IMPLEMENTATION OF RSA AND ELGAMAL ALGORITHMS FOR SECURING VIDEO FILES
DOI:
https://doi.org/10.70248/jdaics.v2i4.3070Keywords:
RSA, ElGamal, Cryptography, Video Security, Data EncryptionAbstract
The rapid development of information and communication technology has made it an essential part of modern life. Among its many applications, the transmission of video data has become increasingly common, but ensuring its confidentiality and integrity remains a major challenge. Video messages, particularly those containing personal or sensitive information, are vulnerable to interception and unauthorized access when transmitted over public networks. To address this issue, cryptographic methods are employed to transform the original video file (plaintext) into an encrypted form (cipher text), which can only be decrypted with the correct key. Previous studies highlight that while RSA offers a relatively simple encryption mechanism, it is often considered insufficient as a standalone approach. Therefore, this study investigates the combined implementation of RSA and ElGamal algorithms to enhance video file security by leveraging the strengths of both techniques. The experimental results demonstrate that the integration of RSA and ElGamal algorithms can successfully encrypt and decrypt video files, ensuring data confidentiality. Encrypted videos cannot be accessed without the appropriate private key, which safeguards sensitive content from unauthorized parties. Furthermore, RSA is found to be simpler to apply, while ElGamal provides stronger security based on the discrete logarithm problem. Overall, the proposed system effectively maintains both the confidentiality and integrity of video files, thereby improving the security of multimedia data transmission.
References
R. Prasad and V. Rohokale, Cyber security: the lifeline of information and communication technology. Springer, 2020.
R. Imam, Q. M. Areeb, A. Alturki, and F. Anwer, “Systematic and critical review of rsa based public key cryptographic schemes: Past and present status,” IEEE access, vol. 9, pp. 155949–155976, 2021.
M. S. Kumar, V. Balaji, and S. Sakkarapani, “Optimized-Memory and Enhanced-Security Approaches to RSA and ElGamal,” in 2025 International Conference on Multi-Agent Systems for Collaborative Intelligence (ICMSCI), IEEE, 2025, pp. 154–160.
A. Philips, J. Jayaraj, J. FT, and V. P, “Enhanced RSA key encryption application for metering data in smart grid,” Int. J. pervasive Comput. Commun., vol. 17, no. 5, pp. 596–610, 2021.
E. Aderemi and O. Olugbara, “Computational complexity of rsa and elgamal cryptographic algorithms on video data,” J. Theor. Appl. Inf. Technol., vol. 100, no. 15, 2020.
K. Umamaheswari, D. Vengaimarbhan, M. Sathyanarayanan, and S. Kanimozhi, “Enhancing Data Security in Android Systems through an Intermediary Layer for Unauthorized Access Prevention,” in 2025 6th International Conference for Emerging Technology (INCET), IEEE, 2025, pp. 1–8.
R. Silalahi, I. Parlina, S. Sumarno, I. Gunawan, and W. Saputra, “Implementasi Algoritma Caesar Cipher dan Algoritma RSA untuk Keamanan Data Surat Wasiat pada Kantor Notaris/PPAT Robert Tampubolon, SH,” J. Sos. Teknol., vol. 1, no. 4, pp. 282–293, 2021.
K. Assa-Agyei, “Enhancing the Performance of Cryptographic Algorithms for Secured Data Transmission,” 2024, Nottingham Trent University (United Kingdom).
H. Fajar, M. A. Irwansyah, and A. S. Sukamto, “PENERAPAN ALGORITMA SKIPJACK UNTUK PENYANDIAN FILE MULTI FORMAT,” JURISTI (Jurnal Ris. Sains dan Teknol. Inform., vol. 1, no. 1, pp. 133–140.
C. L. Chowdhary, P. V. Patel, K. J. Kathrotia, M. Attique, K. Perumal, and M. F. Ijaz, “Analytical study of hybrid techniques for image encryption and decryption,” Sensors, vol. 20, no. 18, p. 5162, 2020.
H. Touil, N. El Akkad, and K. Satori, “Text encryption: hybrid cryptographic method using Vigenere and Hill Ciphers,” in 2020 International Conference on Intelligent Systems and Computer Vision (ISCV), IEEE, 2020, pp. 1–6.
R. Banoth and R. Regar, “An introduction to classical and modern cryptography,” in Classical and Modern Cryptography for Beginners, Springer, 2023, pp. 1–46.
Y. Awad, D. Jomaa, Y. Alkhezi, and R. Hindi, “A NEW APPROACH COMBINING RSA AND ELGAMAL ALGORITHMS: ADVANCEMENTS IN ENCRYPTION AND DIGITAL SIGNATURES USING GAUSSIAN INTEGERS.,” Jordanian J. Comput. Inf. Technol., vol. 11, no. 1, 2025.
