Enhancing the Encryption Capabilities of the Generalization of the ElGamal Algorithm for Document Security

Authors

  • Imanuel Zega Sistem Informasi, Universitas Pignatelli Triputra
  • Bagas Dwi Yulianto Informatika, Universitas Pignatelli Triputra

DOI:

https://doi.org/10.30871/jaic.v9i4.9737

Keywords:

Algorithm efficiency, Cryptography, Digital document security, Generalization of the ElGama, Security

Abstract

The development of cryptographic algorithms that are efficient in terms of computation and resource usage, in addition to maintaining the confidentiality, integrity, and authentication of information, is driven by the growing need for digital document security. The generalization of the ElGamal, an expansion of the traditional ElGamal algorithm with more adaptable encryption features, is one algorithm with a lot of promise in this situation. The implementation of the technique of splitting the plaintext into three-digit blocks to lower the complexity of encryption per character and the use of large prime numbers to increase the algorithm's mathematical complexity are the two main ways that this study seeks to increase the algorithm's efficiency and security. It is anticipated that this method will speed up computation time and simplify the encryption process per character without compromising security. The overall findings demonstrate that, without compromising security, this method dramatically cuts down on computation time and ciphertext enlargement. Therefore, in the age of digital transformation, the findings of this study aid in the creation of contemporary cryptographic algorithms that are more flexible and effective and serve as a strategic guide when creating a strong digital data security system.

Downloads

Download data is not yet available.

References

[1] S. Kanojia, “Digitalization in Corporations: Integrating Utility of Digital Technology With Accessibility and Privacy of Data,” 2024, pp. 227–245.

[2] S. Alotaibi, K. Alharbi, B. Abaalkhail, and D. M. Ibrahim, “Sensitive Data Exposure: Data Forwarding and Storage on Cloud Environment,” Int. J. online Biomed. Eng., vol. 17, no. 14, pp. 4–18, 2021, doi: 10.3991/IJOE.V17I14.27365.

[3] A. Bhandari, M. K. Ojha, D. K. Choubey, and V. Soni, “Research Article in Special Issue : Selected Papers from the 4th International Conference on Machine Learning , Image Processing , Network Security and Data IoT Based System for Accident Detection , Monitoring and Landslide Detection Using GSM in Hilly Ar,” pp. 104–111, 2023.

[4] R. Hazra, P. Chatterjee, Y. Singh, G. Podder, and T. Das, “Data Encryption and Secure Communication Protocols,” 2024, pp. 546–570.

[5] K. Raut, “A Comprehensive Review of Cryptographic Algorithms,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 9, no. 12, pp. 1750–1756, 2021, doi: 10.22214/ijraset.2021.39581.

[6] P. Sharma, S. Namasudra, R. Gonzalez Crespo, J. Parra-Fuente, and M. Chandra Trivedi, “EHDHE: Enhancing security of healthcare documents in IoT-enabled digital healthcare ecosystems using blockchain,” Inf. Sci. (Ny)., vol. 629, pp. 703–718, Jun. 2023, doi: 10.1016/j.ins.2023.01.148.

[7] S. Bevz, O. Tereshchuk, O. Kravchuk, V. Yehorova, I. Bodnarchuk, and M. Danevych, “Confidential information and the right to freedom of speech,” Int. J. Criminol. Sociol., vol. 10, pp. 648–651, 2021, doi: 10.6000/1929-4409.2021.10.75.

[8] A. Razaque, N. Shaldanbayeva, B. Alotaibi, M. Alotaibi, A. Murat, and A. Alotaibi, “Big data handling approach for unauthorized cloud computing access,” Electron., vol. 11, no. 1, pp. 1–20, 2022, doi: 10.3390/electronics11010137.

[9] Y. S. Santoso, “Message Security Using a Combination of Hill Cipher and RSA Algorithms,” J. Mat. Dan Ilmu Pengetah. Alam LLDikti Wil. 1, vol. 1, no. 1, pp. 20–28, 2021, doi: 10.54076/jumpa.v1i1.38.

[10] H. N. Fakhouri, S. Alawadi, F. M. Awaysheh, F. Hamad, S. Alzubi, and M. N. AlAdwan, “An Overview of using of Artificial Intelligence in Enhancing Security and Privacy in Mobile Social Networks,” in 2023 Eighth International Conference on Fog and Mobile Edge Computing (FMEC), Sep. 2023, pp. 42–51, doi: 10.1109/FMEC59375.2023.10305886.

