Skip to Content
InformationInformation
  • Article
  • Open Access

5 May 2023

Enhancing Organizational Data Security on Employee-Connected Devices Using BYOD Policy

and
College of Computer and Information Sciences, Prince Sultan University, Riyadh 11586, Saudi Arabia
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Advances in Cybersecurity and Reliability

Abstract

To address a business need, most organizations allow employees to use their own devices to enhance productivity and job satisfaction. For this purpose, the Bring Your Own Device (BYOD) policy provides controllable access for employees to organize data through their personal devices. Although the BYOD practice implies plenty of advantages, this also opens the door to a variety of security risks. This study investigates these security risks and proposes a complementary encryption approach with a digital signature that uses symmetric and asymmetric algorithms, depending on the organization’s digital certificate, to secure sensitive information stored in employees’ devices within the framework of BYOD policies. The method uses Advanced Encryption System (AES), Blowfish, RSA and ElGamal with a digital signature to achieve strong encryption and address critical security considerations such as user authentication, confidentiality and data integrity. The proposed encryption approach offers a robust and effective cryptographic solution for securing sensitive information in organizational settings that involve BYOD policies. The study includes experimental results demonstrating the proposed approach’s efficiency and performance, with reasonable encryption and decryption times for different key and file sizes. The results of the study revealed that AES and Blowfish have the best execution time. AES has a good balance of security and performance. RSA performs better than ElGamal in encryption and signature verification, while RSA is slower than ElGamal in decryption. The study also provides a comparative analysis with previous studies of the four encryption algorithms, highlighting the strengths and weaknesses of each approach.

1. Introduction

Organizations widely deploy rapidly evolving technologies that provide significant benefits but expose them to cyber-attacks due to employees connecting their devices to the information system. A key concern for modern organizations is protecting their assets against such attacks, particularly when safeguarding corporate data that are critical to their functions. Over time, the insecure storage of such data can negatively affect confidentiality, leading to financial losses and reputational damage for the organizations [1]. Organizations invest heavily in acquiring the latest hardware and software technologies with high-security standards to prevent such security breaches. Still, some underestimate the true nature of cybersecurity attacks, which limits the adoption of advanced security measures [1]. Common devastating cyber-attacks involve employee negligence and limited information on the best cybersecurity practices [2]. In particular, the traversal of organizational data to employees’ devices is the primary source of data breaches, compromising the entire system’s security. Therefore, securing organizational data by addressing this issue is very critical. Most organizations adopt Bring Your Own Device (BYOD) policies, and they should prioritize the security of devices connected to their systems.
BYOD is a widespread practice where employees use their personally owned devices, including laptops and smartphones, for work purposes [3,4]. It offers several benefits, such as increased mobility, flexibility, productivity and employee satisfaction. Most organizations have implemented information security policies to address the underlying security risks, but employee compliance can be an issue [3]. According to a survey by Bitglass, 69% of companies permit their employees to work with their own devices to complete their business work [5]. The security risks associated with BYOD are consistent with a BYOD policy compliance report by Palanisamy et al., which revealed that around 21% of organizations suffered a security breach due to mobile devices connecting to malicious Wi-Fi hotspots [3]. In 2021, LinkedIn experienced a data leak affecting approximately 500 to 700 million user accounts [6]. Although BYOD implies plenty of advantages, this also opens the door to various security risks, including data contamination and leakage, which can be costly financially and reputation-wise [3]. One of the leading security risks is that BYOD does not consider the security of the downloaded data in employees’ devices [7], making the policy vulnerable to attacks and data breaches. Given that the storage space of these devices has a mixture of personal information and sensitive data and documents stored during the employees’ work on the system, such stored data might be vulnerable to many threats that endanger the safety of user data storage, such as physical and malware attacks [8]. Therefore, the need to secure the stored data on employees’ devices becomes a critical issue, which is the focus of this paper.
This study aims to enhance an organizational system’s security by implementing additional security measures on employees’ devices that are authorized to access and store sensitive corporate data. This security approach involves encrypting the download of company documents using the encryption algorithm in the organization’s digital certificate. This encryption process must be applied as a mandatory requirement to enforce BYOD policies. The proliferation of BYOD adoption in organizations has not adequately considered the associated security risks of downloaded data. The study focuses on reducing the risk of corporate data breaches by securing downloaded data on employees’ devices through encryption, thus protecting organizations’ privacy. It emphasizes the vulnerability of organizational data stored on employees’ devices, which can be exposed to attacks and data breaches. The proposed complementary encryption algorithms, such as Advanced Encryption System (AES), RSA, ElGamal and Blowfish, enhance BYOD security and protect corporate data on employee-connected devices. Additionally, this paper highlights the need for organizations to comply with the Essential Cybersecurity Controls established by the National Cybersecurity Authority to ensure the confidentiality, integrity and availability of an organization’s information and technology assets. The following objectives are instrumental in achieving the goal of this study:
  • Propose an encryption algorithm that runs on the user’s device upon downloading.
  • Build an encryption key generator that is centrally under the organization’s control and will manage the encryption keys for the devices connected to the system.
  • Evaluate the proposed model to ensure security according to predefined criteria (key length, file size).
The remainder of the present study is structured as follows: Section 2 comprises a comprehensive review of the relevant literature about the topic under investigation. Section 3 expounds on the research methodology adopted and the proposed approach for the complementary encryption algorithm. Section 4 presents experimental results. Section 5 elaborates on the discussion and findings, encompassing a comparative analysis. Section 6 summarizes the paper, culminating in a conclusive statement that encapsulates its critical discoveries.

