Enhancing the Encryption Capabilities of the Generalization of the ElGamal Algorithm for Document Security
DOI:
https://doi.org/10.30871/jaic.v9i4.9737Keywords:
Algorithm efficiency, Cryptography, Digital document security, Generalization of the ElGama, SecurityAbstract
The development of cryptographic algorithms that are efficient in terms of computation and resource usage, in addition to maintaining the confidentiality, integrity, and authentication of information, is driven by the growing need for digital document security. The generalization of the ElGamal, an expansion of the traditional ElGamal algorithm with more adaptable encryption features, is one algorithm with a lot of promise in this situation. The implementation of the technique of splitting the plaintext into three-digit blocks to lower the complexity of encryption per character and the use of large prime numbers to increase the algorithm's mathematical complexity are the two main ways that this study seeks to increase the algorithm's efficiency and security. It is anticipated that this method will speed up computation time and simplify the encryption process per character without compromising security. The overall findings demonstrate that, without compromising security, this method dramatically cuts down on computation time and ciphertext enlargement. Therefore, in the age of digital transformation, the findings of this study aid in the creation of contemporary cryptographic algorithms that are more flexible and effective and serve as a strategic guide when creating a strong digital data security system.
Downloads
References
[1] S. Kanojia, “Digitalization in Corporations: Integrating Utility of Digital Technology With Accessibility and Privacy of Data,” 2024, pp. 227–245.
[2] S. Alotaibi, K. Alharbi, B. Abaalkhail, and D. M. Ibrahim, “Sensitive Data Exposure: Data Forwarding and Storage on Cloud Environment,” Int. J. online Biomed. Eng., vol. 17, no. 14, pp. 4–18, 2021, doi: 10.3991/IJOE.V17I14.27365.
[3] A. Bhandari, M. K. Ojha, D. K. Choubey, and V. Soni, “Research Article in Special Issue : Selected Papers from the 4th International Conference on Machine Learning , Image Processing , Network Security and Data IoT Based System for Accident Detection , Monitoring and Landslide Detection Using GSM in Hilly Ar,” pp. 104–111, 2023.
[4] R. Hazra, P. Chatterjee, Y. Singh, G. Podder, and T. Das, “Data Encryption and Secure Communication Protocols,” 2024, pp. 546–570.
[5] K. Raut, “A Comprehensive Review of Cryptographic Algorithms,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 9, no. 12, pp. 1750–1756, 2021, doi: 10.22214/ijraset.2021.39581.
[6] P. Sharma, S. Namasudra, R. Gonzalez Crespo, J. Parra-Fuente, and M. Chandra Trivedi, “EHDHE: Enhancing security of healthcare documents in IoT-enabled digital healthcare ecosystems using blockchain,” Inf. Sci. (Ny)., vol. 629, pp. 703–718, Jun. 2023, doi: 10.1016/j.ins.2023.01.148.
[7] S. Bevz, O. Tereshchuk, O. Kravchuk, V. Yehorova, I. Bodnarchuk, and M. Danevych, “Confidential information and the right to freedom of speech,” Int. J. Criminol. Sociol., vol. 10, pp. 648–651, 2021, doi: 10.6000/1929-4409.2021.10.75.
[8] A. Razaque, N. Shaldanbayeva, B. Alotaibi, M. Alotaibi, A. Murat, and A. Alotaibi, “Big data handling approach for unauthorized cloud computing access,” Electron., vol. 11, no. 1, pp. 1–20, 2022, doi: 10.3390/electronics11010137.
[9] Y. S. Santoso, “Message Security Using a Combination of Hill Cipher and RSA Algorithms,” J. Mat. Dan Ilmu Pengetah. Alam LLDikti Wil. 1, vol. 1, no. 1, pp. 20–28, 2021, doi: 10.54076/jumpa.v1i1.38.
