CFP last date
20 January 2025
Reseach Article

Multimedia Encryption using Hybrid Cryptographic Approach

Published on August 2016 by Sridhar C. Iyer, R. R. Sedamkar, Shiwani Gupta
International Conference on Communication Computing and Virtualization
Foundation of Computer Science USA
ICCCV2016 - Number 1
August 2016
Authors: Sridhar C. Iyer, R. R. Sedamkar, Shiwani Gupta
f80399e5-f038-4e68-80bb-b824fbece360

Sridhar C. Iyer, R. R. Sedamkar, Shiwani Gupta . Multimedia Encryption using Hybrid Cryptographic Approach. International Conference on Communication Computing and Virtualization. ICCCV2016, 1 (August 2016), 1-5.

@article{
author = { Sridhar C. Iyer, R. R. Sedamkar, Shiwani Gupta },
title = { Multimedia Encryption using Hybrid Cryptographic Approach },
journal = { International Conference on Communication Computing and Virtualization },
issue_date = { August 2016 },
volume = { ICCCV2016 },
number = { 1 },
month = { August },
year = { 2016 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/icccv2016/number1/25594-0162/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Communication Computing and Virtualization
%A Sridhar C. Iyer
%A R. R. Sedamkar
%A Shiwani Gupta
%T Multimedia Encryption using Hybrid Cryptographic Approach
%J International Conference on Communication Computing and Virtualization
%@ 0975-8887
%V ICCCV2016
%N 1
%P 1-5
%D 2016
%I International Journal of Computer Applications
Abstract

Data security is of utmost importance in today's world. Especially when the data is travelling through an insecure communication network. There are symmetric key encryption techniques which use only one key for both encryption and decryption of the data. They are simple in design but can be easily cracked using brute force attacks. The entire security of such a cipher could be compromised if the attacker anyhow gets access to the keys. On the other hand, there are asymmetric key based algorithms which use a pair of keys, one for encryption, and the other for decryption, whose security is higher as compared to the symmetric ones but lack in time efficiency. It is also difficult to manage such a huge base of key-pairs efficiently and safely. This paper mainly focusses on the implementation of a system capable of encryption and decryption of multimedia data (Text, Images, Videos, Audio etc. ) using a hybrid model based on the amalgamation of symmetric encryption techniques such as AES[1] and asymmetric techniques such as ECC. ECC is based on the toughness of the discrete logarithm problem (DLP), whose public key is short, network bandwidth is little and ability to resist to attack is strong which makes it really difficult to guess the keys. Even if the attacker gets access to any of the keys, he or she won't be in a position to decipher it in a relatively finite amount of man-years.

References
  1. Daemen, Joan, Rijmen, Vincent. (March 9,),AES Proposal: Rijndael. National Institute of Standards and Technology 2003; p. 1. Retrieved 21 February 2013.
  2. Jawahar Thakur, Nagesh Kumar. DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis. International Journal of Emerging Technology and Advanced Engineering December 2011; vol 1(2), p. 6-12
  3. R. L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 1977; p. 120-126
  4. wikipedia. org,"Advanced Encryption Standard", https://en. wikipedia. org/wiki/Advanced_Encryption_Standard. .
  5. S. M. Celestin ,V. K. Muneeswaran, Implementation of Text based Cryptosystem using Elliptic Curve Cryptography. IEEE International Conference on Advanced Computing Dec 2009; p. 82-85.
  6. HafidMammass and FattehallahGhadi, Implementation of Smartcard Personalization Software. International Journal of Future Generation Communication and Networking 2012; vol 5(4). p. 39-54
  7. F. Amounas and E. H. El Kinani, A Novel Encryption Scheme of Amazigh Alphabet Based Elliptic Curve using Pauli Spin ½ Matrices. International Journal of Information & Network Security (IJINS) 2013;vol 2(3),p. 190-196.
  8. Md. Zaheer Abbas, Dr. JVR Murthy,Authenticated And Policy - Compliant Source Routing. International Journal of Engineering Research and Applications (IJERA) 2012;vol 2(3),p. 1347-1352.
  9. B. Padmavathi, S. RanjithaKumari, "A Survey onPerformance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique," International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064; Volume 2 Issue 4, April 2013;p. 170-174
Index Terms

Computer Science
Information Sciences

Keywords

Ecc Hybrid Encryption Multimedia Encryption Cryptography Symmetric Encryption Asymmetric Encryption