3. Materials and Methodology

This study aims to enhance the protection of organizational data by adding another protection layer to employee-connected devices according to the BYOD policy. The proposed methodology assumes the organization has high standard of security on the organizational side, with an effective BOYD policy that is acceptable to all the employees. However, the download of confidential business documents and data into the employees’ devices is one of the severe security issues that violate data confidentiality. Such confidentiality violations occur when the employees use the devices in a less secure environment.
Thus, there is an urgent need to add extra security to employees’ devices, which are authorized to store sensitive organizational data securely. This extra feature involves encrypting the download of organizational documents; the encryption process will be a part of BYOD policy enforcement requirements. This study will evaluate the effectiveness of various encryption algorithms along with digital signatures and a hash function (SHA-256) for securing organizational data that are accessible by employees through their personal devices for work purposes.
The evaluation involves symmetric encryption algorithms (AES and Blowfish) and asymmetric cryptography algorithms (RSA and ElGamal), both with RSA digital signatures. The proposed system, built using Java as a programming language and Swagger UI as GUI for the created API, focuses on fundamental security considerations, such as confidentiality, non-repudiation and data integrity. Encryption was used for confidentiality, while digital signatures were used to ensure the integrity of the data, with any disparity between the signatures implying that the data had been altered, providing a measure of data integrity.
The methodology involves assessing the performance of implemented algorithms in terms of speed and complexity and comparing results with other previous studies. The experiments include evaluating the encryption and decryption times of the algorithms with digital signatures and the impact of different key lengths and file sizes on the performance.
The system diagram is displayed in Figure 5 and Figure 6. Figure 5 displays the flow of downloading organizational documents to employees’ devices.
Figure 5. System flow of downloading organizational documents.
Figure 6. System flow of opening encrypted documents.
The diagram in Figure 6 shows the flow of opening encrypted documents.

3.1. Description of the Technical Details

3.1.1. Java Programming Language

Java Spring boot with spring framework used to implement multiple classes along with Maven dependency management to run the application.

3.1.2. Java Cryptography

We focus on the most used cryptographic library, namely the Java Cryptography Architecture (JCA), which offers an extensive variety of cryptographic services, including symmetric and asymmetric encryption, digital signatures and key management.

3.1.3. Swagger User Interface

User interface framework was used to generate an interactive documentation website to read open API to visualize the interface.

3.1.4. Hardware Specifications

The following hardware specifications were chosen carefully to achieve good performance:
1.
Processor: Intel (R) Core (TM) i7-8565U CPU @ 1.80–1.99 GHz
2.
RAM: 32.0 GB.

