INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND MATHEMATICAL THEORY (IJCSMT )
E-ISSN 2545-5699
P-ISSN 2695-1924
VOL. 10 NO. 5 2024
DOI: 10.56201/ijcsmt.v10.no5.2024.pg90.99
Amanze Bethran C., Nwoke Bethel C & Eleanya Mirian C
The work proposed a hybrid encryption algorithm for security of database and protection in radio frequency identification system using an advanced encryption standard and elgamal encryption as a cryptographic primitive. The algorithm protects high-valued sensitive health records against malicious users. With the developed system, one can provide a proof for each record stored in the database of the RFID system because it is sufficiently robust to withstand replay attack, eavesdropping attack and backward traceability. All records are randomized and each tag has its own unique identification data. In the proposed solution, the database was secured using hybrid encryption standard. The system is user friendly and interactive. Security enhancement will be achieved with the new system. The software when deployed will assist health institutions to keep track of their patients’ record easily. The New Hybrid Encryption algorithm takes much longer time compare to time taken by AES and Elgamal. Since the hybrid algorithm takes longer time for both encryption and decryption, it makes it more secure, since the higher the encryption processes the longer it will take for a hacker to break the encryption algorithm, since computing power is on the increase, speed will not be a problem in the nearest future and as such, in certain classified database, one cannot trade security with speed. This study will be useful in the protection of data stored in organizational databases. Data/information transmitted via insecure media will be received without interference or loss of data or information of any kind. It also reduces theft to its barest minimum. The hybrid security system will help individuals and organizations to protect their information from unauthorized user. Securing sensitive data from illegal access, theft and forging becomes a lesser challenge for different organizations, like security agencies, higher institutions and private sect
AES, EEA, Patients, Hospital
Aissi, S., Al-Hamami, Alaa Hussein, Arabnia, Hamid, and Abuosba Khalil (2006).
Proceedings of the 2006 International Conference on Security and Management,
SAM’06: Foreword.
Alomair, B. &Poovendran, R. (2010). Privacy versus Scalability in Radio Frequency
Identification Systems, Computer Communication, Elsevier, vol. 33, no. 18, pp. 2155–
Atkins, A.S., Zhang, L., Yu, H., & Miao, W. (2009). Application of Intelligent Systems
Using Knowledge Hub and RFID Technology in Healthcare Waste
Management in UK and China International Conference in e-Business.
Banks, J., Hanny D., Pachano M.A. & Thompson L.G. (2007). RFID Applied, John Wily &
Sons, Inc., Hoboken, New Jersey.
Burmester, M. & B. de Medeiros, (2007). RFID Security: Attacks, Countermeasures and Challenges,
Proceedings of 5th RFID Academic Convocation, the RFID Journal
Conference.
Deshpande, S. G.&Dahikar P.D., (2012). Strengthening of Data Security against its
Attack, International Journal of Advanced Networking and Applications3 (5) 29–35.
Dimitriou, T., (2005). A Lightweight RFID Protocol to Protect Against Traceability and
Cloning Attacks, Proceedings of Conference on Security and Privacy for
Emerging Areas in Communication Networks.
Elminaam, D. S.A., Kader, H.M. A. & Hadhoud, M.M. (2010). Evaluating the performance of
symmetric encryption algorithms, International Journal of Network Security, 10 (3),
213-EPCglobal Inc. EPCTM generation 1 tag data standards version 1.1 rev.1.27, 10 May 2005.
Garfinkel, S., Jules, A. &Pappu, R. (2005). RFID privacy: an overview of problems and
Proposed solutions. IEEE Security and Privacy Magazine, 3(3): 34 – 43.
Garfinkel, S. & Rosenberg, B. (2005). RFID Applications, Security, and Privacy. Addison-
Wesley.
Glover, B. & Bhatt, H. (2006). RFID Essentials. O'Reilly, Gravenstein Highway North,
Sebastopol, CA, USA.
Jhanwar, M.P. &Barua R. (2009)., A Hybrid Public Key Encryption in Standard Model and A
New Intractability Assumption, Stat-Math Unit Indian Statistical Institute Kolkata,
India
Jignesh, R.P., Rajesh S. & Vikas K. (2012) Hybrid Security Algorithms for Data Transmission
using AES-DES”, International Journal of Applied Information Systems (IJAIS), 2(2)
John, Justin M., Manimurugan, S., A survey on various Encryption Techniques. International
Journal of Soft Computing and Engineering, Volume 2, Issue 1, March 2012.
