Skip to main content
Top

2019 | OriginalPaper | Chapter

Enrichment of Security Using Hybrid Algorithm

Authors : Deeksha Ekka, Manisha Kumari, Nishi Yadav

Published in: International Conference on Computer Networks and Communication Technologies

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, the concept of symmetric encryption method, AES (Advanced Encryption Standard) and asymmetric encryption method, RSA followed by an EX-OR operation are combined to introduce a new Hybrid Algorithm for the enrichment of data security over network. The proposed scheme adds up more complexity in data by increasing confusion and diffusion in ciphertext using AES for data encryption and RSA for key encryption. Thus, intruder will require more time to decrypt the text and it also resolves the brute-force attack, differential attack, and linear attack. The performance analysis of proposed scheme is done and compared with the AES and RSA on the basis of encryption and decryption time. The result shows that the proposed scheme takes less time for encryption process and more time for decryption process, hence it improves the security of the data.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Sharma, A., Singh, A.: Hybrid improved technique for data security and authentication for RDIF tags. In: IEEE International Conference on Signal Processing, Computing and Control (ISPCC2017) Sharma, A., Singh, A.: Hybrid improved technique for data security and authentication for RDIF tags. In: IEEE International Conference on Signal Processing, Computing and Control (ISPCC2017)
2.
go back to reference Shahara Banu, T., Shajeesh, K.U.: Secure reversible data hiding technique on textures using double encryption. In: International Conference on Innovations in Information, Embedded and Communication System (ICIIECS 2017) Shahara Banu, T., Shajeesh, K.U.: Secure reversible data hiding technique on textures using double encryption. In: International Conference on Innovations in Information, Embedded and Communication System (ICIIECS 2017)
3.
go back to reference Oyetola Oluwadamilola, K., Okubanjo Ayodeji, A., Osifeko Martins, O.: An improved authentication system using hybrid of biometrics and cryptography. In: International Conference on Electro-Technology for National Development (NIGRCON) (2017) Oyetola Oluwadamilola, K., Okubanjo Ayodeji, A., Osifeko Martins, O.: An improved authentication system using hybrid of biometrics and cryptography. In: International Conference on Electro-Technology for National Development (NIGRCON) (2017)
4.
go back to reference Harini, M., Pushpa Gowri, K., Pavithra, C., Pradhiba Selvarani, M.: A novel security mechanism using hybrid cryptography algorithm. (ICEICE2017) Harini, M., Pushpa Gowri, K., Pavithra, C., Pradhiba Selvarani, M.: A novel security mechanism using hybrid cryptography algorithm. (ICEICE2017)
5.
go back to reference Hazra, T.K., Mahato, A., Mandal, A., Chakraborty, A.K.: A hybrid cryptosystem of image and text files using blowfish and Diffie Hellman technique. (IEMECON2017) @IEEE Hazra, T.K., Mahato, A., Mandal, A., Chakraborty, A.K.: A hybrid cryptosystem of image and text files using blowfish and Diffie Hellman technique. (IEMECON2017) @IEEE
6.
go back to reference Rachmawanto, E.H., Amin, R.S., Setiadi, D.R.I.M., Sari, C.A.: A performance analysis Stego Crypt algorithm based on LSB-AES 128 bit in various image size. In: International Seminar on Application for Technology of Information and Communication (iSemantic2017) Rachmawanto, E.H., Amin, R.S., Setiadi, D.R.I.M., Sari, C.A.: A performance analysis Stego Crypt algorithm based on LSB-AES 128 bit in various image size. In: International Seminar on Application for Technology of Information and Communication (iSemantic2017)
7.
go back to reference Bhandari, A., Gupta, A., Das, D.: Secure algorithm for cloud computing and its applications. 2016 IEEE Bhandari, A., Gupta, A., Das, D.: Secure algorithm for cloud computing and its applications. 2016 IEEE
8.
go back to reference D’souza, F.J., Panchal, D.: Advanced encryption standard (AES) security enhancement using hybrid approach. In: International Conference on Computing, Communication and Automation (ICCCA2017) D’souza, F.J., Panchal, D.: Advanced encryption standard (AES) security enhancement using hybrid approach. In: International Conference on Computing, Communication and Automation (ICCCA2017)
9.
go back to reference Vichare, A., Jose, T., Tiwari, J., Yadav, U.: Data security using authenticated encryption and decryption algorithm for Android phones. In: International Conference on Computing, Communication and Automation(ICCCA2017) Vichare, A., Jose, T., Tiwari, J., Yadav, U.: Data security using authenticated encryption and decryption algorithm for Android phones. In: International Conference on Computing, Communication and Automation(ICCCA2017)
10.
go back to reference Ebrahim, M.A., El-Maddah, I.A.M., Mohamed, H.K.: Hybrid model for cloud data security using steganography. @2017 IEEE Ebrahim, M.A., El-Maddah, I.A.M., Mohamed, H.K.: Hybrid model for cloud data security using steganography. @2017 IEEE
Metadata
Title
Enrichment of Security Using Hybrid Algorithm
Authors
Deeksha Ekka
Manisha Kumari
Nishi Yadav
Copyright Year
2019
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8681-6_80