Skip to main content

2016 | OriginalPaper | Buchkapitel

An Efficient Hybrid Encryption Technique Based on DES and RSA for Textual Data

verfasst von : Smita Chourasia, Kedar Nath Singh

Erschienen in: Information Systems Design and Intelligent Applications

Verlag: Springer India

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The data security in almost every field is a challenging concern all around the globe. The application area may be as wide in the area of banking, internet, network and mobile data etc. The main focus of this paper is to secure the text data and provide a comparison with different parameters. DES and RSA are being used for comparison. A hybrid approach has been proposed in this paper based on the combination of DES and RSA algorithm. The comparison is done on the basis of size, length, number of keys and the time of encryption and decryption. The overall results suggest the hybrid encryption approach for the encryption and decryption process.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Piyush Rajan Satapathy, “Performance Measurment of AES Crypto Algorithm in Microcode Environment of IXP2400 Platform,” University of California, Riverside Projects, spring 2005. Piyush Rajan Satapathy, “Performance Measurment of AES Crypto Algorithm in Microcode Environment of IXP2400 Platform,” University of California, Riverside Projects, spring 2005.
2.
Zurück zum Zitat Mozaffari-Kermani, Mehran Reyhani-Masoleh, Arash, “Concurrent Structure-Independent Fault Detection Schemes for the Advanced Encryption Standard,” IEEE Transactions on Computers, Vol. 59, No. 5, May, 2010. Mozaffari-Kermani, Mehran Reyhani-Masoleh, Arash, “Concurrent Structure-Independent Fault Detection Schemes for the Advanced Encryption Standard,” IEEE Transactions on Computers, Vol. 59, No. 5, May, 2010.
3.
Zurück zum Zitat Bhavesh Joshi and Anil Khandelwal,” Rivest Cipher based Data Encryption and Clustering in Wireless Communication”, International Journal of Advanced Technology and Engineering Exploration (IJATEE), Volume-2, Issue-2, January-2015, pp. 17–24. Bhavesh Joshi and Anil Khandelwal,” Rivest Cipher based Data Encryption and Clustering in Wireless Communication”, International Journal of Advanced Technology and Engineering Exploration (IJATEE), Volume-2, Issue-2, January-2015, pp. 17–24.
4.
Zurück zum Zitat Farhadian, A. Aref, M.R,” Efficient Method for simplifying and approximating the S-Boxes Based on Power Functions,” Information Security IET, Vol.3 No. 3, Sept, 2009. Farhadian, A. Aref, M.R,” Efficient Method for simplifying and approximating the S-Boxes Based on Power Functions,” Information Security IET, Vol.3 No. 3, Sept, 2009.
5.
Zurück zum Zitat Sirwan Geramiparvar and Nasser Modiri, “Security as a Serious Challenge for E-Banking: a Review of Emmental Malware”, International Journal of Advanced Computer Research (IJACR), Volume-5, Issue-18, March-2015, pp. 62–67. Sirwan Geramiparvar and Nasser Modiri, “Security as a Serious Challenge for E-Banking: a Review of Emmental Malware”, International Journal of Advanced Computer Research (IJACR), Volume-5, Issue-18, March-2015, pp. 62–67.
6.
Zurück zum Zitat A. Mitra, Y V. Subba Rao, and S. R. M. Prasnna, “A new image encryption approach using combinational permutation techniques,” Journal of computer Science, vol. 1, no. 1, p. 127, 2006. A. Mitra, Y V. Subba Rao, and S. R. M. Prasnna, “A new image encryption approach using combinational permutation techniques,” Journal of computer Science, vol. 1, no. 1, p. 127, 2006.
7.
Zurück zum Zitat A. J. Elbirt and C. Paar, “An Instruction-Level Distributed Processor for Symmetric-Key Cryptography,” IEEE Trans. Parallel and distributed systems, vol. 16, no. 5, pp. 468–480, May 2005. A. J. Elbirt and C. Paar, “An Instruction-Level Distributed Processor for Symmetric-Key Cryptography,” IEEE Trans. Parallel and distributed systems, vol. 16, no. 5, pp. 468–480, May 2005.
8.
Zurück zum Zitat Nath, Asoke, et al. “Multi Way Feedback Encryption Standard Ver-2 (MWFES-2).” International Journal of Advanced Computer Research (IJACR) 3.1 (2013). Nath, Asoke, et al. “Multi Way Feedback Encryption Standard Ver-2 (MWFES-2).” International Journal of Advanced Computer Research (IJACR) 3.1 (2013).
9.
Zurück zum Zitat W. Stallings, Cryptography and Network Security. Englewood Cliffs, NJ: Prentice Hall, 2003. W. Stallings, Cryptography and Network Security. Englewood Cliffs, NJ: Prentice Hall, 2003.
10.
