0% found this document useful (0 votes)
17 views5 pages

Base Paper1 (2020)

The document presents a hybrid cryptography algorithm that combines RSA and Diffie-Hellman for secure communication over the internet, aiming to enhance data confidentiality, integrity, and authentication. The proposed algorithm is designed to be efficient in terms of encryption and decryption time while maintaining high security, making it suitable for sensitive data transmission. Experimental results indicate that this hybrid approach offers a slight increase in processing time compared to traditional RSA, but significantly improves security in open network environments.

Uploaded by

divyad8809
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views5 pages

Base Paper1 (2020)

The document presents a hybrid cryptography algorithm that combines RSA and Diffie-Hellman for secure communication over the internet, aiming to enhance data confidentiality, integrity, and authentication. The proposed algorithm is designed to be efficient in terms of encryption and decryption time while maintaining high security, making it suitable for sensitive data transmission. Experimental results indicate that this hybrid approach offers a slight increase in processing time compared to traditional RSA, but significantly improves security in open network environments.

Uploaded by

divyad8809
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Hybrid Cryptography Algorithm For Secure

And Low Cost Communication


Suman Kalyan Ghosh Sachin Rana Anushikha Pansari
Information Technology Information Technology Information Technology
Heritage Institute of Technology Heritage Institute of Technology Heritage Institute of Technology
Kolkata, India Kolkata, India Kolkata, India
[email protected] [email protected] [email protected]

Joydev Hazra Satarupa Biswas


Information Technology Information Technology
Heritage Institute of Technology Heritage Institute of Technology
Kolkata, India Kolkata, India
[email protected] [email protected]

Abstract–In a client-server architecture or to transmit or store sensitive information over


open networks such as the internet, transmission insecure networks such as the internet in way that
of data may lead to leak of confidential it cannot be read by an unauthorized person except
information. The objective of encryption is its intended recipient.[11]
to secure or protect data from unauthorized Cryptography is used by security professionals
access or modifications. In this paper a hybrid for various reasons but the three main reasons for
cryptography algorithm is proposed in order using cryptography are : Data Confidentiality, Data
to achieve confidentiality and increase security Integrity and Data Authentication.[7]
in the communications taking place over the Confidentiality or data privacy is the most
internet. The paper also focuses on the time important goal of cryptography hence the meaning
taken for the encryption and decryption process of a message is encoded to conceal it. The sender
so that the algorithm is not CPU exhaustive. uses a cryptographic key to encrypt the message
and the recipient also uses the same or a different
cryptographic key to decrypt or decode the message.
Index Terms—Hybrid Cryptography, Private Key Data integrity involves ensuring that the message
Algorithms, Secure Transmission received is similar to the sent message i.e it has
not been modified or altered in any way. A unique
I. I NTRODUCTION message digest is created using hashing from the
Cryptography is a term that is derived from sent message and using the same technique, the
the Greek words “kryptos” meaning “hidden” and recipient creates a second digest from the received
“graphein” which means “to write” [7]. message for comparison with the original one.[7]
Cryptography involves hidden words or the study The most simplest form of encryption is known
of information hiding and verification that includes as the Caesar’s cipher which is done by simply
the use of algorithms, protocols and strategies to shifting each letter a set of spaces up or down the
consistently and securely delay or prevent access alphabet.
to sensitive information by unauthorized persons There are primarily 4 main types of cryptography
while enabling verifiability of all components in in use today each with its own set of advantages
a communication. Cryptography allows people and disadvantages.

Authorized licensed use limited to: University College London. Downloaded on July 06,2020 at 17:04:11 UTC from IEEE Xplore. Restrictions apply.
1) Symmetric Cryptography : It is the most of public key cryptosystem with the efficiency of a
traditional form of cryptography which uses a symmetric key cryptosystem.
single key to encrypt a message and also to decrypt
the message. It needs a secure channel for key A highly secure cipher generation technique
delivery hence it is not suitable for communications using RSA, DES and SHA1 algorithms was
over internet.[1] presented by Dr. Vivek Kapoor [5]. He also
2) Asymmetric Cryptography : As the name compares the time and space complexity of the
suggests it has two different keys for encryption proposed hybrid algorithm to the traditional RSA
and decryption. The first key is a public key which algorithm and proves it to be more efficient.
is used for encryption at sender side and the second
is private key which is used for decryption at Arpit Agarwal [6] proposed a hybrid model using
receiver side.[1] RSA, SHA-1 and RC5 to achieve confidentiality,
3) Key Exchange Algorithms : Although not authentication and integrity.
being used for encryption but it has a significant
purpose as it provides a way to securely exchange An efficient hybrid algorithm which can provide
keys which are generated by the symmetric or three cryptographic primitives i.e integrity,
asymmetric algorithms.[1] confidentiality and authentication using the
4) Hybrid Cryptography : As the name suggests combinatorial effect of Elliptic curve cryptography,
it is made up of two algorithms which are blended Dual RSA and MD5 is proposed in the paper of
with each other in order to provide increase Manali J Dubal [8]. The protocol is robust and
security. PGP is a well known hybrid algorithm lightweight that uses blind factor for its security.
used in security of e-mail communications.[1]
Miss Manorama Chauhan [9] in her paper
The following two algorithms will be used used ECC and Hash generation algorithm. The
for developing the hybrid algorithm: paper also implements the algorithm where the
1. RSA algorithm - accounts for the primary key stream is generated based on the properties of
encryption of the text message. ECC.
2. Diffie-Hellman Key Exchange - accounts for
securely transmitting the public key of RSA to the A hybrid encryption that combines both symmetric
receiver. and asymmetric algorithms giving high security
and minimized key maintenance is proposed by
II. LITERATURE REVIEW Yashmin Alkady [10]. It uses ECC and AES to
The following are discussed various existing provide to provide node encryption. XOR Dual
cryptographic and hybrid cryptographic methods : RSA is used for authentication.

