The ciphertext numbers (61508415, 114268051,
91252973) are then sent to the recipient. Please note
that the ciphertext numbers that are being sent has
smaller size than the ciphertext that was generated
by the encryption system that was not using hybrid
scheme in section 3.1.
The recipient decrypts the ciphertext numbers
using his own RPrime RSA private keys as follows.
RPrime RSA Decryption
61508415 65 'A'
114268051 66 'B'
91252973 67 'C'
Now, the recipient has known the VMPC
password, which is “ABC”. Then, using VMPC
decryption algorithm, which is simply XOR-ing the
VMPC password with the ciphertext, we get the
final decryption as follows.
VMPC Decryption
password = ABC
key = [65, 66, 67]
keybits = ['01000001',
'01000010', '01000011'
deciphernum = [67, 82, 89, 80, 84,
79, 71, 82, 65, 80, 72, 89, 32, 73, 83,
32, 69, 65, 83, 89]
decipherbits = ['01000011',
'01010010', '01011001', '01010000',
'01010100', '01001111', '01000111',
'01010010', '01000001', '01010000',
'01001000', '01011001', '00100000',
'01001001', '01010011', '00100000',
'01000101', '01000001', '01010011',
'01011001']
deciphertext = CRYPTOGRAPHY IS EASY
4 CONCLUSIONS
In conclusion, it is clearly noted that:
1. The RPrime RSA and VMPC are working
fine in the hybrid scheme, since the
ciphertext can be recovered back to the
plaintext.
2. The cipherbits size is the same as the
plainbits size, and it means that the
ciphertext size does not increase, and this
is beneficial in transmitting the ciphertext.
ACKNOWLEDGEMENTS
We gratefully acknowledge that this research is
funded by Lembaga Penelitian Universitas Sumatera
Utara. The support is under the research grant
TALENTA USU of Year 2018 Contract Number:
77/UN5.2.3.1/PPM/KP-TALENTA USU/2018.
REFERENCES
Batten, L, M., 2013. Public key cryptography:
applications and attacks (Hoboken, NJ: John Wiley &
Sons).
Paixao C, A, M., Gazzoni, Filho, D, L., 2003. An efficient
variant of the RSA cryptosystem. IACR Cryptology
ePrint Archive 159.
Rachmawati, D., Budiman, M, A., Siburian, W, S, E.,
2018. Hybrid cryptosystem implementation using fast
data encipherment algorithm (FEAL) and Goldwasser-
Micali algorithm for file security Journal of Physics:
Conference Series 1013 012159
Rachmawati, D., Sharif, A, Jaysilen., Budiman, M, A.,
2018. Hybrid Cryptosystem Using Tiny Encryption
Algorithm and LUC Algorithm IOP Conference
Series: Materials Science and Engineering 300
012042
Schneier, B and Diffie, W., 2015. Applied cryptography
protocols, algorithms, and source code in C
(Indianapolis (Ind.): Wiley).
Smart, N, P., 2016. Cryptography Made Simple (Cham:
Springer International Publishing).
Verma, S, and Garg, D., 2015. Improvement in rebalanced
CRT RSA International Arab Journal of Information
Technology (IAJIT) 12 6.
Zoltak, B., 2004. VMPC One-Way Function and Stream
Cipher Fast Software Encryption Lecture Notes in
Computer Science 210–25.