Next Article in Journal
An Iterative Approach for the Solution of the Constrained OWA Aggregation Problem with Two Comonotone Constraints
Next Article in Special Issue
FIRE: A Finely Integrated Risk Evaluation Methodology for Life-Critical Embedded Systems
Previous Article in Journal
Rebuilding Stakeholder Confidence in Health-Relevant Big Data Applications: A Social Representations Perspective
Previous Article in Special Issue
An Attribute-Based Approach toward a Secured Smart-Home IoT Access Control and a Comparison with a Role-Based Approach
 
 
Article
Peer-Review Record

Secure Sensitive Data Sharing Using RSA and ElGamal Cryptographic Algorithms with Hash Functions

Information 2022, 13(10), 442; https://doi.org/10.3390/info13100442
by Emmanuel A. Adeniyi 1, Peace Busola Falola 1, Mashael S. Maashi 2, Mohammed Aljebreen 3 and Salil Bharany 4,*
Reviewer 1: Anonymous
Reviewer 2:
Information 2022, 13(10), 442; https://doi.org/10.3390/info13100442
Submission received: 24 July 2022 / Revised: 10 September 2022 / Accepted: 16 September 2022 / Published: 20 September 2022
(This article belongs to the Special Issue Secure and Trustworthy Cyber–Physical Systems)

Round 1

Reviewer 1 Report

Regarding the content, I do not have any changes to recommend, it makes a good literary review to support the relevance of the problem to be studied and a good structuring of the content, it uses the correct methodology for this type of study and it is a consistent and well-detailed methodology to give significance to the results they show, makes a good discussion of the results with respect to the studies carried out previously, and marks the conclusion obtained well.

Although I advise looking at these things:

A table or figure should never appear without reference to it in the previous text. This does not happen in figures 1 and 2, and in the tables of the article. You can use: See Figure 1 or See Table 1.

In sections 3.1.1, 3.1.2, 3.1.3 and 3.1.4, in the paragraph before the table, leave only the table and the title of the table, the rest of the text (when you start talking about the figure), put that text below the table (and before the figure) better. And before the enumeration of the table and its title, talk a couple of lines about what is going to be seen in the table and quote the table (as I told you in the previous paragraph).

In the section “4. Discussion”, you must add a subsection that includes a comparison of the results achieved with the results achieved in previous studies, citing and referencing said studies.

In the section “5. Conclusions”, it is necessary to develop a deeper analysis of the conclusions, implications and limitations of the study. In addition to the possible future lines of research opened with this research.

And the references in the 'References' section must follow the model set by the journal. You must correct the errors that exist. Look at this in the template.

 

Author Response

S/N

Reviewer comments

Author response

 

Regarding the content, I do not have any changes to recommend, it makes a good literary review to support the relevance of the problem to be studied and a good structuring of the content, it uses the correct methodology for this type of study and it is a consistent and well-detailed methodology to give significance to the results they show, makes a good discussion of the results with respect to the studies carried out previously, and marks the conclusion obtained well.

Thank you for your suggestions and appreciation  sir .

1.

A table or figure should never appear without reference to it in the previous text. This does not happen in figures 1 and 2, and in the tables of the article. You can use: See Figure 1 or See Table 1.

Author response: Figure 1 which describe the basic illustration of the encryption and description process and figure 2 which describe the system flow diagram while table 1 describes the summary of the literature. Each of which has been made reference to in the text that preceded each of them

 

Changed made #1 those figures and tables now appears with references as “Figure 1 displayed the process the plaintext passed through before turning into a ciphertext and then back to the plaintext”.  This is applicable to table 1 and table 2.

2.

In sections 3.1.1, 3.1.2, 3.1.3 and 3.1.4, in the paragraph before the table, leave only the table and the title of the table, the rest of the text (when you start talking about the figure), put that text below the table (and before the figure) better. And before the enumeration of the table and its title, talk a couple of lines about what is going to be seen in the table and quote the table (as I told you in the previous paragraph).

Author response: Section 3.1.1 now has a paragraph that describe what the table contains. The table 2 now has only the title of the table while the remaining text that describe the figure has been moved below to the table. This is also applicable to section 3.1.2, section 3.1.3 and section 3.1.4.

