Enhancing the Security in Group Message Communication Using Multi-Party Key Distribution Technique
DOI:
https://doi.org/10.13052/jmm1550-4646.2051Keywords:
Key generation, encryption, decryption, authentication, N prime RSA, security analysis, hospitality industryAbstract
Authentication and authorization techniques are essential for any kind of secure transaction over the Internet. It enables and empowers mechanisms to implement highly secure systems such as digital financial transition systems, hospitality management systems, and defence organizations. Most of the work on these techniques has been done based on single-user authorization. It is less secure than the multi-user authorization technique. Multi-party settings require the authorization of the majority user pool, the work is still in its nascent stage. Hence the presented work includes a multi-user authentication technique based on the approach of arithmetic greatest common divisor. This method aims to significantly enhance the security and reliability of the authorization process. Additionally, the proposed work also presented innovative encryption and decryption techniques for the security of data transformation using a modified N prime RSA algorithm. Furthermore, this work also discussed the application of the proposed methodology in the hospitality industry to ensure the security of customer data. The results of this work indicate that the suggested techniques enhance the security of data transformation and improve the time efficiency of key generation, encryption, and decryption techniques.
Downloads
References
A. A. Hajomer, I. Derkach, N. Jain, H.-M. Chin, U. L. Andersen, T. Gehring, Long-distance continuous-variable quantum key distribution over 100-km fiber with local local oscillator, Science Advances 10 (1) (2024) eadi9474.
F. Arute, K. Arya, R. Babbush, D. Bacon, J. C. Bardin, R. Barends, R. Biswas, S. Boixo, F. G. Brandao, D. A. Buell, et al., Quantum supremacy using a programmable superconducting processor, Nature 574 (7779) (2019) 505–510.
S. B. Das, S. K. Mishra, A. K. Sahu, A new modified version of standard rsa cryptography algorithm, in: Smart Computing Paradigms: New Progresses and Challenges, Springer, 2020, pp. 281–287.
F. O. Mojisola, S. Misra, C. F. Febisola, O. Abayomi-Alli, G. Sengul, An improved random bit-stuffing technique with a modified rsa algorithm for resisting attacks in information security (rbmrsa), Egyptian Informatics Journal (2022).
N. M. Al-Jubouri, R. J. S. Al-Janabi, Secure rsa cryptosystem based on multiple keys, Journal of Al-Qadisiyah for computer science and mathematics 13 (3) (2021) Page–25.
G. Kbar, W. Mansoor, Modified rsa using triple keys based encryption/decryption, Jordan Journal of Electrical Engineering. All rights reserved-Volume 7 (1) (2021).
B. B. Ahamed, M. Krishnamoorthy, Sms encryption and decryption using modified vigenere cipher algorithm, Journal of the Operations Research Society of China (2020) 1–14.
M. Wasim, P. Paul, Implementing the information security using modified rsa algorithm with the help of n prime number, International Journal of Innovative Research in Computer and Communication Engineering 4 (10) (2016) 18055–18062.
R. Ghosh, An efficient and robust modified rsa based security algorithm in modern cryptography, Journal of Computer Science Engineering and Information Technology Research (JCSEITR) 6 (2) (2016) 15–22.
N. Kumar, P. Chaudhary, Implementation of modified rsa cryptosystem for data encryption and decryption based on n prime number and bit stuffing, in: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, 2016, pp. 1–6
W.-K. Yu, N. Wei, Y.-X. Li, Y. Yang, S.-F. Wang, Multi-party interactive cryptographic key distribution protocol over a public network based on computational ghost imaging, Optics and Lasers in Engineering 155 (2022) 107067.
C. Wang, H. Zhu, A secure centralized multi-party quantum key distribution protocol with new encoding mode, International Journal of Theoretical Physics 62 (6) (2023) 128.
S. Kumar, D. Kumar, Securing of cloud storage data using hybrid aes-ecc cryptographic approach, Journal of Mobile Multimedia (2023) 363–388.
Z. Ashraf, A. Sohail, M. Yousaf, Robust and lightweight symmetric key exchange algorithm for next-generation ioe, Internet of Things 22 (2023) 100703.
V. Lovic, Quantum key distribution: Advantages, challenges and policy (2020).
S. Kleis, C. G. Schaeffer, Improving the secret key rate of coherent quantum key distribution with bayesian inference, Journal of Lightwave Technology 37 (3) (2018) 722–728.
Y. Kang, S. Kanwal, B. Liu, D. Zhang, Ghost key distribution under mutual authentication mechanism, Information Sciences 640 (2023) 119025.
Y. Ramadhan, S. Suhardi, Y. Aditama, Data security using low bit encoding algorithm and rsa algorithm, Jurnal Mantik 8 (1) (2024) 16–25.
S. P. Jadhav, Towards light weight cryptography schemes for resource constraint devices in iot, Journal of Mobile Multimedia (2019) 91–110.
J.-W. Zhang, G. Xu, X.-B. Chen, Y. Chang, Z.-C. Dong, Improved multiparty quantum private comparison based on quantum homomorphic encryption, Physica A: Statistical Mechanics and its Applications 610 (2023) 128397.
S. Bhasin, J.-P. D’Anvers, D. Heinz, T. Pöppelmann, M. Van Beirendonck, Attacking and defending masked polynomial comparison for lattice-based cryptography, IACR Transactions on Cryptographic Hardware and Embedded Systems (2021) 334–359.