[10] H. N. Fakhouri, S. Alawadi, F. M. Awaysheh, F. Hamad, S. Alzubi, and M. N. AlAdwan, “An Overview of using of Artificial Intelligence in Enhancing Security and Privacy in Mobile Social Networks,” in 2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC), Sep. 2023, pp. 42–51, doi: 10.1109/FMEC59375.2023.10305886.
[11] P. M. T. Untawale, “Importance of Cyber Security in Digital Era,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 9, no. 8, pp. 963–966, 2021, doi: 10.22214/ijraset.2021.37519.
[12] R. Zahid et al., “Secure Data Management Life Cycle for Government Big-Data Ecosystem: Design and Development Perspective,” Systems, vol. 11, no. 8, p. 380, Jul. 2023, doi: 10.3390/systems11080380.
[13] M. Hamidouche, B. F. Demissie, and B. Cherif, “Real-time Threat Detection Strategies for Resource-constrained Devices,” in 2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), Apr. 2024, pp. 211–218, doi: 10.1109/DCOSS-IoT61029.2024.00038.
[14] O. Can, F. Thabit, A. O. Aljahdali, S. Al-Homdy, and H. A. Alkhzaimi, “A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing,” Cybern. Syst., vol. 56, no. 5, pp. 413–447, Jul. 2025, doi: 10.1080/01969722.2023.2175117.
[15] N. Wang, W. Zhou, Q. Han, J. Liu, W. Liao, and J. Fu, “A Lightweight Privacy-Preserving Ciphertext Retrieval Scheme Based on Edge Computing,” IEEE Trans. Cloud Comput., vol. 12, no. 4, pp. 1273–1290, Oct. 2024, doi: 10.1109/TCC.2024.3461732.
[16] J. A. Sarumi, “LASUSTECH Multidisciplinary Innovations Conference ( LASUSTECH-MIC ),” no. December 2021, pp. 63–82, 2022.
[17] A. Thakkar and R. Gor, “Cryptographic Method To Enhance Data Security Using Rsa Algorithm and Mellin Transform,” Int. J. Eng. Sci. Technol., vol. 7, no. 2, 2023, doi: 10.29121/ijoest.v7.i2.2023.490.
[18] S. S and B. V Nair, “Survey on Asymmetric Key Cryptographic Algorithms,” Int. J. Sci. Res. Sci. Eng. Technol., vol. 7, no. 2, pp. 404–408, 2020, doi: 10.32628/ijsrset207292.
[19] Maxrizal, S. Irawadi, and Sujono, “Discrete Logarithmic Improvement for ElGamal Cryptosystem Using Matrix Concepts,” 2020 8th Int. Conf. Cyber IT Serv. Manag. CITSM 2020, 2020, doi: 10.1109/CITSM50537.2020.9268832.
[20] R. Ranasinghe and P. Athukorala, “A generalization of the ElGamal public-key cryptosystem,” J. Discret. Math. Sci. Cryptogr., no. May, 2021, doi: 10.1080/09720529.2020.1857902.
[21] J. Jeffries, “Differentiating by Prime Numbers,” Not. Am. Math. Soc., vol. 70, no. 11, p. 1, 2023, doi: 10.1090/noti2833.
[22] K. N. Adédji, F. Luca, and A. Togbé, “On the solutions of the Diophantine equation,” J. Number Theory, vol. 240, pp. 593–610, Nov. 2022, doi: 10.1016/j.jnt.2021.12.008.
[23] D. Kumar Sharma, N. Chidananda Singh, D. A. Noola, A. Nirmal Doss, and J. Sivakumar, “A review on various cryptographic techniques & algorithms,” Mater. Today Proc., vol. 51, no. xxxx, pp. 104–109, 2021, doi: 10.1016/j.matpr.2021.04.583.
[24] F. R. Shareef, “A novel crypto technique based ciphertext shifting,” Egypt. Informatics J., vol. 21, no. 2, pp. 83–90, 2020, doi: 10.1016/j.eij.2019.11.002.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Imanuel Zega, Bagas Dwi Yulianto

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (Attribution-ShareAlike 4.0 International (CC BY-SA 4.0) ) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).