3.2. Key Generation

In our proposed system, key generation follows these steps:
I.
Initialize the algorithm key with user passcode and salt using a key generator
II.
Initialize the key size and iteration count if needed.
III.
Generate the secret key or key pairs depending on the algorithm type.
IV.
Calculate the generation time.
For generating a key, one of the classes, KeyGenerator or KeyPairGenerator, can be used, relying on the algorithm. KeyGenerator has the ability of a symmetric key generation, whereas KeyPairGenerator has the ability of an asymmetric key generation. To ensure appropriate entropy in the secret key, the hash of this data is changed into a secret. The secret is then used to generate the key by using the methods SecretKeyFactory, PBEKeySpec and SecretKeySpec from the javax.crypto library. Part of the code for key generation is shown below.
Information 14 00275 i001

3.3. Encryption and Decryption

The following steps are used for encryption and decryption of implemented algorithms in our proposed system (RSA, ElGamal, AES, Blowfish):
I.
Declare the cipher by specifying the algorithm name.
II.
Initialize the cipher for encryption or decryption by specifying the mode and key.
III.
Encrypt or decrypt the file using the doFinal method.
IV.
Calculate the encryption or decryption time.
Here, the file is encrypted and decrypted in a single process, as shown below. The transformation and process used in this project were recommended by a Google team [35].
Information 14 00275 i002

3.4. Digital Signature

Our proposed system will compute the digital signature and verification to guarantee the integrity of the file using SHA-256. The authenticity of the file is revealed if the recomputed signature and the signature with the encrypted file are equal; otherwise, the file has been altered.
The following steps are used for digital signature generation and verification:
I.
Produce a key pair, generated by the KeyPairGenerator class. In our case, an RSA key pair was generated with a 2048-bit length.
II.
Initialize signature using hash function SHA256.
III.
Initiate signature or verify it using the file and key corresponding to the operation.
IV.
Return generated signature or verification response.
The file signature generation process is shown below.
Information 14 00275 i003

4. Results

The proposed BYOD-based complementary encryption system provides the following features:
  • Encrypting and decrypting files using one of the algorithms (RSA, ElGamal, AES and Blowfish) based on the company digital certificate
  • Generating digital signatures and verifying signatures by using the RSA algorithm to ensure the data’s integrity.
  • Including user passcodes in the generation of keys for symmetric and asymmetric algorithms.
  • Using the Swagger UI interface for easy interaction with the API for the selection of documents, cryptography processes, algorithms and user passcodes to be encrypted/decrypted and signed/verified.
Figure 7 shows the display API in the Swagger UI that provides the organization’s users with various selections to upload their files to be encrypted after selecting encryption. The algorithm then clicks on the ‘Execute’ button to generate the file that includes the cipher text and the digital signature for that given file.
Figure 7. Complementary encryption algorithm Swagger UI.

4.1. Result Analysis

AES and Blowfish were tested using different key sizes of 128, 192 and 256 bits, whereas 512, 1024, 2048 and 3072 bits were used for the RSA and the ElGamal algorithms for encryption and decryption. For signature generation and verification, 2048-bit RSA was used. Files of different types and sizes were tested, and the time taken for each operation was recorded in milliseconds.

4.1.1. Encryption

Different file sizes were encrypted using the four algorithms (RSA, ElGamal, AES and Blowfish) with different key sizes and RSA digital signatures. The encryption time for each algorithm was recorded and tabulated (Table 2 and Table 3).
Table 2. Encryption data for RSA and ElGamal algorithms with signature.
Table 3. Encryption data for Blowfish and AES algorithms with signature.
The two figures and tables illustrate the encryption execution times for different encryption algorithms.
Table 2 and Figure 8 show that the ElGamal algorithm execution time rate was constantly higher than RSA during encryption for different file sizes and key lengths. The ElGamal execution time was under 450 ms with a 512-bit key size and 10 KB file size, which then doubled to around 900 ms with a 1024-bit key size. With a 3072-bit key size, the time reached a high of almost 4600 ms, almost 10 times that of the execution time with a 512-bit key size. The RSA execution time rate showed a similar trend but was between 10 to 30 times less than that of ElGamal with all key sizes.
Figure 8. Graphical representation of different file sizes with RSA and ElGamal encryption time.
Table 3 and Figure 9 show a slight difference between Blowfish and AES encryption times, but Blowfish consumes less time than AES. There is a direct relationship between increasing key length and file size on performance. Blowfish execution time started at 0.5 ms with a 128-bit key size and 10 KB file size, which then doubled to 1 millisecond with a 192-bit key size. Then, it showed an increase and reached around 6 ms with a 256-bit key size. The AES execution time rate showed a similar trend but was between 1 to 1.3 times higher than that of Blowfish with all key sizes.
Figure 9. Graphical representation of different file sizes with Blowfish and AES encryption time.