W.-K. Yu, Y. Yang, Y.-X. Li, N. Wei, S.-F. Wang, Multi-party cryptographic key distribution protocol over a public network based on a quick-response code, Sensors 22 (11) (2022) 3994.
F. O. Mojisola, S. Misra, C. F. Febisola, O. Abayomi-Alli, G. Sengul, An improved random bit-stuffing technique with a modified rsa algorithm for resisting attacks in information security (rbmrsa), Egyptian Informatics Journal 23 (2) (2022) 291–301.
J. K. Dawson, F. Twum, J. B. Hayfron-Acquah, Y. M. Missah, B. B. K. Ayawli, An enhanced rsa algorithm using gaussian interpolation formula, International Journal of Computer Aided Engineering and Technology 16 (4) (2022) 534–552.
F. Zhao, J. Guo, L. Zhang, W. Han, Research on improved double rsa algorithm based on rsa, in: International Conference on Computer Engineering and Networks, Springer, 2022, pp. 1204–1211.
H. Nejatollahi, N. Dutt, S. Ray, F. Regazzoni, I. Banerjee, R. Cammarota, Post-quantum lattice-based cryptography implementations: A survey, ACM Computing Surveys (CSUR) 51 (6) (2019) 1–41.
M. Gayathri, C. Malathy, A deep learning framework for intrusion detection and multimodal biometric image authentication, Journal of Mobile Multimedia (2022) 393–420.
R. Omollo, A. Okoth, Factorization algorithm for semi-primes and the cryptanalysis of rivest-shamir-adleman (rsa) cryptography, Asian Journal of Research in Computer Science 17 (6) (2024) 85–95.
J. Jin, K. Kim, 3d cube algorithm for the key generation method: applying deep neural network learning-based, IEEE Access 8 (2020) 33689–33702.
J. Shi, S. Chen, Y. Lu, Y. Feng, R. Shi, Y. Yang, J. Li, An approach to cryptography based on continuous-variable quantum neural network, Scientific reports 10 (1) (2020) 1–13.
P. E. Frenkel, J. Pelik´an, On the greatest common divisor of the value of two polynomials, The American Mathematical Monthly 124 (5) (2017) 446–450.
S. Nasreen, A. H. Mir, Enhancing cloud forensic investigation system in distributed cloud computing using dk-cp-ecc algorithm and ek-anfis, Journal of Mobile Multimedia (2023) 679–706.
S. Deshpande, S. M. del Pozo, V. Mateu, M. Manzano, N. Aaraj, J. Szefer, Modular inverse for integers using fast constant time gcd algorithm and its applications, in: 2021 31st International Conference.
D. M. Ghadi, Improving the robustness of rsa encryption through input-based key generation., Mathematical Modelling of Engineering Problems 11 (1) (2024).
J. Liu, Y. Yu, B. Yang, J. Jia, Q. Lai, Cryptanalysis of cramershoup like cryptosystems based on index exchangeable family, International Journal of Foundations of Computer Science 32 (01) (2021) 73–91.
S. Basu, M. Kule, H. Rahaman, Implementation of symmetric functions using memristive nanocrossbar arrays and their application in cryptography, Journal of Circuits, Systems and Computers 30 (12) (2021) 2150223.
M. Rashid, M. Imran, A. R. Jafri, T. F. Al-Somani, Flexible architectures for cryptographic algorithms—a systematic literature review, Journal of Circuits, Systems and Computers 28 (03) (2019) 1930003.
X. Shang, W. Shan, X. Liu, Design and implementation of a reconfigurable cryptographic coprocessor with multiple side-channel attacks countermeasures, Journal of Circuits, Systems and Computers 27 (11) (2018) 1850180.
A. K. Tripathy, P. K. Tripathy, N. K. Ray, S. P. Mohanty, itour: The future of smart tourism: An iot framework for the independent mobility of tourists in smart cities, IEEE consumer electronics magazine 7 (3) (2018) 32–37.
S.-N. Cheong, H.-C. Ling, P.-L. Teh, Encrypted steganography quick response scheme for unified hotel access control system, in: 2021 IEEE 11th International Conference on System Engineering and Technology (ICSET), IEEE, 2021, pp. 303–308.
Y. Ge, W. Xu, L. Zhang, Integrative security protection system for full life cycle of big data based on sm crypto algorithm, in: InternationalConference on Algorithms, High Performance Computing, and Artificial Intelligence (AHPCAI 2021), Vol. 12156, SPIE, 2021, pp. 396–402.
M. Verma, Implementation of blockchain-based technique to a hostel room booking system: practical aspects, International Journal for Research in Applied Science and Engineering Technology 9 (5) (2021) 1–4.
A. K. Sahu, A. Gutub, Improving grayscale steganography to protect personal information disclosure within hotel services, Multimedia Tools and Applications 81 (21) (2022) 30663–30683.
M. Dammak, S. Aroua, S. M. Senouci, Y. Ghamri-Doudane, G. Suciu, M.-A. Sachian, R. Roscaneanu, M. O. Gungor, et al., A secure and interoperable platform for privacy protection in the smart hotel context, in: 2020 Global Information Infrastructure and Networking Symposium (GIIS), IEEE, 2020, pp. 1–6.
J. T. Wosu, G. C. Ononiwu, T. C. Oguichen, O. Opara, Development of embedded iot-enabled database management system for improved hotel room reservation accountability. “International Journal of Scientific Engineering and Science”, 3 (5), 2019, pp. 36–42.



