A Comparative Analysis of Cryptographic Algorithms AES & RSA and Hybrid Algorithmfor Encryption and Decryption
A Comparative Analysis of Cryptographic Algorithms AES & RSA and Hybrid Algorithmfor Encryption and Decryption
ISSN No:-2456-2165
The key research methodologies employed for the AES: - NIST announced the Advanced Encryption Standard
research endeavor are qualitative and quantitative research algorithm in 2001. AES is one of the symmetric cypher
methodologies. Following the use of both approaches result algorithms which were created in order to take the role of DES.
will be highlighted in detail and conclusion of my research Following this, AES's security process and security strength are
described. on par with 3DES, with much enhanced accuracy. The Rijndael
that was proposed for AES established an encryption that the
block and the key lengths are set to 128,192, or 256 bits,
respectively. The AES specification makes use of the same
algorithm. three key size options as DES specification
However, the block size is limited to 128 bits.. In the AES
structure “A” stand for add round as illustrated in the figure
below.
Asymmetric encryption algorithm: In this type of algorithm The proposed algorithm combined the features of
two keys are used that is private and public key. The public key symmetric key encryption (AES) and asymmetric key
is used to encrypt the data, while to decode it, a private key is encryption(RSA) to overcome the problem of key management
used. However, the fundamental drawback of public key in AES and hightime taken of RSA due to the high key length
encryption is that it relies on mathematical functions. Because respectively.
asymmetric encryption techniques demand more computational
processing capacity than symmetric encryption approaches, It employs a variety of applications in order to get
they are much slower. When using an asymmetric algorithm accurate result. The AES key algorithm is used to encrypt and
we will take a look at RSA algorithm as it is the most decode data. AES -Key generated cipher text will be encrypted
commonasymmetric algorithm using RSA key algorithm, which ensures the data integrity,
authentication and non-repudiation will besaved.
RSA: RSA algorithm was developed by Leonard Adleman,
Ron Rivest, and Adi Shamir It was first created in 1977. It is Proposed hybrid encryption technique follows the
widely used in a variety of applications, such as web browsers. following steps:
It's an asymmetric key security algorithm that's very similar to
DES. It's a patented algorithm. The RSAalgorithm employs two Encryption:
distinct keys, one for encryption and the other for decryption. Provide AES key
The publicand private keys are the two types of keys. Provide RSA public key
Provide RSA private
IV. PROPOSED WORK Get the data to be encrypted
Data encrypt using AES key
The application of many different cryptography Encrypt AES key generated cipher text using RSA public
techniques can provide a mechanism for the solution to more key
deficiencies that are happening in a security cryptographic
system whichinclude: Decryption
1. Key encryption management guarantees that all security Verify signature using RSA public key
objectives are met. Decrypt AES key generated cipher text using RSA private
2. To develop a secure communication application that allows key
users to share information and dataover the Internet.
Decrypt data using AES key
3. Since people are transferring a lot of data, there should have
Get the original data encrypted
been a cryptographic technique created that was examined,
tested, and reliable.
Note:
AES stand for AES Encryption time/ms RSA stand for RSA
encryption time/ms
PRA stand for Proposed algorithm encryption time/ms