CFP last date
20 December 2024
Reseach Article

Analysis of Hybrid Cryptography for Secure Exchange of Information

by Pawan Kumar, Vipin Saxena, Karm Veer Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 4
Year of Publication: 2023
Authors: Pawan Kumar, Vipin Saxena, Karm Veer Singh
10.5120/ijca2023922701

Pawan Kumar, Vipin Saxena, Karm Veer Singh . Analysis of Hybrid Cryptography for Secure Exchange of Information. International Journal of Computer Applications. 185, 4 ( Apr 2023), 37-42. DOI=10.5120/ijca2023922701

@article{ 10.5120/ijca2023922701,
author = { Pawan Kumar, Vipin Saxena, Karm Veer Singh },
title = { Analysis of Hybrid Cryptography for Secure Exchange of Information },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2023 },
volume = { 185 },
number = { 4 },
month = { Apr },
year = { 2023 },
issn = { 0975-8887 },
pages = { 37-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number4/32696-2023922701/ },
doi = { 10.5120/ijca2023922701 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:25:17.688394+05:30
%A Pawan Kumar
%A Vipin Saxena
%A Karm Veer Singh
%T Analysis of Hybrid Cryptography for Secure Exchange of Information
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 4
%P 37-42
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to rapid growth of digital communication in the recent days, it is important to secure the confidential information in the form of text, audio and video files from the intruders and hackers watching 365x24x7 days around the globe and well connected through high-speed internet facilities. The information which is used for communication over the network is very sensitive and must be shielded from the network attackers. In the present work, a new concept of hybrid cryptographical algorithm is explored by combining the Advance Encryption Standard (AES), Rivest, Shamir, Adleman (RSA) and Elliptic Curve Integrated Scheme (ECIES) for digital communication of information passed from one device to another device. The presented approach shall enhance the security levels at the end of sender as well also receiver. The approach is tested through the object-oriented programming language and computed results are shown in the form of figures and graphs.

