A Computational Enhancement Of Base64 Algorithm Using Residue Number System Algorithms

Authors

DOI:

https://doi.org/10.61220/scientist.v3i1.20251

Keywords:

Base64 Algorithm, Chiper Key, RNS Algorithms, XOR Operation, Encryption

Abstract

A significant part of information security has been played by cryptography techniques. Today's daily existence depends heavily on the advancement of data, information, and communication technologies. Consequently, there is a huge increase in the need for data and information. In communicating data over a public network, data security is a necessity that must be carefully taken into consideration. Thus, Base64 algorithm has been used in numerous security applications for ensuring data confidentiality, integrity and authentication. However, research shows that there is security vulnerabilities in most widely used Base64 algorithm due to the absence of key mechanism. To address this concern, this research employs residue number system algorithms for the enhancement of base64 algorithm because of its cryptographic features whereby strengthen the transformation of the existing base64 algorithm to produce a novel symmetric-based cryptographic algorithm. The developed algorithm generates a symmetric key by shuffling the original key with the textual data, making the transformation of each character of the data better each time it is shuffled. Therefore, the research bridges the security gap in Base64 cryptographic algorithm by factoring key mechanism of RNS based algorithm into the newly developed algorithm. In addition, the developed symmetric-based cryptographic algorithm is more robust than the existing Base64 cryptographic algorithm because of the planned pattern and confusion produced during the methodology procedure thereby safeguards the data more effectively as shown in the cipher text generated.

Downloads

Download data is not yet available.

References

J. Eseyin and K. . A. Gbolagade, “A Residue Number System Based Data Hiding Using Steganography and Cryptography,” Kampala Int. Univ. KIU KIU J. Soc. Sci., vol. 5, no. 2, pp. 345–351, 2019.

H. Agusta, “Keamanan dan Akses Data Pribadi Penerima Pinjaman Dalam Peer to Peer Lending di Indonesia,” KRTHA BHAYANGKARA, vol. 15, no. 1, pp. 11–38, May 2021, doi: 10.31599/krtha.v15i1.289.

F. Baso, “Analysis and Utilization of the Base64 Algorithm for Image Encryption and Decryption Security in Web-Based Images,” J. Secur. Comput. Inf. Embed. Netw. Intell. Syst., pp. 52–57, Dec. 2023, doi: 10.61220/scientist.v1i2.20233.

K. B. Logunleko, O. D. Adeniji, A. M. Logunleko, and M. O. Odufowora, “Data Encryption Scheme Using An Enhanced Base64 Algorithm,” Univ. Ib. J. Sci. Log. ICT Res. UIJSLICTR, vol. Vol. 3, no. No. 1, pp. 16–24, Aug. 2020.

M. Victor, D. D. W. Praveenraj, S. R, A. Alkhayyat, and A. Shakhzoda, “Cryptography: Advances in Secure Communication and Data Protection,” E3S Web Conf., vol. 399, p. 07010, 2023, doi: 10.1051/e3sconf/202339907010.

C. Sarath, Sugadev. S, S. Chandragandhi, Akshai Kannan, and Kamalesh M, “Secure Message Transmission Using Base 64 Algorithm,” Int. Adv. Res. J. Sci. Eng. Technol., vol. 08, no. 04, pp. 52–55, 2021, doi: 10.17148/IARJSET.2021.8411.

M. Efendi, V. Sihombing, and S. Parulian, “Implementation and Use of Base64 Algorithm in Video File Security,” Sinkron, vol. 7, p. 1, 2022, doi: https://doi.org/10.33395/sinkron.v7i1.11256.

I. Sumartono, A. P. U. Siahaan, and Arpan, “Base64 Character Encoding and Decoding Modeling,” Int. J. Recent Trends Eng. Res. IJRTER, vol. 02, no. 12, pp. 63–68, 2016.

B. Asaju, D. Popoola, and K. Gbolagade, “Enhancing Image Security Using Data Encryption Standard, Discrete Wavelet Tranfrom Watermarking, Residue Number System and Gaussian Filtering,” Afr. Sch. J. Afr. Innov. Adv. Stud., vol. 25, no. 2, pp. 19–40, 2022.

S. M. Naser, “Cryptography: From the Ancient History to now, It’s applications and a new complete numerical model,” Int. J. Math. Stat. Stud., vol. 9, no. 3, pp. 11–30, 2021.

Stanislaw Zawislak, Mykhailo Kasianchuk, Igor Iakymenko, and Daniel Jancarczyk, “Methods of crypto-stable symmetric encryption in the residual number system,” Elsevier, vol. 207, pp. 128–137, 2022.

I. A. Aremu and K. A. Gbolagade, “Information encoding and decoding using Residue Number System for {22n -1, 22n, 22n+1} moduli sets,” Int. J. Adv. Res. Comput. Eng. Technol. IJARCET, vol. 6, no. 8, pp. 1260–1267, 2017.

A. N. Babatunde and A. A. Oloyede, “Application of Residue Number Systems in enhancing the transmission of secured videos,” Rev. Rom. Informatică Și Autom., vol. 31, no. 4, 2021, doi: 10.33436/v31i4y202108.

K. Thiagarajan, P. Balasubramanian, J. Nagaraj, and J. Padmashree, “Encryption and decryption algorithm using algebraic matrix approach,” J. Phys. Conf. Ser., vol. 1000, p. 012148, Apr. 2018, doi: 10.1088/1742-6596/1000/1/012148.

D. R. Stinson, Maura. B. Paterson, and M. P. Paterson, Cryptography : Theory and Practice. in Forth Edition. CRC Press Taylor & Francis Group LLC, 6000 Broken Sound Parkway NW, Suite 300, Boca Raton London New York, FL 33487-2742, 2019. [Online]. Available: https://taylorandfrancis.com/

Downloads

Published

2025-06-01

Citation

Issue

Section

Articles

How to Cite

A Computational Enhancement Of Base64 Algorithm Using Residue Number System Algorithms. (2025). Journal of Security, Computer, Information, Embedded, Network, and Intelligence System, 1-7. https://doi.org/10.61220/scientist.v3i1.20251