Comparative Study of the Reliability and Complexity of Symmetrical and Asymmetrical Cryptosystems for the Protection of Academic Data in the Democratic Republic of Congo
In the digital age, the data exchanged within a company is a wealth of knowledge. The survival, growth and influence of a company in the short, medium and long term depend on it. Indeed, it is the lifeblood of any modern company. A company’s operational and historical data contains strategic and operational knowledge of ever-increasing added value. The emergence of a new paradigm: big data. Today, the value of the data scattered throughout this mother of knowledge is calculated in billions of dollars, depending on its size, scope and area of intervention. With the rise of computer networks and distributed systems, the threats to these sensitive resources have steadily increased, jeopardizing the existence of the company itself by drying up production and losing the interest of customers and suppliers. These threats range from sabotage to bankruptcy. For several decades now, most companies have been using encryption algorithms to protect and secure their information systems against the threats and dangers posed by the inherent vulnerabilities of their infrastructure and the current economic climate. This vulnerability requires companies to make the right choice of algorithms to implement in their management systems. For this reason, the present work aims to carry out a comparative study of the reliability and effectiveness of symmetrical and asymmetrical cryptosystems, in order to identify one or more suitable for securing academic data in the DRC. The analysis of the robustness of commonly used symmetric and asymmetric cryptosystems will be the subject of simulations in this article.
References
[1]
National Bureau of Standards, U.S. Department of Commerce (2001) Advanced Encryption Standard (AES), Federal Information Processing Standard (FIPS), Publication 197. Washington DC. https://csrc.nist.rip/publications/detail/fips/197/final
[2]
Medien, Z., Mohsen, M., Lazhar, K., Adel, B. and Rached, T. (2007) A Modified AES Based Algorithm for Image Encryption. International Journal of Computer, Electrical, Automation, Control and Information Engineering, 1, 745-750.
[3]
Deamen, J. and Rijimen, V. (2002) The Design of Rijindal: AES-Advanced Encyption Standard (Information Security and Cryptography). Springer-Verlag, Berlin.
[4]
Han, F.L., Hu, J.K., Yu, X.H. and Wang, Y. (2007) Fingerprint Images Encryption via Multi-Scrollchaotic Attractors. Applied Mathematics and Computation, 185, 931-939. https://doi.org/10.1016/j.amc.2006.07.030
[5]
Wang, Y., Wong, K.W., Liao, X.F. and Chen, G.R. (2011) A New Chaos-Based Fast Image Encryption Algorithm. Applied Soft Computing, 11, 514-522. https://doi.org/10.1016/j.asoc.2009.12.011
[6]
Pareek, N.K., Patidar, V. and Sud, K.K. (2006) Image Encryption Using Chaotic Logistic Map. Image and Vision Computing, 24, 926-934. https://doi.org/10.1016/j.imavis.2006.02.021
[7]
Yong, Z. (2011) Image Encryption with Logistic Map and Cheat Image. 2011 3rd International Conference on Computer Research and Development, Shanghai, 11-13 March 2011, 97-101.
[8]
Liu, L.L., Zhang, Q. and Wei, X.P. (2012) A RGB Image Encryption Algorithm Based on DNA Encoding and Chaos Map. Computers and Electrical Engineering, 38, 1240-1248. https://doi.org/10.1016/j.compeleceng.2012.02.007
[9]
Ariffin, M. and Noorani, M. (2008) Modified Baptista Type Chaotic Cryptosystem via Matrix Secret Key. Physics Letters A, 372, 5427-5430. https://doi.org/10.1016/j.physleta.2008.06.077
[10]
Lenstra, A.K. and Lenstra Jr., H.W. (1993) The Development of the Number Field Sieve. Springer, Berlin. https://doi.org/10.1007/BFb0091534
[11]
Lenstra, A.K., Lenstra Jr., H.W. and Lov’asz, L. (1982) Factoring Polynomials with Rational Coefficients. Mathematische Annale, 261, 513-534. https://doi.org/10.1007/BF01457454
[12]
Krikor, L., Baba, S., Arif, T. and Shaaban, Z. (2009) Image Encryption Using DCT and Stream Cipher. European Journal of Scientific Research, 32, 48-58.
[13]
Gutmann, P. (2011) Engineering Security. University of Auckland, Auckland.
[14]
ISO 27001 Information Security Management Systems. https://www.intertek.com/assurance/iso-27001/?gad_source=1&gclid=EAIaIQobChMInIjsjp78hQMV3kFBAh2a0QjYEAAYAiAAEgK3gPD_BwE
ISO/IEC (2005) Information Technology. Code of Practice for Information Security Management. 17799. https://webstore.ansi.org/standards/iso/isoiec177992005?gad_source=1&gclid=EAIaIQobChMIrpbJxp_8hQMVlz4GAB1iAAUjEAAYAyAAEgIsDvD_BwE
[17]
Llorens, C., Levier, L. and Valois, D. (2006) Tableaux de bordaux de la sécurité réseau. Eyrolles, Paris.
[18]
Longeon, R. and Archimbaud, J.L. (1999) Guide de la sécurité des systèmes Information—For Managers. Center National de la Recherche Scientifique (CNRS), Paris.
[19]
Lucas, M.W. (2006) PGP & GPG—Assurer la confidentialité de ses e-mails et de ses fichiers. Eyrolles, Paris.
[20]
Mattatia, F. (2013) Personal Data Processing: The Legal Guide. Eyrolles, Paris.
[21]
Eastaway, R. and Wyndham, J. (2001) Why Do Buses Always Come in Threes? Flammarion, Paris, 95-107.
[22]
Hill, L.S. (1929) Cryptography in an Algebraic Alphabet. American Mathematical Monthly, 36, 306-312. https://doi.org/10.1080/00029890.1929.11986963
[23]
Edward, L.R. (2000) Cryptological Mathematics. The Mathematical Association of America, Washington DC, 124-140. https://doi.org/10.1090/clrm/016
[24]
Douglas, S. (2001) Cryptographie, Théorie et pratique. Vuibert, Paris, 12-16.