Implementation of novel cryptographic technique for enhancing the cipher security for Resilient Infrastructure

Fadhel K. Jabor1 , Noora zidan khalaf 2 , Bourair Al-Attar3,* , Hussein Ali Hussein Al Naffakh3 , J. F.Tawfeq 4

1 Vice President Office for Scientific Affairs, University of Baghdad, Baghdad, Iraq

2 Quality Assurance & University Performance, Mustansiriyah University, Baghdad, Iraq

3 College of Medicine, University of Al-Ameed, Karbala 1238, Iraq

‏‏4 Department of Medical Instrumentation Technical Engineering, Medical Technical College, Al-Farahidi University, Baghdad, Iraq

Emails: fadhel.k.jabor@uobaghdad.edu.iq; noora.zidan6@uomustansiriyah.edu.iq; bourair.alattar@alameed.edu.iq; aulanone@gmail.com; jamaltawfeq55@gmail.com

* Corresponding author’s Email: bourair.alattar@alameed.edu.iq

 

Abstract

Cryptography is a well-known technology for providing confidential data transfer via asymmetric or symmetric algorithms with public or private keys. Secure data transmission over networks using unreliable, untrusted channels is made achievable by cryptography. As a result of the quick digital transition, network traffic is rapidly rising, and consumers remain constantly connected and accessible online. Extortions, including transforming, spoofing, and tracking data through unauthorised access, are quite widespread over the internet. Many more cryptographic algorithms already exist, but they need to be consistently improved and optimized for better performance within the constraints imposed by new technology and a wide variety of application domains. To overcome these limitations, we suggest a novel FishyCurve Cipher technique by combining an elliptic curve-based algorithm (ECA) with a Threefish cipher algorithm (TCA) to improve cipher security and performance, the data will be encrypted using TFCA, and the key will be secured by the EC technique. To verify data integrity, a digital signature algorithm (DSA) is employed. To evaluate the effectiveness of the proposed FishyCurve Cipher technique, comprehensive experimental tests have been conducted. The results clearly demonstrate its superiority in terms of cipher security when compared to traditional encryption algorithms. Its outstanding resilience against a wide range of attacks makes it a strong method of securing resilience infrastructure from malicious actors who seek to compromise data confidentiality and integrity.

Keywords: Encryption; Algorithm based on elliptic curves; A cryptographic algorithm based on threefish; Signing algorithm for digital documents; Security of ciphers; Innovation in processes; The resilience of infrastructure.