• Corpus ID: 14735207

A New Way to Design and Implementation of Hybrid Crypto System for Security of the Information in Public Network

  title={A New Way to Design and Implementation of Hybrid Crypto System for Security of the Information in Public Network},
  author={Ravindra Kumar Gupta and Parvinder Singh},
In this paper, a new hybrid concept is proposed by analyzing the principle of the hybrid cryptography based on the combination of symmetric and message digesting. Moreover, the security and performance of the proposed concept will also estimate. In proposed concept we designed a new symmetric encryption algorithm and combine with SHA- 1 message digesting function to provide hybrid nature. Now the proposed system will try to improve exiting problem. In proposed system symmetric key will use… 

Figures and Tables from this paper

This work proposes hybrid cryptosystem for data security in order to meet the security requirements: confidentiality, authentication, data integrity and non-repudiation.
New Hybrid Cryptosystem for Internet Applications
A new proposed hybrid cryptosystem is demonstrated, which combines the one-time pad that is theoretically unbreakable cipher, with the most strong encryption algorithms today’s, the RSA public-key algorithm, and the AES standard secret- key algorithm, to offer unconditionally secured cryptos system.
Implementation of Combination Vigenere Cipher and RSA in Hybrid Cryptosystem for Text Security
A hybrid cryptosystem coding method using a combination of Vigenere Cipher and RSA can be implemented to increase text security and increase speed in the encryption process.
Hybrid encryption/decryption technique using new public key and symmetric key algorithm
This research study proposes hybrid encryption system using new public key algorithm and private key algorithm, which provides more security as well as authentication comparing to other existing hybrid algorithm.
A New Mathematical Model to Improve Encryption Process Using Taylor Expansion
Data transmission through channels is gaining upsurge, and there has been a need to protect data from hackers (which may cause hacking, fabrication or modification, etc.), also to protect the
A New Cryptography Algorithm Based on ASCII Code
This paper proposes a new cryptography algorithm which considers linking each character in the plaintext with its previous one during encryption and decryption and the simulations results show the effectiveness of the proposed algorithm.
Minimizing the Effect of Brute Force Attack using Hybridization of Encryption Algorithms
Transposition Reverse String Algorithm is used for Hybrid Encryption Method because it has fast Execution time in comparison to another hybrid approaches, so it is an optimize Hybrid Enc encryption Method.
Lightweight Feistel structure based hybrid-crypto model for multimedia data security over uncertain cloud environment
A highly robust Lightweight Feistel Structure based Substitution Permutation Crypto Model is developed for multimedia data security over uncertain cloud environment and achieves better attack-resilience even maintaining low entropy, high-correlation, and satisfactory computation time for multimediaData encryption.
Exchanging Biometric Keys in Secrecy
  • M. Sakre
  • Computer Science, Mathematics
  • 2015
It is proven that extracting any information about the bio-key and/or from the encrypted data is hard for any eavesdroppers with computational resources, so that key management plays a fundamental role in cryptography as the basis for securing cryptographic methods.


A novel approach to the design of a new hybrid security protocol architecture
  • K. Bhatele, Amit Sinhal, M. Pathak
  • Computer Science, Mathematics
    2012 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT)
  • 2012
This research paper is simply the gathering of recent developments in the field of Hybrid cryptography and its application in the designing of a hybrid security protocol for online transaction based
A Modification of TEA Block Cipher Algorithm for Data Security (MTEA)
This paper attempts to develop a simple, stronger a nd safer cryptographic algorithm which would not only be a secure one, but also reduces total time taken for encryption and decryption. The
A new security protocol for on line transaction can be designed using combination of both symmetric and asymmetric cryptographic techniques, which provides three cryptographic primitives such as integrity, confidentiality and authentication.
A hybrid reconfigurable cryptographic processor with RSA and SEA
  • A. Chitra, T. Sheeba
  • Computer Science, Mathematics
    2012 International Conference on Recent Trends in Information Technology
  • 2012
Data security is in Demand in everyday life of Digital World, since Digital data's can be reproduced much easily. To achieve the maximum security required a Parallel Processing, User Reconfigurable
Timing Evaluation of the Known Cryptographic Algorithms
  • Yan Wang, Mingming Hu
  • Computer Science
    2009 International Conference on Computational Intelligence and Security
  • 2009
A new timing evaluation model based on random number generating mechanism is proposed here to analyze the time-consuming of the known cryptographic algorithms: triple-DES, AES and RSA, and the results show that RSA is about several hundred times slower than AES.
Correlation Attack to the Block Cipher RC5 and the Simplified Variants of RC6
This paper improves the attack and applies this method to the block cipher RC5 and simpli ed variants of RC6 and shows full rounds RC5 with some weak key can be broken by using lesser complexity than that of the exhaustive search.
Simple Encryption/Decryption Application
This paper presents an Encryption/Decryption application that is able to work with any type of file; for example: image files, data files, documentation files...etc. The method of encryption is
A new lightweight hybrid cryptographic algorithm for the internet of things
This paper addresses some of the available lightweight ciphers, compares between them and comes up with a new algorithm that can fit low computation devices.
A Hybrid Crypto System based on a new Circle- Symmetric key Algorithm and RSA with CRT Asymmetric key Algorithm for E-commerce Applications
This paper presents a hybrid cryptographic system that combines both the symmetric key algorithm, which uses the properties of a circle and asymmetric-key algorithm of RSA with CRT, which improves the performance of the basic RSA algorithm by four.
The application of hybrid encryption algorithm in software security
This paper presents a new hybrid encryption algorithm by reassembling several well-known encryption algorithms in a certain order, then improve and optimize the algorithm in order to improve security purposes.