Abstract
Abstract
Critical Infrastructure Protection (CIP) systems, which are reliant on the energy, transportation, and communication sectors, are similarly vulnerable to cyberattacks. In order to increase the security of CIP systems, secure multi-party computing (SMPC) enables many parties to jointly calculate results without disclosing their private data. The requirement for strong encryption techniques makes it difficult to achieve efficient and safe SMPC in CIP systems. For secure SMPC in CIP systems, we provide a hybrid RSA-AES technique in this study. The algorithm strikes a balance between security and efficiency by combining the advantages of RSA and AES encryption techniques. While AES is used for effective data encryption and decryption throughout the calculation process, RSA is used for secure key exchange and authentication. We give a thorough explanation of the proposed algorithm, outlining the procedures involved in key creation, encryption, decryption, and calculation. We also examine the algorithm's resistance to typical assaults and show that it offers SMPC in CIP systems with a high level of security. The effectiveness of the suggested algorithm is also evaluated in terms of calculation time and communication overhead, and it is compared to alternative encryption techniques. Our findings demonstrate that the hybrid RSA-AES algorithm successfully strikes a balance between security and efficiency, making it appropriate for safe SMPC in CIP systems. This algorithm can improve the security of CIP systems and help protect critical infrastructure from online dangers. The algorithm can be improved, and its viability in actual CIP systems can be investigated through additional study and development.
Publisher
Research Square Platform LLC
Reference18 articles.
1. Homeland Security Presidential Directive 7 (2003). : Critical Infrastructure Identification, Prioritization, and Protection, the White House, December 17.
2. On the complex mathematical modeling of the vulnerabilities of critical infrastructures;Haimes YY;SIAM Review,2002
3. Lindell, Y., & Pinkas, B. (2000). Privacy preserving data mining. Advances in Cryptology—CRYPTO 2000 (pp. 36–54). Springer.
4. A method for obtaining digital signatures and public-key cryptosystems;Rivest RL;Communications of the ACM,1978
5. Daemen, J., & Rijmen