A Novel and Secure Fake‑Modulus Based Rabin‑ Ӡ Cryptosystem

: Electronic commerce(E‑commerce) transactions require secure communication to protect sensitive information such as credit card numbers, personal identification


Introduction
Secure transaction in e-commerce refers to the safe and secure exchange of information and money between buyers and sellers in an online marketplace.E-commerce has revolutionized the way people buy and sell goods and services, making it easy for customers to shop from anywhere in the world, at any time of the day.The convenience of online shopping has also led to the need for secure transactions to protect both buyers and sellers from online threats and fraud.However, with the growth of e-commerce, there have also been concerns about the security of online transactions.Here are some of the most common security issues of e-commerce:

•
Payment Security: One of the biggest concerns for consumers when shopping online is the security of their payment information.Cybercriminals may intercept and steal sensitive data such as credit card numbers, names, and addresses.To prevent this, it's important for e-commerce websites to have strong encryption protocols to protect customer data.

•
Data Privacy: Customers share a lot of personal information when they make an online purchase.This data may include names, addresses, phone numbers, and email addresses.If this data falls into the wrong hands, it can be used for identity theft or other criminal activities.Businesses must ensure that they are handling this data securely, with proper encryption, storage, and access controls.

•
Phishing and Malware Attacks: Cybercriminals often use phishing and malware attacks to steal sensitive information from customers.Phishing attacks involve sending fake emails or websites that appear to be legitimate to trick customers into sharing their personal information.Malware attacks involve installing malicious software on a customer's computer to steal data.E-commerce businesses should be vigilant in monitoring for these attacks and should have strong anti-malware and anti-phishing measures in place.

•
Website Security: The security of e-commerce websites is also critical to protect against hacking and data breaches.Businesses should ensure that their websites are secure with SSL/TLS encryption, firewalls, and other security measures.They should also monitor for suspicious activity, such as multiple failed login attempts.
Secure transactions in e-commerce are crucial to maintaining the trust of customers and ensuring the safety and security of online transactions.E-commerce platforms must employ various security measures to protect the sensitive information of buyers and sellers and prevent fraudulent activities.They are encryption, authentication, and secure payment systems.
Encryption ensures that sensitive information such as credit card details, passwords, and personal data are securely transmitted over the internet, making it difficult for hackers to intercept or steal such information.Authentication involves verifying the identity of users, ensuring that only authorized individuals have access to sensitive information.Secure payment systems ensure that the payment information is transmitted securely, preventing unauthorized access and fraudulent activities.This involves the use of secure payment gateways, which encrypt and process the payment information, ensuring that the transaction is secure and protected [1].
Encryption is the process of converting plaintext into a coded form, making it unreadable to unauthorized users.Public key cryptography, such as the RSA (Rivest, Shamir, and Adleman) and Rabin cryptosystems, are widely used encryption techniques that ensure electronic commerce transactions' confidentiality, integrity, and authenticity.

Related Work
RSA cryptography is the oldest, most used, and most efficient of the various publickey cryptosystems, developed by Rivest et al. [2] in 1978.Rivest et al. [3] first proposed the problem of factorization in the year 1978.However, RSA's security [4] cannot be guaranteed theoretically; it is a slow algorithm that can only encrypt a small amount of data simultaneously.There have been several attempts to overcome the limitations of the RSA algorithm.Michael O. Rabin [5] made one such attempt in 1979.To increase the speed of the encryption of RSA, he proposed a variant of RSA, later known as Rabin's cryptography.Rabin is essentially RSA with the optimal choice of public key exponent (e), where encryp- tion uses integer two as the public key exponent, which takes a shorter computation time for encryption.This feature makes the Rabin cryptosystem relatively faster in encryption than Standard RSA.Rabin algorithm makes use of two keys like RSA.Here, the public key is a common modulus (n), and the private keys are the prime factors used to compute n.Hence, the security of the Rabin algorithm entirely depends on n.In cryptanalysis, determining the factors of common modulus n plays a vital role.If someone breaks the factor, obtaining the message becomes an easy task.Using the Rabin cryptosystem, getting plaintext back from the cipher text is considered as hard as factoring.Because of this feature, Rabin cryptosystem is used in numerous research applications [6][7][8][9].Rabin cryptography can secure e-commerce transactions by encrypting sensitive information using the public key and decrypting it using the private key.
Here is an example of a secure transaction using Rabin cryptography: 1.
Alice wants to purchase a book from an online store.

2.
The online store has a publicly available public key.

3.
Alice uses Rabin encryption to encrypt her credit card information and other personal data using the online store's public key.This generates the ciphertext.