References
  1. Lee, B. H., Dewi, E. K. and Wajdi, M. F. (2018, April), Data Security in Cloud Computing Using AES Under HEROKU Cloud, In 2018 27th Wireless and Optical Communication Conference (WOCC), pp. 1-5, IEEE, DOI: 10.1109/WOCC.2018.8372705
  2. Patel, K. (2019 ), Performance Analysis of AES, DES and Blowfish Cryptographic Algorithms on Small and Large Data Files, International Journal of Information Technology, Vol. 11, pp. 813-819. https://doi.org/10.1007/s41870-018-0271-4
  3. Muttaqin, K. and Rahmadoni, J. (2020), Analysis and Design of File Security System AES (Advanced Encryption Standard) Cryptography Based, Journal of Applied Engineering and Technological Science (JAETS), Vol. 1, No. 2, pp. 113-123. https://journal.yrpipku.com/index.php/jaets/article/view/78
  4. Santoso, K. I., Muin, M. A. and Mahmudi, M. A. (2020, April), Implementation of AES Cryptography and Twofish Hybrid Algorithms for Cloud, In Journal of Physics: Conference Series, Vol. 1517, No. 1, pp. 012099, IOP Publishing. doi:10.1088/1742-6596/1517/1/012099
  5. Arman, S., Rehnuma, T. and Rahman, M. (2020), Design and Implementation of a Modified AES Cryptography with Fast Key Generation Technique. In 2020 IEEE International Women in Engineering (WIE) Conference on Electrical and Computer Engineering (WIECON-ECE) pp. 191-195, DOI: 10.1109/WIECON-ECE52138.2020.9397992
  6. Hamza, A. and Kumar, B. (2020, December ), A Review Paper On DES, AES, RSA Encryption Standards, In 2020 9th International Conference System Modelling and Advancement in Research Trends (SMART), pp. 333-338, IEEE, DOI: 10.1109/SMART50582.2020.9336800
  7. Zhou, X. and Tang, X. (2011, August ), Research and Implementation of RSA Algorithm for Encryption and Decryption, In Proceedings of 2011 6th International Forum on Strategic Technology, Vol. 2, pp. 1118-1121, IEEE. DOI: 10.1109/IFOST.2011.6021216
  8. Padmavathi, B. and Kumari, S. R. (2013), A Survey on Performance Analysis of DES, AES and RSA Algorithm Along with LSB Substitution, International Journal of Science and Research, India, 2, 2319-7064. http://www.ijsr.net/archive/v2i4/IJSRON120134.pdf
  9. Cilardo, A., Coppolino, L., Mazzocca, N. and Romano, L. (2006 ), Elliptic Curve Cryptography Engineering, Proceedings of the IEEE, Vol. 94, No. 2, pp. 395-406, DOI: 10.1109/JPROC.2005.862438
  10. Martínez, V. G., Encinas, L. H. and Ávila, C. S., (2010 ), A Survey of The Elliptic Curve Integrated Encryption Scheme, Journal of Computer Science and Engineering, Vol. 2, No.2, pp. 7-13 http://hdl.handle.net/10261/32671
  11. Martínez, V. G. and Encinas, L. H. (2010, August ), A Comparison of The Standardized Versions of ECIES, In 2010 Sixth International Conference on Information Assurance and Security (pp. 1-4), IEEE, DOI 10.1109/ISIAS.2010.5604194
  12. Martínez, V. G., Encinas, L. H. and Dios, A. Q. (2015 ), Security and Practical Considerations When Implementing the Elliptic Curve Integrated Encryption Scheme, Cryptologia, Vol.39, No.3, pp. 244-269, https://doi.org/10.1080/01611194.2014.988363
  13. Abbas, S. A. and Maryoosh, A. A. B. (2016), Data Security for Cloud Computing Based on Elliptic Curve Integrated Encryption Scheme (ECIES) and Modified Identity Based Cryptography (MIBC ), International Journal of Applied Information Systems (IJAIS), Vol. 10, No.6, pp. 7-13, https://www.ijais.org/research/volume10/number6/abbas-2016-ijais-451517.pdf
  14. Patel, P., Patel, R. and Patel, N. (2016), Integrated ECC and Blowfish for Smartphone Security,  Procedia Computer Science, Vol. 78, pp. 210-216. https://doi.org/10.1016/j.procs.2016.02.035
  15. Balamurugan, E. (2016), Elliptic Curve Integrated Encryption Scheme Using Analysis Vehicular Ad-Hoc Network, International Journal of Innovations in Scientific and Engineering Research (IJISER), Vol.3, No.5, pp. 47-50. http://www.ijiser.com/paper/2016/vol3issue5/May2016p101.1.pdf
  16. Velmurugadass, P., Dhanasekaran, S., Anand, S. S. and Vasudevan, V. (2021), Enhancing Blockchain Security in Cloud Computing with IoT Environment Using ECIES and Cryptography Hash Algorithm. Materials Today: Proceedings,  Vol. 37, pp.2653-2659, https://doi.org/10.1016/j.matpr.2020.08.519.
  17. Khalid, I., Shah, T., Eldin, S. M., Shah, D., Asif, M. and Saddique, I. (2022), An Integrated Image Encryption Scheme Based on Elliptic Curve, IEEE Access, doi: 10.1109/ACCESS.2022.3230096.
  18. Alkady, Y., Habib, M. I. and Rizk, R. Y. (2013, December), A New Security Protocol Using Hybrid Cryptography Algorithms, In 2013 9th International Computer Engineering Conference (ICENCO), pp. 109-115, IEEE, doi: 10.1109/ICENCO.2013.6736485.
  19. Abbas, M. S., Mahdi, S. S. and Hussien, S. A. (2020, April), Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography, In 2020 International Conference on Computer Science and Software Engineering (CSASE) (pp. 123-127), IEEE, doi: 10.1109/CSASE48920.2020.9142072.
  20. Gupta, N. and Kapoor, V. (2020), Hybrid Cryptographic Technique to Secure Data in Web Application, Journal of Discrete Mathematical Sciences and Cryptography, Vol. 23, No.1, pp. 125-135, https://doi.org/10.1080/09720529.2020.1721872
  21. A. Hamza and B. Kumar, "A Review Paper on DES, AES, RSA Encryption Standards," 2020 9th International Conference System Modeling and Advancement in Research Trends (SMART), Moradabad, India, 2020, pp. 333-338, doi: 10.1109/SMART50582.2020.9336800.
Index Terms

Computer Science
Information Sciences

Keywords

Information AES RSA ECIES Hybrid Cryptography Encryption and Decryption