4.1.2. Decryption

The exact file sizes encrypted in Table 2 and Table 3 were decrypted. The decryption time for each algorithm was recorded and tabulated (Table 4 and Table 5).
Table 4. Decryption data for RSA and ElGamal algorithms with verification.
Table 5. Decryption data for Blowfish and AES algorithms with verification.
The two figures and tables illustrate the decryption execution times for different algorithms.
Table 4 and Figure 10 show that ElGamal consumes less time than RSA during decryption for different key lengths and file sizes. The RSA rate was around 400 ms with a 512-bit key size and a file size of 10 KB, which then increased to more than double to reach around 1200 ms with a 1024-bit key size. This then ended by reaching around 6000 ms with a 3072-bit key size. The ElGamal execution time rate showed a similar trend but was between 2 to 6 times less than the RSA rate with all key sizes.
Figure 10. Graphical representation of different file sizes with RSA and ElGamal decryption time.
Table 5 and Figure 11 reveal that AES requires more time than Blowfish. A direct relationship is found between increasing key size and file size on performance. AES execution time was around 0.5 ms with a 128-bit key size and a 10 KB file size, which then doubled to reach 1 millisecond with a 192-bit key size. With a 256-bit key size, the time had reached a high of almost 6 ms, almost 12 times that of the execution time with a 128-bit key size. The Blowfish execution time rate showed a similar trend but was between 1 to 1.6 times less than the AES rate with all key sizes.
Figure 11. Graphical representation of different file sizes with Blowfish and AES decryption time.

4.1.3. Key Generation

The time taken for RSA, ElGamal, AES and Blowfish to generate a key was captured and recorded (Table 6 and Table 7).
Table 6. Key generation data for RSA and ElGamal.
Table 7. Key generation data for Blowfish and AES.
The two tables illustrate the key generation execution times for different algorithms.
Table 6 shows a slight difference between ElGamal and RSA algorithms in the key generation process. Here, ElGamal consumes less time than RSA. ElGamal spends around 45 ms in generating a 512-bit key size and 2000 ms to generate a 3072-bit key size, around 40 times that of the execution time with a 512-bit key size. The RSA execution time rate showed a similar trend but with a difference of around 30% greater than that of ElGamal with all key sizes.
Table 7 reveals that AES spends more time generating keys than Blowfish. There is a direct relationship between increasing key size and user passcode size on the key generation time. AES takes around 150 ms to generate a 128-bit key size, and this more than doubles when generating a 256-bit key size. Blowfish’s execution time rate showed a similar trend but with a difference of around 8% less than that of AES with all key sizes.

5. Discussion

A comparative analysis was done of the four encryption algorithms (RSA, ElGamal, Blowfish and AES) based on the changeable variables of each algorithm to enhance organization security in BYOD policies. The experimental outcomes in the tables show from the analysis of asymmetric algorithms that encryption and decryption times depend on the key and file sizes, and key generation times depend on the key and user passcode sizes. As the key and file sizes or user passcode sizes increase, the RSA and ElGamal algorithms’ encryption and decryption key generation times significantly increase. RSA with signatures has a better execution time than ElGamal with signatures in the encryption processes, while ElGamal with verification has a better execution time than RSA with verification during the decryption process and key generation.
By contrast, for symmetric algorithms, the encryption and decryption times for Blowfish and AES algorithms remain relatively constant or have small differences where Blowfish performs better than AES. Key generation time will depend on the key and user passcode sizes, the key generation times remarkably increase, when we process large key sizes and passcode.
The encryption and decryption times may increase with larger file sizes and key sizes. Therefore, the average encryption, decryption and key generation times appear reasonable and should not significantly impact the performance of employees’ devices.