4.
Alice sends the ciphertext to the online store.

5.
The online store receives the ciphertext and uses its private key to decrypt the message.6.
The online store processes the transaction and sends a confirmation message to Alice.7.
The confirmation message is encrypted using Alice's public key.8.
Alice receives the encrypted confirmation message and uses her private key to decrypt it.
In this example, Rabin cryptography ensures that Alice's credit card information and personal data are secure during the transaction.The online store's public key encrypts Alice's information, and only the online store's private key can decrypt the ciphertext.Similarly, Alice's public key encrypts the confirmation message, and only Alice's private key can decrypt the message.This provides a secure way for Alice and the online store to exchange information without the risk of unauthorized access or interception.It's important to note that Rabin cryptography are susceptible to brute force attacks and side-channel attacks.Therefore, using a secure implementation of these algorithms and keeping the private keys secure is essential.To improve the security of the Rabin cryptosystem, researchers contributed several ideas to make the Rabin cryptosystem strong.The following section discusses enhancements made in the Rabin cryptosystem to achieve extraordinary results in security.
Williams [5] uses unique prime numbers to make the system more efficient using the quadratic residue theory and the Jacobi symbol in the decryption.This leads to obtaining a proper message back out of four decrypted values.However, this technique results in Poor performance due to the involvement of the Jacobi symbol computation in the encryption and decryption process, causing increased computational complexity and the need for extra bits, which increases cipher text overhead.The work proposed in [10] optimized the Rabin cryptosystem by using reciprocal numbers to solve Rabin's 4-to-1 situation in decryption in 1999.In this method, Encryptor calculates and sends two additional bits of information with its ciphertext to indicate the proper square root.However, it still requires more computational costs since it uses the Jacobian symbol for encryption and decryption.Lynn Margaret Batten and Hugh Cowie Williams [11] introduced a unique scheme known as the 'R-W signature scheme,' which is considered the most efficient decryption method compared to existing methods.This scheme uses the concept of the Chinese Reminder Theorem (CRT) to obtain the correct plaintext back out of 4 outcomes of the decryption algorithm using private keys α and β.In 1997, authors in [12] proposed an RSA-type system using n-adic expansions and permutation functions, showing that the proposed method is faster.The authors introduced a new concept [13] built on the hardness of factoring and pointed similarity of the trapdoor permutation of the proposed scheme with the Rabin cryptosystem.He also suggested that the proposed method is best suited for practical application by developing a hybrid encryption scheme using a new trapdoor one-way permutation.The work in [14] deals with deterministic aspects and identification problems of the Rabin cryptosystem during decryption.The paper [15] proposed a fault attack against the Rabin cryptosystem using a one-byte permutation on public key n.However, the above-discussed methods are either too complex or easy to crack.Some researchers turn to the modulus process to improve the Rabin cryptosystem.In [16], the authors analyzed and compared three types of algebraic analysis on AAβ cryptosystem.The study includes congruence relation, which is used to solve the Aaβ equation.Continued fractions and Coppersmith's theorem are used to retrieve the factors from the equation.The authors developed an asymmetric scheme based on the integer factorization problem [IFP], including the square root scenario in [17], which is analytically proved to have 1 to 1 decryption.Mahad et al. [17] introduced a new optimized solution to correct the Rabin cryptosystem decryption failure of 4 to 1 by reducing the plaintext phase space from x ϵ Z αβ , to x ϵ 2 2n−2 , 2 2n−1 ⊂ Z αβ , where αβ is a composite of 2 strong primes αβϵ 2 2n , 2 2n+2 .Also, the specified proposed [18] method makes the encryption process fast, and computation is not included much.In [19], the authors proposed two methods using common modulus ᶇ = α 2 β.In the first cnge to M ∈ Z αβ .In the second method, the range of plaintext is restricted between 0 to 2 2n−2 .In both schemes, the authors introduced a mathematical notation to obtain actual plaintext x i among four possible candidates x 1 , x 2 , x 3 , x 4 which is calculated using, where W i is an integer, C i is the cipher.All Rabin encryption variant techniques stated in the literature above, a one-time execution of modulo ᶇ squaring is registered with complexity O ᶇ 2 .This feature of Rabin makes the system the quickest and most efficient compared to RSA.In the Rabin cryptosystem, encryption can be done using Equation (2).
However, most of the researchers majorly concentrated on the decryption side of the Rabin cryptosystem.
The decryption side of the Rabin cryptosystem proposed in [11,14,15,19] uses two prime factors as the key and uses the Chinese Reminder Theorem (CRT) to obtain the plaintext.In these approaches, the decryption procedure produces four possible plaintexts, of which only one will always be correct.In addition to the correct plaintext, decryption has three false plaintext results to judge the actual answer.This is the main issue and significant disadvantage of Rabin-type algorithms.If the algorithm is used to encrypt a text message, then obtaining back in the decryption is not a difficult task.If the plaintexts are numerical values, this algorithm becomes challenging in decryption.
This limitation has been resolved in the paper [20] with a new Rabin-like cryptosystem without using the Jacobi symbol.In this approach, the decryption function needs a single prime p as the key by computing a single mod function and giving the required plaintext without any failure.In [21] work of Rabin P is assessed on the microprocessor platform in terms of runtime and energy consumption.The following points summarize the limitations of all existing Rabin cryptosystems.

•
Case I: In the case of the existing works, it is easy to recover the plaintext if the intruder can efficiently factor in the public key ᶇ.

•
Case II: Not all the plaintexts can be used for encryption/decryption.

