CFP last date
20 January 2025
Reseach Article

Novel Hybrid Cryptography for Confidentiality, Integrity, Authentication

by Avinash Jain, V. Kapoor
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 171 - Number 8
Year of Publication: 2017
Authors: Avinash Jain, V. Kapoor
10.5120/ijca2017915151

Avinash Jain, V. Kapoor . Novel Hybrid Cryptography for Confidentiality, Integrity, Authentication. International Journal of Computer Applications. 171, 8 ( Aug 2017), 35-40. DOI=10.5120/ijca2017915151

@article{ 10.5120/ijca2017915151,
author = { Avinash Jain, V. Kapoor },
title = { Novel Hybrid Cryptography for Confidentiality, Integrity, Authentication },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2017 },
volume = { 171 },
number = { 8 },
month = { Aug },
year = { 2017 },
issn = { 0975-8887 },
pages = { 35-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume171/number8/28204-2017915151/ },
doi = { 10.5120/ijca2017915151 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:18:56.159755+05:30
%A Avinash Jain
%A V. Kapoor
%T Novel Hybrid Cryptography for Confidentiality, Integrity, Authentication
%J International Journal of Computer Applications
%@ 0975-8887
%V 171
%N 8
%P 35-40
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information security is more important for data communication in physical or network environment. Sending and receiving data over the internet is easy, fast and cost efficient due to development of information technology. Protected communication is more imperative for data move in the network. That put forward a new technique for hybrid cryptography with message digest and symmetric Algorithm, asymmetric algorithm. This research study proposes hybrid cryptography is a permutation of Message digest and Symmetric Key cryptography algorithm in the form of Digital Envelope. Message Digest is a fingerprint or the summary of a memo or data. Now the proposed system will try to improve the existing problem for integrity, proposed system use the MD5 algorithm. Due to this basis proposed system is capable then existing system. The message is initially encrypted with AES and the symmetric keys of AES are encrypted with RSA then the hybrid of both AES-RSA is embedded with message digest of data. The new results based on grouping of symmetric algorithm and Message digest will approve the effectiveness of the planned concept, and show the huge difference in key space and provide high-level security. This algorithm provides additional security as well as authentication comparing to other existing hybrid algorithm. It guarantees all cryptographic primitives, integrity, confidentiality and authentication. The implementation of the proposed technique is made with the help of JAVA technology and their performance is description with the help of space and time complexity. According to the trial results the proposed technique offers more secure environment and with less computational overheads.

References
  1. William Stallings “Cryptography and Network Security”, 3rd Edition, Prentice-Hall Inc., 2005.
  2. Janakiraman V S, Ganesan R, Gobi M “Hybrid Cryptographic Algorithm for Robust Network Security” ICGST- CNIR, Volume (7), Issue (I), July 2007.
  3. Atul Kahate “Cryptography and Network Security”,3rd Edition McGraw-Hill publication.
  4. Deepak Garg, Seema Verma “Improvement over public Key cryptographic Algorithm” 2009 IEEE International Advance computing conference.
  5. Bhatele, K. Sinhal, A.; Pathak, ." A novel approach to the design of new hybrid security protocol architecture “Advanced Communication Control and Computing Technologies (ICACCCT), 2012 IEEE International Conference on Page(s): 429 - 433 Print ISBN: 978-1-4673-2045-0.
  6. Rivest, R.L., Robshaw, M.J.B., Sidney, R., & Yin, Y.L (2000a). “The Case for RC6 as the AES PublicCommentURL:http://csrc.nist.gov/CryptoToolkit/aes/round2/comments/20000515-rrivest.pdf.
  7. Ramaraj, E., Karthikeyan, S. and Hemalatha, M. (2009), ‘A design of security protocol using hybrid encryption technique’, International Journal of the Computer, the Internet and Management, Vol. 17, No. 1, pp. 78-86.
  8. Gupta, R.K. and Parvinders, S. (2013), ‘A new way to design and implementation of hybrid crypto system for security of the information in public network’, International Journal of Emerging Technology and Advanced Engineering, Vol. 3, No. 8, pp. 108-115.
  9. Kuppuswamy, P. and Al-Khalidi, S.Q.Y. (2012), ‘Implementation of Security through simple symmetric key algorithm based on modulo 37’, International Journal of Computers & Technology, Vol. 3, No. 2, pp. 335-338.
  10. Kuppuswamy, P. and Al-Khalidi, S.Q.Y. (2014), ‘Hybrid Encryption/Decryption Technique Using New Public-Key and Symmetric Key Algorithm’ Department of Management Information Systems, College of Commerce, MIS Review Vol. 19, No. 2, March (2014), pp. 13.
  11. Kaliski. B. (1993), A Survey of Encryption Standards, IEEE Micro, 0272-1732/93/1200- 0074$03.000 1993 IEEE.
  12. Rawya Rizk , Yasmin Alkady “Two-phase hybrid cryptography algorithm for wireless sensor networks” Journal of Electrical Systems and Information Technology 2 (2015) 296–313.
  13. A Hybrid Crypto System based on a new Circle-Symmetric key Algorithm and RSA with CRT Asymmetric key Algorithm for E-commerce Applications by “Rasmi P S Asst. Professor Toc H Institute Of Science Technology.
  14. Sitesh Kumar Sinha and Krishna Kumar Pande “A New Way of Design and Implementation of Hybrid Encryption to Protect Confidential Information from Malicious Attack in Network” International Journal of Computer Applications (0975 – 8887).
  15. Mouza Bani Shemaili, Chan Yeob Yeun, Khalid Mubarak, Mohamed Jamal Zemerly "A New Lightweight Hybrid Cryptographic Algorithm for the Internet of Things" Internet Technology and Secured Transactions, 2012 International Conference for Page(s):87 - 92 Print ISBN:978-1-4673-5325-0.
  16. Lili Yu; Zhijuan Wang; Weifeng Wang “The Application of Hybrid Encryption Algorithm in Software Security “Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on Page(s): 762 - 765Print ISBN: 978-1-4673-2981-1.
  17. A Chitra, T Blessin Sheeba “A Hybrid Reconfigurable Cryptographic Processor with RSA and SEA” Recent Trends in Information Technology (ICRTIT), 2012 International Conference on Page(s): 428 - 433 Print ISBN: 978-1-4673-1599-9.
  18. Amrita Jain, Vivek Kapoor, "Policy for Secure Communication using Hybrid Encryption Algorithm", International Journal of Computer Applications (0975 – 8887), Volume 125 – No.10, September 2015.
  19. Ijaz Ali Shoukat , Kamalrulnizam Abu Bakar1 and Mohsin Iftikhar2 “ A Survey about the Latest Trends and Research Issues of Cryptographic Elements” IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 2, May 2011 ISSN (Online): 1694‐0814.
  20. Meenakshi Shankar and Akshaya. “hybrid cryptographic technique using rsa algorithm and scheduling concepts” International Journal of Network Security & Its Applications (IJNSA)
Index Terms

Computer Science
Information Sciences

Keywords

Message Digest Symmetric key Encryption Algorithm Cipher text Plain text Asymmetric key Encryption Hybrid Algorithm