In the age of ubiquitous digital information, ensuring data security is a pressing concern. This research paper introduces an innovative approach to fortify data security through a combination of hybrid encryption, involving the Advanced Encryption Standard (AES) and RSA, with the integration of kernel-based key storage. The goal is to address vulnerabilities associated with traditional RSA encryption methods, especially the well-documented factorization attacks, and to present a multi-faceted security strategy that raises the bar for safeguarding sensitive data.
The research journey commences by employing AES, a symmetric block cipher, to encrypt files with a 128-bit key randomly generated for each encryption instance. To add an extra layer of security, the AES key is further encrypted with a robust RSA 2048-bit public key. This initial stage represents a sound encryption approach widely used in industry and government sectors.
What distinguishes this research is the novel introduction of kernel-based key storage. In this process, the contents of the RSA key are securely transferred to the kernel's user space. This affords a protected environment, within the operating system's kernel, which effectively isolates and hides sensitive key materials, thereby making it exceedingly challenging for unauthorized parties to gain access to this vital component of the encryption system.
The decryption phase involves a carefully orchestrated process of retrieving the RSA key content from the kernel, utilizing the RSA private key to decrypt the AES key, and subsequently decrypting the encoded file. This multi-layered security strategy, combining AES-RSA hybrid encryption with kernel-based key storage, offers a robust defence against data breaches, unauthorized access, and mitigates the risks associated with RSA vulnerabilities.
The research findings clearly demonstrate that this approach substantially strengthens data security, effectively mitigating the risks associated with RSA vulnerabilities and ensuring that sensitive information remains confidential and well-protected. This research contribution significantly advances the state of data security, reinforcing the principles of confidentiality and integrity in the ever-evolving landscape of digital information, and it is poised to become an essential addition to the field of data security and cryptography.