•
Case III: It requires plaintext padding systems or sending extra bits to improve encryption and decryption.

•
Case IV: Insufficient expansion of the plaintext-ciphertext ratio.
To overcome all these issues, this paper proposes a novel key generation process by applying the fake-modulus (Ӡ) concept.The remaining portions of the article are structured as follows: Section 2 introduces the background of Rabin-Ӡ Cryptosystem and the previous security efforts.The mathematical preliminaries essential to propose the algorithm are described in Section 3. Section 4 suggests Rabin-Ӡ cryptosystem using a fake-modulus algorithm.Section 5 explores the evaluation results and discussion.The conclusion is discussed in Section 6.

Mathematical Preliminaries
This section gives the preliminaries required to support the proposed methodology, which makes the decryption process more unique and robust.Also, we suggest one more RSA variant by introducing the fake-modulus principle Ӡ, which improves the Rabin encryption process.This feature makes the proposed system hard to break using the factorization process.

Range of Plaintext
The proposed algorithm supports encryption and decryption functionality for a specific range of plaintext.If x is the plaintext that is to be encrypted, then the range of plaintext is defined as Theorem 1: Uniqueness of Solutions in Fake-Modulus Based Rabin-Ӡ Cryptosystem.Let x denote the plaintext, and α and β represent the prime factors of ɲ.For any plaintext x satisfying the condition , a unique solution exists obtained through the computation of, 2 then we should have x 1 + x 2 < α 2 , which leads to the contradiction x 1 + x 2 = α 2 .Suppose if x 1 and x 2 are greater than α 2 2 , which gives x 1 + x 2 > α 2 again which leads to a contradiction.Thus, one of x 1 or x 2 is always less than α 2 2 .Suppose x 1 < α 2 2 , then there exists a real number ψ 1 such that ⇒ Only one of x 1 or x 2 is always less than α 2 2 .Hence there exists a unique x < α 2 2 .□ Cipher values obtained from the proposed algorithm's encryption functionality also fall within a specific range.If C i be the cipher value, then the range of cipher values restricted to fall within the range 0 < C i < ɲ using Equation ( 3) The limitations specified in cases I, III, and IV can be eliminated using the fake-modulus concept, which is used to hide the public key ɲ during the time of encryption.The computation process to obtain a fake-modulus is explained as follows.

Fake-Modulus Principle
In the Rabin algorithm, let α and β are two large prime numbers, such that (α + 1) mod 4 ≡ 0 and (β + 1) mod 4 ≡ 0. If ɲ = α 2 β then, let Fake-modulus key Ӡ ϵ Z + can be computed using the formula where τ is the random integer that falls within the range 0 < τ < √ α, and the range of Ӡ should be α 2 2 < Ӡ < α 4 4 .Where τ is generated using a linear feedback shift register (LFSR) falls within the range 0 < τ < ± √ α and range of Ӡ should be α 2 2 < Ӡ < α 4 4 .The length of the key τ should be chosen to provide a sufficient level of security, while also ensuring that the encryption and decryption operations can be performed efficiently.A key length of 1024 bits is commonly used for the Rabin cryptosystem.
A PRNG [22,23] with a suitable seed value can be used to generate the secret key.Any integer value қ ∈ ± √ α is considered for initial seed values of LFSR.In this generation of key sequence is based on the initial seed values қ 1 , қ 2 , қ 3 . . .қ i are considered.As shown in the Figure 1, to randomize the key sequence it uses a function f (қ 1 , қ 2 , қ 3 . . .қ i ) mod √ α.To get more randomized results, prime values is taken as the initial seed values of LFSR.
Cryptography 2023, 7, x FOR PEER REVIEW 6 of 21 that the encryption and decryption operations can be performed efficiently.A key length of 1024 bits is commonly used for the Rabin cryptosystem.
A PRNG [22,23] with a suitable seed value can be used to generate the secret key.Any integer value қ ∈± √ is considered for initial seed values of LFSR.In this generation of key sequence is based on the initial seed values қ 1 , қ 2 , қ 3 … қ i are considered.As shown in the Figure 1, to randomize the key sequence it uses a function (қ 1 , қ 2 , қ 3 … қ i )  √.
To get more randomized results, prime values is taken as the initial seed values of LFSR.The decryption algorithm in the proposed methodology requires a single prime number as its key and performs with a single modular exponentiation process.This has more impact on the computational complexity of the proposed method over other variants.The following proof gives the justification for the methods used in decryption.Rabin.Then decryption algorithm produces a unique solution.
Proof: Let C i be the cipher value and α be the prime factor which is used as the private key at the decryption side.Suppose C i ≡ x 2 mod Ӡ is the cipher text, and we obtain modulus ɲ = α 2 β.We can write 2 which is effectively solved.Furthermore, there are exactly two separate x 1 and x 2 solutions that satisfy C i ≡ x 2 mod α 2 .The decryption algorithm produces only a unique solution for x < 2 2k−1 .Note that the upper limit of x < α 2 2 .Then either x 1 or x 2 is less than Lastly, we conclude that the decryption algorithm will produce only one unique x < 2 2k−1 .
The discussed preliminaries can be readily adapted to the proposed method, which will be briefly discussed in the next section.This will encompass key generation, encryption, decryption, and will be supported by an illustrative experimental example.□