Zurück zum Zitat Satish Bhalshankar and Avinash K. Gulve, “Audio Steganography: LSB Technique Using a Pyramid Structure and Range of Bytes”, International Journal of Advanced Computer Research (IJACR), Volume-5, Issue-20, September-2015, pp. 233–248. Satish Bhalshankar and Avinash K. Gulve, “Audio Steganography: LSB Technique Using a Pyramid Structure and Range of Bytes”, International Journal of Advanced Computer Research (IJACR), Volume-5, Issue-20, September-2015, pp. 233–248.
11.
Zurück zum Zitat S. Trivedi and R. Chandramouli, “Secret Key Estimation in Sequential Steganography,” IEEE Trans. Signal Processing, vol. 53, no. 2, pp. 746–757, Feb. 2005. S. Trivedi and R. Chandramouli, “Secret Key Estimation in Sequential Steganography,” IEEE Trans. Signal Processing, vol. 53, no. 2, pp. 746–757, Feb. 2005.
12.
Zurück zum Zitat Y. Wu, “On the Security of an SVD-Based Ownership Watermarking,” IEEE Trans. Multimedia, vol. 7, no. 4, pp. 624–627, Aug. 2005. Y. Wu, “On the Security of an SVD-Based Ownership Watermarking,” IEEE Trans. Multimedia, vol. 7, no. 4, pp. 624–627, Aug. 2005.
13.
Zurück zum Zitat Y. T. Wu and F. Y. Shih, “An adjusted-purpose digital watermarking technique,” Pattern Recognition 37, pp. 2349–2359, 2004. Y. T. Wu and F. Y. Shih, “An adjusted-purpose digital watermarking technique,” Pattern Recognition 37, pp. 2349–2359, 2004.
14.
Zurück zum Zitat Mohammad Ali Bani Younes and Aman Jantan,” Image Encryption Using Block-Based Transformation Algorithm”, IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03. Mohammad Ali Bani Younes and Aman Jantan,” Image Encryption Using Block-Based Transformation Algorithm”, IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03.
15.
Zurück zum Zitat S. P. Nana’vati., P. K. panigrahi. “Wavelets:applications to image compression- I,”. joined of the scientific and engineering computing, vol. 9, no. 3, 2004, pp. 4– 10. S. P. Nana’vati., P. K. panigrahi. “Wavelets:applications to image compression- I,”. joined of the scientific and engineering computing, vol. 9, no. 3, 2004, pp. 4– 10.
16.
Zurück zum Zitat C. Ratael, gonzales, e. Richard, and woods, “Digital image processing,” 2nd ed, Prentice hall, 2002. C. Ratael, gonzales, e. Richard, and woods, “Digital image processing,” 2nd ed, Prentice hall, 2002.
17.
Zurück zum Zitat AL. Vitali, A. Borneo, M. Fumagalli and R. Rinaldo,”Video over IP using standard-compatible multiple description coding,” Journal of Zhejiang University- Science A, vol. 7, no. 5,2006, pp. 668– 676. AL. Vitali, A. Borneo, M. Fumagalli and R. Rinaldo,”Video over IP using standard-compatible multiple description coding,” Journal of Zhejiang University- Science A, vol. 7, no. 5,2006, pp. 668– 676.
18.
Zurück zum Zitat S. Masadeh W. Salameh. End to end keyless self-encrypting/decrypting streaming cipher. In: Information Technology & National Security Conference. 2007. S. Masadeh W. Salameh. End to end keyless self-encrypting/decrypting streaming cipher. In: Information Technology & National Security Conference. 2007.
19.
Zurück zum Zitat A. Nadeem MYJ. A performance comparison of data encryption algorithms. In: First International Conference on Information and Communication Technologies. 2005:84– 89. A. Nadeem MYJ. A performance comparison of data encryption algorithms. In: First International Conference on Information and Communication Technologies. 2005:84– 89.
20.
Zurück zum Zitat Matalgah, Mustafa M., Magableh, A.M., “Simple encryption algorithm with improved performance in wireless communications”, IEEE 2011. Matalgah, Mustafa M., Magableh, A.M., “Simple encryption algorithm with improved performance in wireless communications”, IEEE 2011.
21.
Zurück zum Zitat Asoke Nath, Debdeep Basu, Surajit Bhowmik, Ankita Bose, Saptarshi Chatterjee, “Multi Way Feedback Encryption Standard Ver-2(MWFES-2)”, International Journal of Advanced Computer Research (IJACR), Volume-3, Issue-13, December-2013, pp. 28–34. Asoke Nath, Debdeep Basu, Surajit Bhowmik, Ankita Bose, Saptarshi Chatterjee, “Multi Way Feedback Encryption Standard Ver-2(MWFES-2)”, International Journal of Advanced Computer Research (IJACR), Volume-3, Issue-13, December-2013, pp. 28–34.
22.
Zurück zum Zitat Sagar Chouksey, Rashi Agrawal, Dushyant Verma,Tarun Metta, “Data Authentication Using Cryptography”, International Journal of Advanced Computer Research (IJACR), Volume-3, Issue-10, June-2013, pp. 183–186. Sagar Chouksey, Rashi Agrawal, Dushyant Verma,Tarun Metta, “Data Authentication Using Cryptography”, International Journal of Advanced Computer Research (IJACR), Volume-3, Issue-10, June-2013, pp. 183–186.
23.
