Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi

Husairi, Nurul Syazwani and Mohd Fauzi, Nurul Aqilah (2023) Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi. [Student Project] (Unpublished)

Abstract

El Gamal ciphertext cryptosystem is one of the fluently used algorithms to satisfy the security message or data transmission. Even though this algorithm alone can satisfy the need of ciphertext cryptosystem, it is vulnerable to numerous internal and external attackers such as logjam and dictionaries attack. So, in order to cover this disadvantage, the modification of El Gamal algorithm with application of Mellin-Kamal transformation was proposed in this study. Our main objective is to compute encryption process and develop decryption schemes using Mellin Transformation and to modify the basic El Gamal system with the application of Mellin-Kamal Transformation. On this proposed scheme, the Mellin transformation is applied on encryption and decryption process and the ciphertext obtained from applied Mellin theorem will then be used as message in Mellin-Kamal cryptosystem. This approach successfully in preventing vulnerable threats and enhance the security through the proposed scheme. Cryptographers often face a problem on key distribution process because of the existent exponential powers and modular multiplication that slower the progress. Other than that, on their proposed scheme, which is Mellin transformation scheme, Bhatti et al. (2020) seem to make the working progress in a rush which result in an uncompleted progression. So, this study contributed to show a complete calculation and working to assist other future researchers know the complete step of the proposed scheme and reduce the probability of middle attackers and strengthen the existing algorithm with several cryptosystem integration. In the further, this study can be applied on asymmetric cryptosystem by taking a large prime number and finite arrangement. Lastly, to recognize the accessibility of the proposed scheme, it can be applied on another existing cryptosystems such as digital signature schemes.

Metadata

Item Type: Student Project
Creators:
Creators
Email / ID Num.
Husairi, Nurul Syazwani
UNSPECIFIED
Mohd Fauzi, Nurul Aqilah
UNSPECIFIED
Subjects: L Education > LB Theory and practice of education > Higher Education > Dissertations, Academic. Preparation of theses
Divisions: Universiti Teknologi MARA, Negeri Sembilan > Seremban Campus
Programme: Bachelor of Science (Hons.) (Mathematics)
Keywords: Mellin transformation, El Gamal algorithm, Kamal transformation
Date: 2023
URI: https://ir.uitm.edu.my/id/eprint/93554
Edit Item
Edit Item

Download

[thumbnail of 93554.pdf] Text
93554.pdf

Download (160kB)

Digital Copy

Digital (fulltext) is available at:

Physical Copy

Physical status and holdings:
Item Status:

ID Number

93554

Indexing

Statistic

Statistic details