Methodology Proposed
The Rabin-Ӡ cryptosystem is a variant of the Rabin cryptosystem that uses a fake modulus to reduce the computational cost of the decryption process.
This section proposes the methodology using Rabin-Ӡ cryptosystem using the fakemodulus concept that is divided into three stages: key generation, encryption, and decryption.Specifically, the fake-modulus is chosen in the key generation step according to the selected large prime number.By this operation, we can keep α as a secret key and thus increase security.To design an efficient Rabin-Ӡ lighter weight cryptosystem, we can consider the following steps:

Key Generation
In the process of key generation the fake modulus key Ӡ ϵ Z + can be computed using the formula specified in Equation ( 4).The Algorithm 1 describes the process of obtaining fake modulus.

3.
Share fake-modulus Ӡ as the public key to the encryption side and use α as a secret key on the decryption end.

Encryption
The encryption operation involves computing the ciphertext as the square of the plaintext modulo the fake modulus.This operation can be performed efficiently using standard modular exponentiation algorithms in Algorithm 2. Steps: Encrypt the plaintext x i , where the range of

Decryption
The decryption operation involves computing the square roots of the ciphertext modulo, both the true and fake moduli in Algorithm 3. The square root modulo the fake modulus, can be computed efficiently using the LFSR, while the square root modulo, the true modulus, can be calculated using standard modular exponentiation algorithms.The correct plaintext can be obtained by combining the results of these computations using the Chinese remainder theorem.1. Compute 2. Find Compute v which is multiple inverses of 2x α for α, i.e.,

Example
In this section, we study a case of problem by assuming two prime numbers α = 263, β = 283 and plaintext x = 21,017 and use the proposed algorithm to encrypt and decrypt this plaintext.
The flow diagram of the Rabin-Ӡ algorithm for key generation, encryption, and decryption is explored in Figure 1.

Cryptanalysis
In all the versions of the Rabin cryptography algorithms stated in [11,14,15,19], the public key component ᶇ is shared publicly.Hence the hacker can crack the system very easily using the following two cryptanalysis methods:

•
By factoring the prime numbers using Fermat's Factorization method [24] • Breaking the plaintext using cipher value and shared public key by brute force.
The following subsections shows that Rabin-Ӡ with fake-modulus is secure for the above two hacking strategies.

Obtaining Private Keys from Fermat's Factorization Method
Fermat factorization method known as Fermat's Difference of Squares Methods, which uses the concept of quadratic disputes.
Let ᶇ be the composite number, which is written as ᶇ = α 2 * β; where Where S = α+β 2 , T = α−β 2 then α = S + T and β = S − T , it can also written as, where, In the strategy of Fermat factorization, the algorithm searches for the value of Ƴ 2 − ᶇ until it discovers an ideal root value.The search process begins from and so on.The above explanation demonstrates that this algorithm is guaranteed to eventually succeed in finding the factor value associated with the discovered root value.Let's utilize the Fermat method to factorize ᶇ = 21,473.After determining i which is the ideal root value of ᶇ, we find √ ᶇ = √ 21, 473 = 146.536 . . .rounded to the nearest integer gives √ ᶇ = 146 → 0 .We initiate the process by incrementing from the initial root 0 until we find an integer.The progression of obtaining an integer from the ideal root value is presented in Table 1.By employing Equation ( 12), the factorization process can be expressed as ᶇ = (153 + 44) × (153 − 44).Therefore, the factors of the given ᶇ are α = 197 and β = 109.Table 2 presents the outcomes of the Fermat's factorization process applied in the Rabin p algorithm, while Table 3 illustrates the utilization of Rabin ӡ with the fake-modulus approach.A comparison was conducted using prime factors of various key sizes, showcasing the steps taken to factor the given modulus (n), the processing time required for factorization, and the obtained factors through Fermat's factorization.The results depicted in Tables 2 and 3 demonstrate that the Rabin ӡ with fake-modulus algorithms involve more steps and time to factorize the modulus (n), and the resulting factors are not perfect.This observation highlights the robustness of the proposed algorithm and its ability to conceal the private key utilized in the decryption process.Table 2 presents the outcomes of the Fermat's factorization process applied in the Rabin p algorithm, while Table 3 illustrates the utilization of Rabin Ӡ with the fake-modulus approach.A comparison was conducted using prime factors of various key sizes, showcasing the steps taken to factor the given modulus (ᶇ), the processing time required for factorization, and the obtained factors through Fermat's factorization.The results depicted in Tables 2 and 3 demonstrate that the Rabin Ӡ with fake-modulus algorithms involve more steps and time to factorize the modulus (ᶇ), and the resulting factors are not perfect.This observation highlights the robustness of the proposed algorithm and its ability to conceal the private key utilized in the decryption process.