[11] P. M. T. Untawale, “Importance of Cyber Security in Digital Era,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 9, no. 8, pp. 963–966, 2021, doi: 10.22214/ijraset.2021.37519.

[12] R. Zahid et al., “Secure Data Management Life Cycle for Government Big-Data Ecosystem: Design and Development Perspective,” Systems, vol. 11, no. 8, p. 380, Jul. 2023, doi: 10.3390/systems11080380.

[13] M. Hamidouche, B. F. Demissie, and B. Cherif, “Real-time Threat Detection Strategies for Resource-constrained Devices,” in 2024 20th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), Apr. 2024, pp. 211–218, doi: 10.1109/DCOSS-IoT61029.2024.00038.

[14] O. Can, F. Thabit, A. O. Aljahdali, S. Al-Homdy, and H. A. Alkhzaimi, “A Comprehensive Literature of Genetics Cryptographic Algorithms for Data Security in Cloud Computing,” Cybern. Syst., vol. 56, no. 5, pp. 413–447, Jul. 2025, doi: 10.1080/01969722.2023.2175117.

[15] N. Wang, W. Zhou, Q. Han, J. Liu, W. Liao, and J. Fu, “A Lightweight Privacy-Preserving Ciphertext Retrieval Scheme Based on Edge Computing,” IEEE Trans. Cloud Comput., vol. 12, no. 4, pp. 1273–1290, Oct. 2024, doi: 10.1109/TCC.2024.3461732.

[16] J. A. Sarumi, “LASUSTECH Multidisciplinary Innovations Conference ( LASUSTECH-MIC ),” no. December 2021, pp. 63–82, 2022.

[17] A. Thakkar and R. Gor, “Cryptographic Method To Enhance Data Security Using Rsa Algorithm and Mellin Transform,” Int. J. Eng. Sci. Technol., vol. 7, no. 2, 2023, doi: 10.29121/ijoest.v7.i2.2023.490.

[18] S. S and B. V Nair, “Survey on Asymmetric Key Cryptographic Algorithms,” Int. J. Sci. Res. Sci. Eng. Technol., vol. 7, no. 2, pp. 404–408, 2020, doi: 10.32628/ijsrset207292.

[19] Maxrizal, S. Irawadi, and Sujono, “Discrete Logarithmic Improvement for ElGamal Cryptosystem Using Matrix Concepts,” 2020 8th Int. Conf. Cyber IT Serv. Manag. CITSM 2020, 2020, doi: 10.1109/CITSM50537.2020.9268832.

[20] R. Ranasinghe and P. Athukorala, “A generalization of the ElGamal public-key cryptosystem,” J. Discret. Math. Sci. Cryptogr., no. May, 2021, doi: 10.1080/09720529.2020.1857902.

[21] J. Jeffries, “Differentiating by Prime Numbers,” Not. Am. Math. Soc., vol. 70, no. 11, p. 1, 2023, doi: 10.1090/noti2833.

[22] K. N. Adédji, F. Luca, and A. Togbé, “On the solutions of the Diophantine equation,” J. Number Theory, vol. 240, pp. 593–610, Nov. 2022, doi: 10.1016/j.jnt.2021.12.008.

[23] D. Kumar Sharma, N. Chidananda Singh, D. A. Noola, A. Nirmal Doss, and J. Sivakumar, “A review on various cryptographic techniques & algorithms,” Mater. Today Proc., vol. 51, no. xxxx, pp. 104–109, 2021, doi: 10.1016/j.matpr.2021.04.583.

[24] F. R. Shareef, “A novel crypto technique based ciphertext shifting,” Egypt. Informatics J., vol. 21, no. 2, pp. 83–90, 2020, doi: 10.1016/j.eij.2019.11.002.

Downloads

Published

2025-08-03

How to Cite

[1]
I. Zega and B. D. Yulianto, “Enhancing the Encryption Capabilities of the Generalization of the ElGamal Algorithm for Document Security”, JAIC, vol. 9, no. 4, pp. 1266–1271, Aug. 2025.

Issue

Section

Articles

Similar Articles

<< < 3 4 5 6 7 > >> 

You may also start an advanced similarity search for this article.