Robust Multi-Party Computation in Critical Infrastructure Protection using Hybrid RSA-AES Algorithm for Enhanced Security

Author:

Iqbal kashif1,jatoi Muhammad Uzair1,Sulaman Muhammad1,Abid Muhammad Shoaib1

Affiliation:

1. Ghazi University

Abstract

Abstract Critical Infrastructure Protection (CIP) systems, which are reliant on the energy, transportation, and communication sectors, are similarly vulnerable to cyberattacks. In order to increase the security of CIP systems, secure multi-party computing (SMPC) enables many parties to jointly calculate results without disclosing their private data. The requirement for strong encryption techniques makes it difficult to achieve efficient and safe SMPC in CIP systems. For secure SMPC in CIP systems, we provide a hybrid RSA-AES technique in this study. The algorithm strikes a balance between security and efficiency by combining the advantages of RSA and AES encryption techniques. While AES is used for effective data encryption and decryption throughout the calculation process, RSA is used for secure key exchange and authentication. We give a thorough explanation of the proposed algorithm, outlining the procedures involved in key creation, encryption, decryption, and calculation. We also examine the algorithm's resistance to typical assaults and show that it offers SMPC in CIP systems with a high level of security. The effectiveness of the suggested algorithm is also evaluated in terms of calculation time and communication overhead, and it is compared to alternative encryption techniques. Our findings demonstrate that the hybrid RSA-AES algorithm successfully strikes a balance between security and efficiency, making it appropriate for safe SMPC in CIP systems. This algorithm can improve the security of CIP systems and help protect critical infrastructure from online dangers. The algorithm can be improved, and its viability in actual CIP systems can be investigated through additional study and development.

Publisher

Research Square Platform LLC

Reference18 articles.

1. Homeland Security Presidential Directive 7 (2003). : Critical Infrastructure Identification, Prioritization, and Protection, the White House, December 17.

2. On the complex mathematical modeling of the vulnerabilities of critical infrastructures;Haimes YY;SIAM Review,2002

3. Lindell, Y., & Pinkas, B. (2000). Privacy preserving data mining. Advances in Cryptology—CRYPTO 2000 (pp. 36–54). Springer.

4. A method for obtaining digital signatures and public-key cryptosystems;Rivest RL;Communications of the ACM,1978

5. Daemen, J., & Rijmen

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3