Findings and Comparison with Existing Work

In this section, a comparative analysis and a discussion of the implemented encryption algorithms with previous research have been demonstrated in terms of performance. The RSA, ElGamal, AES and Blowfish results were compared with those of Adeniyi et al. [29], Emmanuel et al. [12], Rouaf and Yousif [13], Abay [14] and Ali et al. [20].
Table 8 and Table 9 show a time comparison of our suggested algorithm with previous studies implementing similar techniques, where the time taken in our proposed system seems to be better in terms of performance.
Table 8. RSA and ElGamal comparison.
Table 9. AES and Blowfish comparison.
Table 8 shows that our RSA and ElGamal execution time was between 0.9 to 30 times lower than previous studies’ algorithm rates in the encryption and decryption process. Table 9 demonstrates that AES and Blowfish execution time was between 1.5 to 29 times lower than previous studies’ algorithm rates in terms of encryption and decryption.
The analysis aligns with the literature findings, highlighting the performance and security of these algorithms. For example, in a comparative study of RSA and ElGamal algorithms, Emmanuel et al. [12] concluded that they are both secure cryptographic algorithms. Still, their efficiency may vary depending on the application and file format. RSA may be faster for audio files [12]. Adeniyi et al. [29] inferred that RSA is faster in encrypting messages and verifying digital signatures, while ElGamal is faster in decrypting messages and generating digital signatures. Blowfish is about four times faster than AES, which is faster than RSA (the slowest algorithm) [16]. Abay [14] also revealed that AES has better performance with higher throughput than Blowfish. When the throughput value increases, the power consumption of the encryption method decreases. Overall, the literature shows that AES has a good balance of security and performance. Abay’s [14] findings revealed that AES has better performance, with high throughput and lower power consumption, compared with other algorithms, suggesting that AES is more efficient for encryption and decryption operations, especially in applications that require high throughput. These findings align with the results and reviewed work, which revealed that AES had a good balance of security and performance and could be the best choice for the organization’s BYOD infrastructure. However, further analysis and testing are required to determine the extent to which AES ensures the security of organizational data based on the specific needs and requirements.

6. Conclusions

This paper proposes a BYOD-based data secure storage system with encryption and decryption features using AES, Blowfish, ElGamal and RSA algorithms with signature generation and verification, an API with a Swagger UI interface and the generation of private and public keys with user passcode, applied on downloaded files on employees’ devices to ensure organizational data security. The paper compares four encryption algorithms and concludes that AES has the best balance of security and performance for high-throughput applications in an organization’s BYOD infrastructure. Further testing is recommended to assess the system’s security based on specific needs. This proposed system addresses BYOD challenges and provides an efficient and secure data storage solution for organizations. The study may serve as a helpful reference for organizations implementing secure data storage techniques.

Author Contributions

Conceptualization, methodology, validation, formal analysis, investigation, and visualization, M.R.A. and S.M.F. Software and writing—original draft preparation, M.R.A. Writing review and editing, S.M.F. All authors have read and agreed to the published version of the manuscript.