Obtaining Plaintext from Cipher Text and Modulus in Rabin Cryptosystem Using Brute Force Method
Consider M i ∈ Z as the plaintext to be encrypted using the encryption function C i = M i 2 mod ᶇ, where C i ∈ Z represents the ciphertext, and ᶇ i ∈ Z pq serves as the modulus used as a public key in this function.Let қ ∈ Z be an integer that is iteratively incremented until the resulting M i becomes an integer, using the function The following case studies provide illustrations of the process involved in recovering a message M i from the ciphertext C i and modulus n through a brute force attack on the Rabin cryptosystem.Figure 2 visually presents the step-by-step procedure for recovering the message M i using the ciphertext C i and modulus n through the brute force attack on the Rabin cryptosystem.mented until the resulting Ɱ  becomes an integer, using the function Ɱ  = √  + қ × n.
The following case studies provide illustrations of the process involved in recovering a message Ɱ  from the ciphertext   and modulus n through a brute force attack on the Rabin cryptosystem.Figure 2 visually presents the step-by-step procedure for recovering the message Ɱ  using the ciphertext   and modulus n through the brute force attack on the Rabin cryptosystem.

Case Study
Let C = 11, 544, 473 represent the cipher value, and the public key component ᶇ = 19, 574, 827.The eavesdropper, using these parameters, performs the following operation using the equation where қ is the integer value that indicates the number of iterations or steps required to break the cipher.We initiate the incrementing process from 0 until we obtain an integer value for M i .In this example, when қ = 8, the equation yields an integer value of 12,967.Since this integer value, 12,967, corresponds to the plaintext for the given cipher value, Table 4 displays the step-by-step process of obtaining the plaintext from the given cipher value.The number of steps needed to break the plaintext using Rabin p versus Rabin Ӡ with fake-modulus for various key sizes is presented in Figure 3.The figure illustrates the comparison of the number of steps required to break the plaintext between Rabin p and Rabin Ӡ with fake-modulus for different key sizes.8 12,967 The number of steps needed to break the plaintext using Rabin p versus Rabin ӡ with fake-modulus for various key sizes is presented in Figure 3.The figure illustrates the comparison of the number of steps required to break the plaintext between Rabin p and Rabin ӡ with fake-modulus for different key sizes.Observations:

•
It is observed that Rabin-P, with the fake-modulus approach, denoted as fake Rabin-P, requires a higher number of steps to crack the plaintext from the given ciphertext.

•
The time consumption for Rabin-P and Rabin-P with the fake-modulus is approximately equivalent for prime numbers with lower bit lengths (e.g., 8, 10, and 12 bits).Observations:

•
It is observed that Rabin-P, with the fake-modulus approach, denoted as fake Rabin-P, requires a higher number of steps to crack the plaintext from the given ciphertext.

•
The time consumption for Rabin-P and Rabin-P with the fake-modulus is approximately equivalent for prime numbers with lower bit lengths (e.g., 8, 10, and 12 bits).However, as the bit length increases beyond 16 bits, the gap between the time curves widens significantly.

•
Based on the statistical comparison, it is evident that breaking the code using the proposed fake-modulus approach, demands more time and steps compared to the traditional Rabin-P algorithm.

Results and Analysis
In this section, we aim to highlight the significance of the Rabin Ӡ cryptosystem in relation to the Rabin P cryptosystem, particularly regarding its robustness.We thoroughly examine the investigations conducted on the security provided by the proposed algorithms, comparing them to the Rabin P cryptosystem through performance and complexity analysis.Our objective is to showcase the importance of the proposed method in terms of its robustness compared to the Rabin P cryptosystems.To assess the significance of the proposed systems, we establish an experimental setup utilizing an existing Intel P4 CPU 1.7 GHz, 1.24 GB RAM, and the Windows 10 platform.To showcase the performance of the proposed algorithms, we applied them to a variety of test images, including Lena, and Baboon.These test images have dimensions of (512 × 512 × 3) pixels.By using these representative images, we aim to demonstrate the effectiveness and capabilities of the algorithms in different scenarios.The subsequent metrics defined herein effectively articulate the comparisons.

Visual Analysis
To evaluate the extent of distortion or degradation introduced during the encryption process, a visual comparison was performed between the plaintext and encrypted images.This allowed us to gauge the impact of encryption on the visual quality and fidelity of the images.If the encrypted image contains many unidentified pixels from the original image, it can be deemed secure.Figures 4b and 5b displays the encrypted image generated by the Rabin-P algorithm, wherein certain areas still exhibit evidence of the original image.However, upon employing the proposed Rabin-Ӡ algorithm, the encrypted image (as depicted in Figures 4c and 5c) exhibited no discernible traces of the original image.This demonstrates the algorithm's resilience against statistical attacks.
To evaluate the extent of distortion or degradation introduced during the encryption process, a visual comparison was performed between the plaintext and encrypted images.This allowed us to gauge the impact of encryption on the visual quality and fidelity of the images.If the encrypted image contains many unidentified pixels from the original image, it can be deemed secure.Figures 4b and 5b displays the encrypted image generated by the Rabin-P algorithm, wherein certain areas still exhibit evidence of the original image.However, upon employing the proposed Rabin-ӡ algorithm, the encrypted image (as depicted in Figures 4c and 5c) exhibited no discernible traces of the original image.This demonstrates the algorithm's resilience against statistical attacks.