Zurück zum Zitat Wai Wai Zin and Than Naing Soe,” Implementation and Analysis of Three Steganographic Approaches”, IEEE 2011. Wai Wai Zin and Than Naing Soe,” Implementation and Analysis of Three Steganographic Approaches”, IEEE 2011.
24.
Zurück zum Zitat Sandeep Bhowmik and Sriyankar Acharyya,” Image Cryptography: The Genetic Algorithm Approach”, IEEE 2011. Sandeep Bhowmik and Sriyankar Acharyya,” Image Cryptography: The Genetic Algorithm Approach”, IEEE 2011.
25.
Zurück zum Zitat Rohollah Karimi and Mohammad Kalantari, “Enhancing security and confidentiality in location-based data encryption algorithms”, IEEE 2011. Rohollah Karimi and Mohammad Kalantari, “Enhancing security and confidentiality in location-based data encryption algorithms”, IEEE 2011.
26.
Zurück zum Zitat Rajavel, D., Shantharajah, S.P., “Cubical key generation and encryption algorithm based on hybrid cube’s rotation”, IEEE 2012. Rajavel, D., Shantharajah, S.P., “Cubical key generation and encryption algorithm based on hybrid cube’s rotation”, IEEE 2012.
27.
Zurück zum Zitat P. Fanfara, E. Danková and M. Dufala, “Usage of Asymmetric Encryption Algorithms to Enhance the Security of Sensitive Data in Secure Communication”, 10th IEEE Jubilee International Symposium on Applied Machine Intelligence and Informatics, SAMI 2012. P. Fanfara, E. Danková and M. Dufala, “Usage of Asymmetric Encryption Algorithms to Enhance the Security of Sensitive Data in Secure Communication”, 10th IEEE Jubilee International Symposium on Applied Machine Intelligence and Informatics, SAMI 2012.
28.
Zurück zum Zitat Lili Yu, Zhijuan Wang and Weifeng Wang, “The Application of Hybrid Encryption Algorithm in Software Security”, 2012 Fourth International Conference on Computational Intelligence and Communication Networks. Lili Yu, Zhijuan Wang and Weifeng Wang, “The Application of Hybrid Encryption Algorithm in Software Security”, 2012 Fourth International Conference on Computational Intelligence and Communication Networks.
29.
Zurück zum Zitat Seung-Hoon Cho, Chan-Bok Jeong, Seok-Wun Ha, Yong Ho Moon,” A Flight Data Storage System with Efficient Compression and Enhanced Security”, IEEE 2012. Seung-Hoon Cho, Chan-Bok Jeong, Seok-Wun Ha, Yong Ho Moon,” A Flight Data Storage System with Efficient Compression and Enhanced Security”, IEEE 2012.
30.
Zurück zum Zitat Shikha Joshi, Pallavi Jain,” A Secure Data Sharing and Communication with Multiple Cloud Environments with Java API”, International Journal of Advanced Computer Research (IJACR) Volume 2 Number 2 June 2012. Shikha Joshi, Pallavi Jain,” A Secure Data Sharing and Communication with Multiple Cloud Environments with Java API”, International Journal of Advanced Computer Research (IJACR) Volume 2 Number 2 June 2012.
31.
Zurück zum Zitat Saket Gupta, “Secure and Automated Communication in Client and Server Environment”, International Journal of Advanced Computer Research (IJACR), Volume-3, Issue-13, December-2013, pp. 263–271. Saket Gupta, “Secure and Automated Communication in Client and Server Environment”, International Journal of Advanced Computer Research (IJACR), Volume-3, Issue-13, December-2013, pp. 263–271.
32.
Zurück zum Zitat Ashutosh Kumar Dubey, Animesh Kumar Dubey, Mayank Namdev, Shiv Shakti Shrivastava,” Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment”, CONSEG 2012. Ashutosh Kumar Dubey, Animesh Kumar Dubey, Mayank Namdev, Shiv Shakti Shrivastava,” Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment”, CONSEG 2012.
33.
Zurück zum Zitat Khandelwal, Anil, et al. “Establishing Secure Event Detection with Key Pair in Heterogeneous Wireless Sensor Network.” Advanced Materials Research. Vol. 433. 2012. Khandelwal, Anil, et al. “Establishing Secure Event Detection with Key Pair in Heterogeneous Wireless Sensor Network.” Advanced Materials Research. Vol. 433. 2012.
34.
Zurück zum Zitat Wuling Ren; Zhiqian Miao, “A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication,” Modeling, Simulation and Visualization Methods (WMSVM),Second International Conference on, vol., no., pp. 221, 225, 15–16 May 2010. Wuling Ren; Zhiqian Miao, “A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication,” Modeling, Simulation and Visualization Methods (WMSVM),Second International Conference on, vol., no., pp. 221, 225, 15–16 May 2010.
Metadaten
Titel
An Efficient Hybrid Encryption Technique Based on DES and RSA for Textual Data
verfasst von
Smita Chourasia
Kedar Nath Singh
Copyright-Jahr
2016
Verlag
Springer India
DOI
https://doi.org/10.1007/978-81-322-2755-7_9

Premium Partner