Funding

The authors would like to acknowledge the support of Prince Sultan University for paying the Article Processing Charges (APC) for this publication.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Perera, S.; Jin, X.; Maurushat, A.; Opoku, D.-G.J. Factors affecting reputational damage to organisations due to cyberattacks. Informatics 2022, 9, 28. [Google Scholar] [CrossRef]
  2. Bhusal, C.S. Systematic review on social engineering: Hacking by manipulating humans. J. Inf. Secur. 2021, 12, 104–114. [Google Scholar] [CrossRef]
  3. Palanisamy, R.; Norman, A.A.; Mat Kiah, M.L. BYOD Policy Compliance: Risks and Strategies in Organizations. J. Comput. Inf. Syst. 2022, 62, 61–72. [Google Scholar] [CrossRef]
  4. Hertel, G.; Stone, D.L.; Johnson, R.D. The Wiley Blackwell Handbook of the Psychology of the Internet at Work; John Wiley & Sons: Hoboken, NJ, USA, 2017. [Google Scholar]
  5. Business Wire. Bitglass 2020 BYOD Report: Increased Remote Work Drives BYOD, But Security Is Not Keeping Pace. Available online: https://www.businesswire.com/news/home/20200708005267/en/Bitglass-2020-BYOD-Report-Increased-Remote-Work-Drives-BYOD-but-Security-is-Not-Keeping-Pace (accessed on 9 March 2023).
  6. Scrubbed. LinkedIn Data Leak—What We Can Do about It. Available online: https://scrubbed.net/blog/linkedin-data-leak-what-we-can-do-about-it/ (accessed on 8 March 2023).
  7. Turban, E.; Pollard, C.; Wood, G. Information Technology for Management: On-Demand Strategies for Performance, Growth and Sustainability; John Wiley & Sons: Hoboken, NJ, USA, 2018. [Google Scholar]
  8. Bahaddad, A.A.; Almarhabi, K.A.; Alghamdi, A.M. Factors Affecting Information Security and the Implementation of Bring Your Own Device (BYOD) Programmes in the Kingdom of Saudi Arabia (KSA). Appl. Sci. 2022, 12, 2707. [Google Scholar] [CrossRef]
  9. Ntwari, R.; Habinka, A.E.; Kaggwa, F. BYOD systematic literature review: A layered approach. Eur. J. Technol. 2022, 6, 69–85. [Google Scholar] [CrossRef]
  10. Shrestha, P.; Thakur, R.N. Study on Security and Privacy Related Issues Associated with BYOD Policy in Organizations in Nepal. LBEF Res. J. Sci. Technol. Manag. 2019, 1, 41–62. [Google Scholar]
  11. Maglaras, L.; Almomani, I. Digitization of healthcare sector: A study on privacy and security concerns. Korean Inst. Commun. Inf. Sci. 2023; in press. [Google Scholar] [CrossRef]
  12. Emmanuel, A.A.; Marion, A.O.; Aderemi, O.; Olugbara, O.O. Computational complexity of RSA and ElGamal cryptographic algorithms on video data. J. Theor. Appl. Inf. Technol. 2022, 100, 5437–5445. [Google Scholar] [CrossRef]
  13. Rouaf, M.T.; Yousif, A. Performance Evaluation of Encryption Algorithms in Mobile Devices. In Proceedings of the 2020 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE), Khartoum, Sudan, 26 February–1 March 2021. [Google Scholar] [CrossRef]
  14. Abay, M.M. Performance Analysis of Blowfish, IDEA and AES Encryption Algorithms. Int. J. Res. Anal. Rev. 2020, 7, 668–678. [Google Scholar]
  15. Alenezi, M.; Usama, M.; Almustafa, K.; Iqbal, W.; Raza, M.A.; Khan, T. An efficient, secure, and queryable encryption for nosql-based databases hosted on untrusted cloud environments. Int. J. Inf. Secur. Priv. 2019, 13, 14–31. [Google Scholar] [CrossRef]
  16. Commey, D.; Griffith, S.; Dzisi, J. Performance comparison of 3DES, AES, Blowfish and RSA for Dataset Classification and Encryption in Cloud Data Storage. Int. J. Comput. Appl. 2020, 177, 17–22. [Google Scholar] [CrossRef]
  17. Oleiwi, Z.C.; Alawsi, W.A.; Alisawi, W.C.; Alfoudi, A.S.; Alfarhani, L.H. Overview and Performance Analysis of Encryption Algorithms. J. Phys. Conf. Ser. 2020, 1664, 012051. [Google Scholar] [CrossRef]
  18. Rasool, M.-U.; Iftikhar, S.; Saba, T.; Al-ghamdi, J.S. Ensuring authentication in cloud computing through homomorphic encryption. J. Theor. Appl. Inf. Technol. 2017, 95, 3032–3040. [Google Scholar]