Histogram Analysis
A histogram is the schematic representation of the number of occurrences of the value of each pixel.In this work, the Lena color image shown in Figure 4a has been considered for evaluation.i.e., the numbers of occurrences of each pixel value are expressed separately for Red, Green, and Blue in the histogram.Figure 6a,b shows the histogram for the distribution of the occurrences of RGB components of the original image.From the visual analysis shown in the histogram of Figures 7 and 8, the histogram results of the Rabin-ӡ cryptosystem have flat and uniform pixel distribution compared to Rabin P. In the figure the x-axis represents the range of pixel values, while the y-axis represents the number of pixels in the image that fall within that range.These histogram results are significant enough to suggest that the proposed approach is cryptographically secure pixel distribution.

Histogram Analysis
A histogram is the schematic representation of the number of occurrences of the value of each pixel.In this work, the Lena color image shown in Figure 4a has been considered for evaluation.i.e., the numbers of occurrences of each pixel value are expressed separately for Red, Green, and Blue in the histogram.Figure 6a,b shows the histogram for the distribution of the occurrences of RGB components of the original image.From the visual analysis shown in the histogram of Figures 7 and 8, the histogram results of the Rabin-Ӡ cryptosystem have flat and uniform pixel distribution compared to Rabin P. In the figure the x-axis represents the range of pixel values, while the y-axis represents the number of pixels in the image that fall within that range.These histogram results are significant enough to suggest that the proposed approach is cryptographically secure pixel distribution.
distribution of the occurrences of RGB components of the original image.From the visual analysis shown in the histogram of Figures 7 and 8, the histogram results of the Rabin-ӡ cryptosystem have flat and uniform pixel distribution compared to Rabin P. In the figure the x-axis represents the range of pixel values, while the y-axis represents the number of pixels in the image that fall within that range.These histogram results are significant enough to suggest that the proposed approach is cryptographically secure pixel distribution.

Entropy Analysis
The degree of uncertainty in the system is defined as the entropy of information.The greater the entropy, the greater the image's randomness or uniformity [25].Entropy can be mathematically defined using Equations ( 13) and (14).Let   be the probability of occurrence of pixel  in the cipher image of length  number of pixels, where  = 0,1,2, … ,  − 1.

Entropy Analysis
The degree of uncertainty in the system is defined as the entropy of information.The greater the entropy, the greater the image's randomness or uniformity [25].Entropy can be mathematically defined using Equations ( 13) and (14).Let p i be the probability of occurrence of pixel i in the cipher image of length N number of pixels, where i = 0, 1, 2, . . ., M − 1.
In the experimentation the entropy (ԩ) of the cipher image is calculated separately for RGB components of the color image using the equation ∑   log , where   is the probability of occurrence of the cipher values and is given by   ≈

𝑁
, where   is the number of events of   in  different pixels of an image.
A comparison between the proposed algorithm and existing Rabin algorithms is conducted, and the resulting entropy values are presented in Table 5.The entropy values of the encrypted images generated by the proposed Rabin-ӡ algorithm are found to be in close proximity to 8.This signifies that the cipher image exhibits exceptional uncertainty and a significant degree of permutation and substitution effects.Consequently, it can be concluded that the proposed algorithm is highly resistant to attacks and provides a secure defense against statistical entropy attacks.
In the experimentation the entropy (ԩ) of the cipher image is calculated separately for RGB components of the color image using the equation ∑   log 2 ( , where   is the probability of occurrence of the cipher values and is given by   ≈

𝑁
, where   is the number of events of   in  different pixels of an image.
A comparison between the proposed algorithm and existing Rabin algorithms is conducted, and the resulting entropy values are presented in Table 5.The entropy values of the encrypted images generated by the proposed Rabin-ӡ algorithm are found to be in close proximity to 8.This signifies that the cipher image exhibits exceptional uncertainty and a significant degree of permutation and substitution effects.Consequently, it can be concluded that the proposed algorithm is highly resistant to attacks and provides a secure defense against statistical entropy attacks., where p i is the probability of occurrence of the cipher values and is given by p i ≈ N i N , where N i is the number of events of p i in N different pixels of an image.
A comparison between the proposed algorithm and existing Rabin algorithms is conducted, and the resulting entropy values are presented in Table 5.The entropy values of the encrypted images generated by the proposed Rabin-Ӡ algorithm are found to be in close proximity to 8.This signifies that the cipher image exhibits exceptional uncertainty and a significant degree of permutation and substitution effects.Consequently, it can be concluded that the proposed algorithm is highly resistant to attacks and provides a secure defense against statistical entropy attacks.

