CFP last date
20 May 2024
Reseach Article

Minimizing the Effect of Brute Force Attack using Hybridization of Encryption Algorithms

by Lalit Kumar, Neelendra Badal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 33
Year of Publication: 2019
Authors: Lalit Kumar, Neelendra Badal
10.5120/ijca2019919213

Lalit Kumar, Neelendra Badal . Minimizing the Effect of Brute Force Attack using Hybridization of Encryption Algorithms. International Journal of Computer Applications. 178, 33 ( Jul 2019), 26-31. DOI=10.5120/ijca2019919213

@article{ 10.5120/ijca2019919213,
author = { Lalit Kumar, Neelendra Badal },
title = { Minimizing the Effect of Brute Force Attack using Hybridization of Encryption Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2019 },
volume = { 178 },
number = { 33 },
month = { Jul },
year = { 2019 },
issn = { 0975-8887 },
pages = { 26-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number33/30753-2019919213/ },
doi = { 10.5120/ijca2019919213 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:52:08.603140+05:30
%A Lalit Kumar
%A Neelendra Badal
%T Minimizing the Effect of Brute Force Attack using Hybridization of Encryption Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 33
%P 26-31
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Encryption is a process to hide the data into a secure manner. It helps the people to provide security and protect the data from unauthenticated people. For Encryption process, user uses many algorithms but all algorithm has some pitfalls i.e. a single encryption algorithm is not efficient to provide security to the data. For removing this disadvantages user uses more than one encryption algorithm in sequence to achieve high security encryption method. This process is called Hybrid Encryption Method. Sometimes MD5 hash function identified using Brute Force Attack. So user uses two encryption algorithms i.e. MD5 and Transposition Reverse String Algorithm. Here Transposition Reverse String Algorithm reverse the hash function due to this user cannot easily identify the hash function. This approach has fast Execution time in comparison to another hybrid approaches, so it is an optimize Hybrid Encryption Method.

References
  1. Gaurav R. Patel, Prof. Krunal Panchal, “Hybrid Encryption Algorithm”, International Journal of Engineering Development and Research, Volume 2, Issue 2, ISSN: 2321-9939, 2014.
  2. Ms. Priyanka Deore, Mr. Tushar Chaudhari, “Hybrid Encryption for Database Security”, International Research Journal of Engineering and Technology (IRJET), Volume: 04 Issue: 11, Nov 2017.
  3. Prachi More, Shubham Chandugade, “Hybrid Encryption Techniques for Secure Sharing of a Sensitive Data for Banking Systems over Cloud”, 2018 International Conference on Advances in Communication and Computing Technology (ICACCT), Feb 8-9, 2018.
  4. Prakash Kuppuswamy, Saeed Q. Y. Al-Khalidi, “Hybrid Encryption/Decryption Technique Using NewPublic Key and Symmetric Key Algorithm”, 2014 Department of Management Information Systems, College of Commerce National Chengchi University & Airiti Press Inc., 2 March 2014.
  5. Sourabh Shivaji Kumbhar, Young Lee, Jeong Yang, “Hybrid Encryption for Securing Shared Preferences of Android applications”, 1st International Conference on Data Intelligence and Security, 2018.
  6. Sushant Susarla , Gautam Borkar, “Hybrid Encryption System”, International Journal of Computer Science and Information Technologies (IJCSIT), 2014.
  7. P.Chinnasamy, P.Deepalakshmi, “Design of Secure Storage for Health-care Cloud using Hybrid Cryptography”, 2nd International Conference on Inventive Communication and Computational Technologies (ICICCT) IEEE Xplore Compliant - Part Number: CFP18BAC-ART; ISBN: 978-1-5386-1974-2, 2018.
  8. N. Thirupathi Rao, J. Anitha, Debnath Bhattacharyya and Tai-Hoon Kim, “Secure E-Commerce Model using Hybrid Encryption for Financial Transactions”, Advanced Science and Technology Letters Vol.147 (SMART DSC-2017), pp.367-373, 2017.
  9. Mrinal Kanti Sarkar; Sanjay Kumar, “Ensuring data storage security in cloud computing based on hybrid encryption schemes”, Parallel, Distributed and Grid Computing (PDGC), 2016 Fourth International Conference on 22-24 Dec. 2016.
  10. Neha, Mandeep Kaur, “Enhanced Security using Hybrid Encryption Algorithm”, International Journal of Innovative Research in Computer and Communication Engineering; Vol. 4, Issue 7, July 2016.
  11. Atewologun Olumide, Abeer Alsadoon, P. W. C. Prasad, Linh Pham, “A hybrid encryption model for secure cloud computing”, ICT and Knowledge Engineering on (ICT & Knowledge Engineering 2015).
  12. Kaur, Khushdeep, and Er Seema, “Hybrid Algorithm with DSA, RSA and MD5 Encryption Algorithm for wireless devices”, International Journal of Engineering Research and Applications (IJERA) 2.5 (2012): 914-917, 2012.
  13. Gupta, R.K. and Parvinder, S., ‘A new way to design and implementation of hybrid crypto system for security of the information in public network’, International Journal of Emerging Technology and Advanced Engineering, Vol. 3, No. 8, pp. 108-115.
  14. Ramaraj, E., Karthikeyan, S. and Hemalatha, M., ‘A design of security protocol using hybrid encryption technique’, International Journal of the Computer, the Internet and Management, Vol. 17, No. 1, pp. 78-86, 2009.
  15. Shaar, M., Saeb, M., Elmessiery, M. and Badawi, U. (2003), ‘A hybrid hiding encryption algorithm (HHEA) for data communication security’, Proceedings of IEEE 46th Midwest Symposium on Circuits and Systems, Cairo, Egypt, pp. 476-478, 2013.
  16. Research for the Application and Safety of MD5 Algorithm in Password Authentication-9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), 2012.
  17. Priyanka Walia and Vivek Thapar, “Implementation of New Modified MD5-512 bit Algorithm for Cryptography”, International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349- 2163 Volume 1 Issue 6, July 2014.
  18. Mudassar Raza, Muhammad Iqbal, Muhammad Sharif and Waqas Haider “ A Survey of Password Attacks and Comparative Analysis on Methods for Secure Authentication” in Comsats Institute of Information Technology, Wah Cantt ., 47040, Pakistan.
  19. Xiaoling Zheng, JiDong Jin, Research for the Application and Safety of MD5 Algorithm in Password Authentication, 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012.
  20. Tanvi Gautam, Anurag Jain,” Analysis of Brute Force Attack using TG – Dataset”, SAI Intelligent Systems Conference 2015, November 10-11, 2015.
  21. MD5hashgeneratorhttp://www.md5hashgenerator.com/index.php
Index Terms

Computer Science
Information Sciences

Keywords

Hybrid Encryption MD5 Transposition Reverse String Algorithm AES Brute Force Attack