 

Changed made: Thankyou for your suggestions sir . these are the changes that was made to section 3.1.1 which also applied to other section. Various files of different sizes were encrypted using RSA and ElGamal cryptographic algorithms. The encryption time of both algorithms was obtained and placed in a tabular form. See table 2.

 

3.

In the section “4. Discussion”, you must add a subsection that includes a comparison of the results achieved with the results achieved in previous studies, citing and referencing said studies.

Author response: Thankyou for your suggestions sir . section 4 describe the discussion of the result of this study. The summary of the discussion stated that each of the algorithms perform better over the other in some processes, however, there is no obvious superiority of one cryptosystem over the other in all the processes of encryption, decryption, signature generation and signature verification.

 

Changed made: A subsection 4.1 titled “Findings and Comparison with Existing work was added. This section describes the finding of this study and compares the result of this study with the existing literature. the finding in this study is in accordance with Hamza, & Al-Alak [19]. Burr [10]. This finding in this study is in accordance with Haque et al., [17] study. However, outperform haque et al., [17] study by implementing SHA-256 to achieve data integrity.

4.

In the section “5. Conclusions”, it is necessary to develop a deeper analysis of the conclusions, implications and limitations of the study. In addition to the possible future lines of research opened with this research.

Thankyou for your suggestions sir . Section 5 of this study gives the conclusion of the study. The conclusion was structured in a way that gives the recommendation for further studies.

 

Therefore, it is recommended that further implementation such as secure submission, storage, and extraction operations of system sensitive should be implemented for full and maximum protection of sensitive data

5.

And the references in the 'References' section must follow the model set by the journal. You must correct the errors that exist. Look at this in the template.

Thank you for your suggestions, sir, All the references cited in this study are listed in this reference section were drafted using the journal template. The template is critical followed while submitting updated manuscript.

Reviewer 2 Report

The paper presents 'Secure Sensitive Data Sharing using RSA and ElGamal Cryptographic algorithms with Hash Functions'. In the literature review, critical discussion is missing and why the proposed system is presented. Table 1 also does not convert any meaningful information. Figure 1 is very basic figure in this area (also even the spelling of encryption and decryption are incorrect in Fig 1). The novelty or proposed work is vague and significant improvements are required. Comparison with latest state-of-the art paper is missing. 

Author Response

S/N

Reviewer comments

Author response

1.

In the literature review, critical discussion is missing and why the proposed system is presented.

Author response: The literature section gives the work done by previous authors in this field and provides their results and limitation for future works. Their limitation was built upon to implement the secure sensitive data sharing using RSA and ElGamal algorithms with SHA-256. This was proposed to enhance the integrity of data compares to other literature that only used either DSA, HASH, or encryption algorithms separately.

 

This study tends to establish data integrity of RSA and ElGamal cryptographic procedures that use the creation and validation of signatures

2.

Table 1 also does not convert any meaningful information.

Author response: Table 1 describes the summary of the literature which provide the tabular explanation of the related works to this study. This make it easy for the reader to read through for better understanding.

 

Changed made: A new column has been added to the table 1. This column give the limitation of each work reviewed which provides more clarification to this study.

 

3.

Figure 1 is very basic figure in this area (also even the spelling of encryption and decryption are incorrect in Fig 1).

Author response:thankyou for your suggestions sir Figure 1 was there to give the basic process of data from the plaintext to ciphertext and the action that takes place and then back to plaintext with the action that causes the transformation in a simple form.

 

Changed made: The spelling of the encryption and decryption has been adjusted. That’s the font size of the encryption and decryption that makes it incomplete has been reduced and the whole text body is now showing on a single line.

4.

The novelty or proposed work is vague and significant improvements are required. Comparison with latest state-of-the art paper is missing. 

 

Thankyou for your suggestions sir ,The novelty of the study was discussed in the concluding paragraph of the introduction. It was also made mention in the literature section as well as in the discussion section. The novelty of the study is to enhance the integrity and security of data using RSA and ElGamal encryption algorithm with SHA-256 compare to various previous studies that uses only either DSA, Encryption algorithm or SHA-1 and SHA-2 in a separate context.

 

As explained earlier, the state-of-the-art paper presented the used of Encryption Algorithm, DSA, SHA-1 and SHA-2 in a separate context while this study uses the SHA-256 to enhance data security and integrity in a single context.

Round 2

Reviewer 2 Report

Many changes have been made. Recommended for publication. 

Back to TopTop