Differential Analysis
Differential analysis is a metric used in differential attack analysis to check the cipher resistance.When an attacker makes little changes to the original image (flipping one bit), notice the difference in the cipher image [26].Such disparity can be calculated using two criteria: the Number of Pixel Change Rate (NPCR) [27] and the Unified Average Pixel Change Intensity (UACI) [28].The proposed cryptosystem will guarantee two separate ciphered images, although there is only one bit of difference between them.The NPCR focuses on the total number of pixels that affect the value of differential attacks, and to evaluate the impact of the pixel change on the encrypted image using NPCR is given in (15) where W i is the image width and H i be the height.C 1 (i, j) is the image before the change in one-bit pixel position and C 2 (i, j) are the ciphered images after the change in one pixel of the plain image.For the pixel at the position (i, j) calculation was made i f C 1 (i, j) ̸ = C 2 (i, j), then set D(i, j) = 1 else set D(i, j) = 0. UACI focuses on the average difference between two paired ciphertext images.UACI is specified in Equation ( 16) where L i = length of the image, which contains the total number of pixels.The outcomes of the NPCR and UACI equations are presented in Table 6.The analysis reveals that the encryption scheme exhibits a remarkable sensitivity to even minor modifications in the plaintext.For the proposed method, the NPCR values exceed 99%, while the UACI values surpass 33%.All measured values fall within the confidence interval of [98-99%].While the NPCR results are comparable to those of existing Rabin algorithms, the UACI results significantly surpass them.These findings provide compelling evidence that our cryptosystem effectively safeguards against differential attacks.

Complexityl Analysis
Time complexity is a statistical framework that determines the amount of time it takes to execute an algorithm.The complexity of the algorithms specified in this section is based on the number of mathematical operations involved in the function using the Newton-Raphson iteration method [29].Table 7 summarizes the time the proposed methods took to prove the robustness in each step compared with the Rabin-P cryptosystem.To calculate modulus ɲ = α 2 β required O(2ɲ) since ɲ uses multiplication operation on 3 integers twice.The equation used for computing fake-modulus Ӡ = ɲ + α 2 × τ also uses O(2ɲ) for computing fake-modulus.
The proposed method Rabin-Ӡ has a complexity of O ɲ 2 log 2 ɲ for encryption, which involves exponentiation and multiplication operations.The decryption process requires O n 2 and O n 2 log 2 n , operations to compute w and x α , respectively.The complexity for computing v's multiplicative inverse is O M × 2n 2 , where M is the number of iterations required.The complexity for computing j is O 2n 2 iterations, and computing x 1 requires O(log n) iterations.
To break the Rabin algorithm using the equation M i = √ C i + k i × ᶇ, the complexity involved relies on taking the square root in each iteration (O(2ɲ)) and multiplying key k i with ɲ requires (O(ɲ)) can be specified as O(3ɲ).The equation Ӡ = ɲ + α 2 × τ used for breaking the fake-modulus relies on the complexity of breaking ɲ and the key generated for the value τ using LFSR.Therefore, the complexity of breaking the Rabin algorithm using a Fake-modulus can be stated as O(ɲ × τ).The complexity of breaking ɲ and τ would depend on the specific techniques used to perform the attack, but in general, they would involve searching for a factor of the modulus or finding a linear relationship between the LFSR output and the fake-modulus.
Comparing the above statistics, it is observed that breaking Rabin-Ӡ using the fakemodulus is more complex than breaking Rabin-P algorithms.This makes the proposed Rabin-Ӡ with a fake-modulus more secure than the standard Rabin-P algorithm against attacks.

Randomness Analysis
In cryptographic applications that involve encrypting images, it is essential that the resulting encrypted images be immune to statistical attacks.Statistical attacks are a type of cryptanalysis technique that involves analyzing the statistical properties of the encrypted data to try to uncover information about the plaintext.The NIST statistical randomness test suite is a widely used tool for evaluating the randomness of encrypted images and other cryptographic outputs [30].
The significance level of the test should be higher than 0.01 in order to eliminate or accept the randomness of bit sequences.The results of the NIST randomness test for a 512 × 512 Lena and Baboon image are displayed in Table 8.According to tabulation results shown in Table 8, the proposed method passed (√) the randomness test when put through various tests as part of the NIST test suite.It suggests that the bit sequences generated by the method were able to pass the various statistical tests for randomness with a p-value greater than 0.01.This would indicate that the generated bit sequences are likely to be truly random [31][32][33][34][35][36].

Discussions
The proposed work aims to enhance the security and performance of existing Rabin cryptosystems by introducing a fake-modulus technique.The results specified that the proposed technique provides better immunity against differential attacks compared to existing Rabin type cryptosystems.It also mentions that the complexity involved in breaking the Rabin algorithm using the fake-modulus technique is higher than existing Rabin-P algorithms, making it difficult to break.
The proposed algorithm also produces a flat and uniform pixel distribution compared to existing Rabin cryptosystems, as demonstrated by the visual analysis of encrypted images and histograms.It highlights the paper's use of entropy and differential analysis to quantify the performance of the proposed method, which is considered a valuable con-tribution to the field of electronic commerce and cryptography, as it offers a solution for ensuring secure communication in electronic commerce transactions.

