Novel Method to Ensure Security in Telecommunications Systems
dc.contributor.author | Janet O. Jooda | |
dc.date.accessioned | 2025-05-27T11:06:03Z | |
dc.date.available | 2025-05-27T11:06:03Z | |
dc.date.issued | 2023 | |
dc.description.abstract | Data in the cloud and all forms of wireless communication are susceptible to many forms of attack. Forming hybridized cipher with symmetric and asymmetric algorithms allays the fear of security concern having identified the weakness of single-layer encryption. However, the hybrized cipher requires exchange of secret keys between sender and receiver and also paid little attention to throughput. Hence, this research removes the need to share secrete key for a private key by developing a hybrid cipher using the output Elliptic Curve Cryptography (ECC) for key exchange of symmetric key cipher, RC4c.The stages involved in the developed ECCRC4c algorithm are ECC and RC4c encryption. Varying lengths of data in step of 8 bits were used to estimate the performance metrics of the proposed system of this research. The results showed a significant improvement in the throughput and computation time on the existing algorithm. There was an improvement of 94.6% in throughput and 89.9% in computation time which implied power savings. Performance metrics of a hybrid cryptographic algorithm are proportional to performance metrics of the components ciphers as shown from the individual metrics of DES, RSA, ECC, RC4c, RSADES and ECCRC4c. | |
dc.identifier.citation | Okandeji et al.; Asian Basic Appl. Res. J., vol. 5, no. 1, pp. 155-162, 2023; Article no.ABAARJ.1408 | |
dc.identifier.uri | https://repository.run.edu.ng/handle/123456789/4806 | |
dc.language.iso | en | |
dc.publisher | Asian Basic and Applied Research Journal | |
dc.relation.ispartofseries | Vol.5; No. 1 | |
dc.title | Novel Method to Ensure Security in Telecommunications Systems | |
dc.type | Article |