-known cryptography types are asymmetric and symmetric and different symmetric encryption algorithms such as Advanced Encryption Standard (AES), Data Encryption Standard (DES), Blowfish were proposed to protect the confidentiality of the transmitted and stored data. However, most of these symmetric techniques are vulnerable to brute-force attack because the cipher text remains unintelligible for the original data to be found. Consequently, this challenge prompted researchers to introduce Residue Number System for encryption. RNS helps to withstand the vulnerability of the encryption algorithms in brute-force attacks making transmitted and stored data more secure. Hence, this paper introduced encryption by using RNS to improve the security of transmitted data. Traditional moduli set set {𝑚1=2𝑛−1,𝑚2= 2𝑛 𝑎𝑛𝑑 𝑚3=2𝑛+1} and Chinese Remainder Theorem (CRT) were used to encrypt and decrypt the data based on information exchange. Furthermore, this is done by representing each character in the plaintext data is assigned a unique number value and which is done by converting each character into its ASCII value and the ASCII value is then converted to Excess-3 value. Thus, anytime an attacker tries to access the data, the RNS algorithm will generate residues data, this helps to discourage an attacker from further threat. The result showed that the proposed system was able to resist brute-force attacks compared to others systems. Values of n for the moduli set were dynamic against encryption and decryption of data. | |
dc.identifier.citation | 28 | |
dc.identifier.uri | https://kwasuspace.kwasu.edu.ng/handle/123456789/4758 | |
dc.language.iso | en | |
dc.publisher | Kasu Journal of Computer Science | |
dc.relation.ispartofseries | 1 | |
dc.title | An Enhanced Message Encryption Approach Using Residue Number System | |
dc.type | Article |