  19. Shrestha, P.; Thakur, R.N. Channel state information-based cryptographic key generation for Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 2021, 22, 7496–7507. [Google Scholar] [CrossRef]
  20. Ali, K.; Akhtar, F.; Memon, S.A.; Shakeel, A.; Ali, A.; Raheem, A. Performance of cryptographic algorithms based on time complexity. In Proceedings of the 2020 3rd International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), Sukkur, Pakistan, 29–30 January 2020. [Google Scholar] [CrossRef]
  21. Tiwari, D.; Singh, A.; Prabhakar, A. Performance Analysis of AES, RSA and Hashing Algorithm Using Web Technology. In Computing Algorithms with Applications in Engineering; Springer: Berlin/Heidelberg, Germany, 2020; pp. 413–418. [Google Scholar] [CrossRef]
  22. Javed, Y.; Khan, A.S.; Qahar, A.; Abdullah, J. Preventing Dos Attacks in IOT Using AES. J. Telecommun. Electron. Comput. Eng. 2017, 9, 55–60. [Google Scholar]
  23. Ribouh, S.; Phan, K.; Malawade, A.V.; Elhillali, Y.; Rivenq, A.; Al Faruque, M.A. A novel secure artificial bee colony with advanced encryption standard technique for biomedical signal processing. Period. Eng. Nat. Sci. 2022, 10, 288. [Google Scholar] [CrossRef]
  24. Buhari, B.A.; Obiniyi, A.A.; Sunday, K.; Shehu, S. Performance evaluation of symmetric data encryption algorithms: AES and Blowfish. Saudi J. Eng. Technol. 2019, 4, 407–414. [Google Scholar] [CrossRef]
  25. Kothandan, A. Modified Blowfish Algorithm to Enhance Its Performance and Security. Ph.D. Thesis, National College of Ireland, Dublin, Ireland, 2020. [Google Scholar]
  26. Yousif, S.F. Performance comparison between RSA and El-Gamal algorithms for Speech Data Encryption and decryption. Diyala J. Eng. Sci. 2023, 16, 123–137. [Google Scholar] [CrossRef]
  27. Ahmed, B.K.A.; Mahdi, R.D.; Mohamed, T.I.; Jaleel, R.A.; Salih, M.A.; Zahra, M.M.A. Secure and efficient data storage operations by using intelligent classification technique and RSA algorithm in IOT-based cloud computing. Sci. Program. 2022, 2022, 2195646. [Google Scholar] [CrossRef]
  28. Tahat, N.; Shaqboua, R.; Abdallah, E.E.; Bsoul, M.; Shatanawi, W. A New Digital Signature Scheme with Message Recovery Using Hybrid Problems. Int. J. Electr. Comput. Eng. 2019, 9, 3576–3583. [Google Scholar] [CrossRef]
  29. Adeniyi, E.A.; Falola, P.B.; Maashi, M.S.; Aljebreen, M.; Bharany, S. Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions. Information 2022, 13, 442. [Google Scholar] [CrossRef]
  30. Kavin, B.; Ganapathy, S. A new digital signature algorithm for ensuring the data integrity in cloud using elliptic curves. Int. Arab. J. Inf. Technol. 2021, 18, 180–190. [Google Scholar] [CrossRef]
  31. Somsuk, K.; Thakong, M. Authentication system for e-certificate by using RSA’s digital signature. Telecommun. Comput. Electron. Control 2020, 18, 2948. [Google Scholar] [CrossRef]
  32. Imran, O.A.; Yousif, S.F.; Hameed, I.S.; Abed, W.N.A.-D.; Hammid, A.T. Implementation of el-gamal algorithm for speech signals encryption and decryption. Procedia Comput. Sci. 2020, 167, 1028–1037. [Google Scholar] [CrossRef]
  33. Babu, T.G.; Jayalakshmi, V. Conglomerate energy efficient Elgamal encryption based data aggregation cryptosystems in Wireless Sensor Network. Int. J. Eng. 2022, 35, 417–424. [Google Scholar] [CrossRef]
  34. Kasodhan, R.; Gupta, N. A new approach of digital signature verification based on BioGamal algorithm. In Proceedings of the 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 27–29 March 2019. [Google Scholar] [CrossRef]
  35. Oracle. Class Cipher. Available online: https://docs.oracle.com/javase/7/docs/api/javax/crypto/Cipher.html (accessed on 10 January 2023).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.