Conclusions
Encryption using public key cryptography is widely used to ensure secure communication and protect sensitive information from unauthorized access.The proposed work aims to address the issues with existing Rabin cryptosystems by introducing a fake-modulus technique to enhance its security and performance against differential attacks.The paper presents a detailed analysis of the weaknesses of existing Rabin cryptosystems and proposes a solution that is validated through qualitative and quantitative studies.The proposed technique is shown to provide better immunity against differential attacks compared to existing Rabin cryptosystems.The complexity involved in breaking the Rabin algorithm using the fake-modulus technique is higher than existing Rabin-P algorithms, making it difficult to break.The proposed algorithm also produces flat and uniform pixel distribution compared to existing Rabin cryptosystems, as demonstrated by the visual analysis of encrypted images and histograms.The paper's use of entropy and differential analysis to quantify the performance of the proposed method is a valuable contribution to the field.The results show that the proposed algorithm provides excellent uncertainty, and its performance against differential attacks is superior to existing Rabin cryptosystems.
The proposed technique is supported by both visual and quantitative analysis, and its complexity makes it difficult to break.This work is relevant to the field of electronic commerce and cryptography, as it provides a solution for ensuring secure communication in electronic commerce transactions.

Figure 1 .
Figure 1.Block diagram of Key generation, encryption, and decryption process of Rabin-Ӡ encryption with fake modules.

Algorithm 3 :
Decryption Input: Cipher text C i and secret key α Output: Plaintext x i .Steps:

Figure 2 .
Figure 2. Flow diagram of brute-force attack on Rabin cryptosystem.Figure 2. Flow diagram of brute-force attack on Rabin cryptosystem.

Figure 2 .
Figure 2. Flow diagram of brute-force attack on Rabin cryptosystem.Figure 2. Flow diagram of brute-force attack on Rabin cryptosystem.

Figure 3 .
Figure 3. Number of steps required to break the plaintext using Rabin p v/s Rabin ӡ using fakemodulus for different Key size.

Figure 3 .
Figure 3. Number of steps required to break the plaintext using Rabin p v/s Rabin Ӡ using fakemodulus for different Key size.

Figure 6 .
Figure 6.Number of occurrences of pixel values(Y-axis) vs. pixel values (X-axis) of (a) Lena image and (b) Baboon image with RGB components respectively.Figure 6. Number of occurrences of pixel values (Y-axis) vs. pixel values (X-axis) of (a) Lena image and (b) Baboon image with RGB components respectively.

Figure 6 .
Figure 6.Number of occurrences of pixel values(Y-axis) vs. pixel values (X-axis) of (a) Lena image and (b) Baboon image with RGB components respectively.Figure 6. Number of occurrences of pixel values (Y-axis) vs. pixel values (X-axis) of (a) Lena image and (b) Baboon image with RGB components respectively.Cryptography 2023, 7, x FOR PEER REVIEW 15 of 21

Figure 7 .
Figure 7. Number of occurrences of pixel values(Y-axis) v/s pixel values(X-axis) of cipher image of Rabin-P algorithm for (a) Lena image with RGB components, (b) Baboon image with RGB components.

Figure 7 .Figure 7 .Figure 8 .
Figure 7. Number of occurrences of pixel values (Y-axis) v/s pixel values (X-axis) of cipher image of Rabin-P algorithm for (a) Lena image with RGB components, (b) Baboon image with RGB components.

Figure 8 .
Figure 8. Number of occurrences of pixel values (Y-axis) v/s pixel values (X-axis) of cipher image of Rabin-Ӡ algorithm for (a) Lena image with RGB components, (b) Baboon image with RGB components respectively.

Table 1 .
Fermat's Factorization Process.rootvalue of n, we find √n = √ 21,473 = 146.536…rounded to the nearest integer gives |√n| = 146 → ϒ 0 .We initiate the process by incrementing from the initial root ϒ  until we find an integer.The progression of obtaining an integer from the ideal root value is presented in Table1.By employing Equation (12), the factorization process can be expressed as n = ( 153 + 44 ) × (153 − 44).Therefore, the factors of the given n are  = 197 and  = 109.

Table 2 .
Use of Fermat's Factorization Process in Rabin-P algorithm.

Table 4 .
Process of obtaining Plaintext from the given cipher text.

Table 5 .
Entropy result comparison of the number of occurrences of pixel values of proposed Rabin-Ӡ with Rabin -P algorithm.

Table 5 .
Entropy result comparison of the number of occurrences of pixel values of proposed Rabin-Ӡ with Rabin -P algorithm.

Table 5 .
Entropy result comparison of the number of occurrences of pixel values of proposed Rabin-Ӡ with Rabin-P algorithm.

Table 6 .
This is a table.Comparison of NPCR vs. UACI between plaintext and Cipher of Rabin-P and-Ӡ.

Table 7 .
Time complexity involved during Key generation, Encryption and Decryption phase of Rabin P And Rabin-Ӡ algorithms.

Table 8 .
NIST Encryption Test Results of proposed algorithm.