Juels, A., Rivest, R.L. & Szudlo, M. (2010).The Blocker Tag: Selective Blocking of RFID
tags for Consumer Privacy. In the 8th ACM Conference on Computer and
Communications Security.
Kuppuswamy, P.& Al-khalidi, S. Q. Y. (2014). Hybrid Encryption / Decryption Technique
Using New Public Key and Symmetric Key Algorithm, Department of Management
Information Systems, College of Commerce National Chengchi University & Airiti
Press Inc.19(2), 1–13.
Landau, S. (2004). Polynomials in the Nation’s Service: Using Algebra to Design the
Advanced Encryption Standard, MathematicalAssociation of America Monthly
(February), 89–117.
Landt, J. (2001). Shrouds of time: The history of RFID, An AIM Publication, Pittsburg.
Mateescu, G., &Vladescu, M. (2013). A Hybrid Approach of System Security for Small and
Medium Enterprises, Proceedings of the 2013 Federated Conference on Computer
Science and Information Systems, 656-662
Muhammad Iqbal, Andysah Putera Utama Siahaan, Riska Putri Sundari “Combination of
MD5 and ElGamal in Verifying File Authenticity and Improving Data security”
International Journal for Innovative Research in MultiDisciplinary Field Volume 4,
Issue 10, October
Nover, H. (2012). Algebraic cryptanalysis of AES: an overview, International Conference &
Workshop on Recent Trends in Technology, 1–16.
O' Brien, D. (2006). RFID - Introduction and security considerations, Presentation at the ISS
World, Washington, DC.
Okeke, S. (2014). The Study of the Application of Data Encryption Techniques in Cloud
Storage to Ensure Stored Data Integrity and Availability, International Journal of
Scientific and Research Publications, 4(10), 1-7.
Onyesolu, M.O. & Ogwara N.O., (2016). Information Security using a Hybrid Cryptographic
Model, International Research Journal ofComputer Science, 11 (4), 15-22
Page, L. (2007). Hospital tune in the RFID. Materials Management in Health Care, 16 (15),
18-20.
Rabah, K. (2004). Data Security and Cryptographic Techniques-A Review, Asian Network for
Scientific Information Technology3(1) 106-132.
Reyes, P.L. (2012), Accessing antecedents and outcomes of RFID Implementation in health
care. International Journal of Production Economics, 136(1) 137-150.
Roussos, G. & V. Kostakos, (2009). RFID in Pervasive Computing: State-Of-The-Art and
Outlook,Pervasive and Mobile Computing, vol. 5, pp. 110–131.
Saad, M.K. & Ahmed, S.V. (2007). Vulnerabilities of RFID Systems in Infant Abduction
Protection and Patient Wander Prevention.
Singh, N., &Kaur, P. D. (2015). A Hybrid Approach for Encrypting Data on Cloud to prevent
DoS Attacks. International Journal of Database Theory & Application, 8(3), 145–
Song, B. & C. J. Mitchell, (2011). Scalable RFID Security Protocols Supporting Tag
Ownership Transfer,Computer Communication, Elsevier, vol. 34, no. 4, pp. 556–
Sonia Rani, Harpreet Kaur “Implementation and Comparison of hybrid encryption model for
network using AES and Elgamal “International Journal of Advanced Research in
computer science Volume 8, No.3, March – April 2017.
Stallings, W. (2008). Cryptography and Network Security-Principles and Practices, Prentice
Hall, Inc., 4th Ed.
Swedberg, C. (2009). Virtual health expects improved bed management from RFID. RFID
Journal http://www.rfidjournal.com/article/view/7220.
Want, R. (2005). An Introduction to RFID Technology,” IEEE Pervasive Computing, vol. 5.
Weis, S., S. Sarma, R. Rivest, & D. Engels, (2003). Security and Privacy Aspects of Low
Cost
Radio Frequency Identification Systems, (2003). Proceedings of
International Conference on Security in Pervasive Computing, Lecture Notes in
Computer Science, vol. 2802, pp. 454–469.
Wi, C. (2010). Implementation of hybrid Encryption Method using Caesar cipher algorithm,
Unpublished master thesis, University Malaysia Pahang (UMP), Pahang, Malaysia.
Wiks, A.V. (2006). Radio frequency identification applications in hospital environments.
Hospital Topics 84 (3), 3-8.
Yang, Z., Sesay, S., Chen Jingwen, and Xu Du (2005). A secure database encryption scheme.
49-53, 10.1109/ccnc.2005. 1405142.