S. Kumar and D. Sharma, “A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm,” Artif. Intell. Rev., vol. 57, no. 4, p. 87, 2024.
F. Hermawan, A. Hanifah, S. Alamsah, and R. K. Harryes, “Analisis catch per unit effort pole and line cakalang (Katsuwonus pelamis) di perairan Kupang,” J. Marshela (Marine Fish. Trop. Appl. Journal), vol. 2, no. 1, pp. 23–33, 2024.
R. Shneor and A. A. Vik, “Crowdfunding success: a systematic literature review 2010–2017,” Balt. J. Manag., vol. 15, no. 2, pp. 149–182, 2020.
R. Prasad and V. Rohokale, Cyber security: the lifeline of information and communication technology. Springer, 2020.
R. Imam, Q. M. Areeb, A. Alturki, and F. Anwer, “Systematic and critical review of rsa based public key cryptographic schemes: Past and present status,” IEEE access, vol. 9, pp. 155949–155976, 2021.
M. S. Kumar, V. Balaji, and S. Sakkarapani, “Optimized-Memory and Enhanced-Security Approaches to RSA and ElGamal,” in 2025 International Conference on Multi-Agent Systems for Collaborative Intelligence (ICMSCI), IEEE, 2025, pp. 154–160.
A. Philips, J. Jayaraj, J. FT, and V. P, “Enhanced RSA key encryption application for metering data in smart grid,” Int. J. pervasive Comput. Commun., vol. 17, no. 5, pp. 596–610, 2021.
E. Aderemi and O. Olugbara, “Computational complexity of rsa and elgamal cryptographic algorithms on video data,” J. Theor. Appl. Inf. Technol., vol. 100, no. 15, 2020.
K. Umamaheswari, D. Vengaimarbhan, M. Sathyanarayanan, and S. Kanimozhi, “Enhancing Data Security in Android Systems through an Intermediary Layer for Unauthorized Access Prevention,” in 2025 6th International Conference for Emerging Technology (INCET), IEEE, 2025, pp. 1–8.
R. Silalahi, I. Parlina, S. Sumarno, I. Gunawan, and W. Saputra, “Implementasi Algoritma Caesar Cipher dan Algoritma RSA untuk Keamanan Data Surat Wasiat pada Kantor Notaris/PPAT Robert Tampubolon, SH,” J. Sos. Teknol., vol. 1, no. 4, pp. 282–293, 2021.
K. Assa-Agyei, “Enhancing the Performance of Cryptographic Algorithms for Secured Data Transmission,” 2024, Nottingham Trent University (United Kingdom).
H. Fajar, M. A. Irwansyah, and A. S. Sukamto, “PENERAPAN ALGORITMA SKIPJACK UNTUK PENYANDIAN FILE MULTI FORMAT,” JURISTI (Jurnal Ris. Sains dan Teknol. Inform., vol. 1, no. 1, pp. 133–140.
C. L. Chowdhary, P. V. Patel, K. J. Kathrotia, M. Attique, K. Perumal, and M. F. Ijaz, “Analytical study of hybrid techniques for image encryption and decryption,” Sensors, vol. 20, no. 18, p. 5162, 2020.
H. Touil, N. El Akkad, and K. Satori, “Text encryption: hybrid cryptographic method using Vigenere and Hill Ciphers,” in 2020 International Conference on Intelligent Systems and Computer Vision (ISCV), IEEE, 2020, pp. 1–6.
R. Banoth and R. Regar, “An introduction to classical and modern cryptography,” in Classical and Modern Cryptography for Beginners, Springer, 2023, pp. 1–46.
Y. Awad, D. Jomaa, Y. Alkhezi, and R. Hindi, “A NEW APPROACH COMBINING RSA AND ELGAMAL ALGORITHMS: ADVANCEMENTS IN ENCRYPTION AND DIGITAL SIGNATURES USING GAUSSIAN INTEGERS.,” Jordanian J. Comput. Inf. Technol., vol. 11, no. 1, 2025.
S. Kumar and D. Sharma, “A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm,” Artif. Intell. Rev., vol. 57, no. 4, p. 87, 2024.
F. Hermawan, A. Hanifah, S. Alamsah, and R. K. Harryes, “Analisis catch per unit effort pole and line cakalang (Katsuwonus pelamis) di perairan Kupang,” J. Marshela (Marine Fish. Trop. Appl. Journal), vol. 2, no. 1, pp. 23–33, 2024.
R. Shneor and A. A. Vik, “Crowdfunding success: a systematic literature review 2010–2017,” Balt. J. Manag., vol. 15, no. 2, pp. 149–182, 2020.
