S.Subhasree [2] proposes a hybrid algorithm


using Elliptic curve cryptography, Dual RSA and III. PROPOSED ALGORITHM
MD5 for better security and integrity. It also
provides the three primitives of cryptography i.e We have proposed a hybrid algorithm using RSA
integrity, confidentiality and authentication. and Diffie-Hellman where the Diffie-Hellman acts as
a secure key transmission agent for the RSA and the
A hybrid cryptographic algorithm by combining RSA accounts for the security of the message. The
AES and DES is presented by Jigar Chauhan [3] , Diffie-Hellman keys are used to modify and regain
the paper also gives the idea of integrating the AES the original cipher text before and after sending
within the fiestel cipher of DES for an efficient respectively. Different key sizes of RSA according
AES-DES hybrid. to the required amount of secrecy can be chosen
by the user. We have tried to keep the algorithm as
Prakash Kuppuswamy [4] combines the convenience simple as possible.

Authorized licensed use limited to: University College London. Downloaded on July 06,2020 at 17:04:11 UTC from IEEE Xplore. Restrictions apply.
using RSA algorithm.
Step 4 : The output of the RSA algorithm is the
deciphered original message.
IV. RESULT & ANALYSIS
The Analysis and comparisons have been per-
formed between the traditional RSA algorithm and
the proposed hybrid algorithm with some param-
eters like key-size, message size, encryption and
decryption time. The Intel I5 processor with 8GB
Main memory and Macintosh OS has been used.
The Algorithms are implemented using JavaSE 10.2.
Fig. 1. shows communication using proposed algorithm
A. Encryption time v/s Message size
The table 1 shows the data collected for different
The Diffie-Hellman and the RSA both being two
message sizes input to the RSA and the proposed
completely different modules work together for the
algorithm. The Fig 2 shows the plot of the compar-
secure encryption and transmission of the message.
ison table 1.
The left side of the above flowchart shows the Diffie-
Hellman module and the right side of the flowchart TABLE I
shows the RSA module and the center part shows the E NCR . T IME C OMPARISON TABLE
communication taking place using both the Diffie-
Msg Size Enc. Time Enc. Time
Hellman and the RSA modules. The communication (chars) RSA(ms) Proposed(ms)
begins with the exchange of Diffie-Hellman public 100 91 92
numbers and then the generated shared secret is used 200 92 93
500 96 97
for modifying the cipher text generated by RSA 1000 100 102
to another cipher text which is sent through the
internet.

A. Encryption Process
Step 1 : The Sender and receiver generate their
respective D-H public and private keys and RSA
public and private keys.
Step 2 : The sender and receiver exchange their
Diffie-Hellman public keys during handshake.
Step 3 : The sender encrypts the message using
RSA. He may choose any key size according to the
security he needs.
Step 4 : The ciphertext generated is swapped then
added with the D-H public key received in step 1.
Step 5 : The resulting cipher is sent over the
network to the intended recepient. Fig. 2. Encryption time comparison of RSA and Proposed Hybrid
Algorithm
B. Decryption Process
Step 1 : The Cipher text is received. B. Decryption time v/s Message size
Step 2 : The Cipher text is swapped back and added The table II shows the data collected for different
with the D-H private key in order to get the original message sizes input to the RSA and the proposed
cipher text. algorithm. The Fig 3 shows the plot of the compar-
Step 3 : The original cipher text is now decrypted ison table II.

Authorized licensed use limited to: University College London. Downloaded on July 06,2020 at 17:04:11 UTC from IEEE Xplore. Restrictions apply.
TABLE II private key cryptographic algorithm. But as the key
D ECR . T IME C OMPARISON TABLE size in the private key cryptographic algorithm is
Msg Size Dec. Time Dec. Time larger and hence would consume a large bandwidth
(chars) RSA(ms) Proposed(ms) for transmission our next aim would be to minimize
100 81 83 this key but of course not at the cost of security.
200 82 83
500 84 88
1000 91 194 VI. FUTURE SCOPE
The proposed hybrid algorithm can be slightly
modified to be used as digital signatures and the
bandwidth of the transmission required can be
highly reduced with application of some compres-
sion techniques or bit discarding techniques over the
generated cipher text.
ECC could be used in place of RSA which would
lead to reduction in the key-size and greater security
hence it would also result to less bandwidth being
consumed in message transmission i.e reduced cost
of communication.

R EFERENCES
[1] Introduction to cryptography and types of cryptography,
Rob Mardisalu. https://thebestvpn.com/cryptography/
Fig. 3. Decryption time comparison of RSA and Proposed [2] S.Subasree and N.K.Sakthivel, IJRRAS 2(2), February
Hybrid Algorithm 2010. Design of A New Security Protocol Using Hybrid
Cryptography Algorithms.
[3] Jigar Chauhan, Neekhil Dedhia, Bhagyashri Kulka-
rni,”Enhancing Data Security by using Hybrid Crypto-
The increased security accounts for a slight in- graphic Algorithm”, International Journal of Engineering
crease in the Encryption and Decryption time of the Science and Innovative Technology (IJESIT) Volume 2,
hybrid algorithm when compared to the traditional Issue 3, May 2013.
[4] Prakash Kuppuswamy, Sayeed Q.Y.Al-khalidi, ”Hybrid
RSA, the security of the algorithm matters the most Encryption/Decryption Technique Using New Public Key
when it comes to cryptography hence considering and Symmetric Key Algorithm”, MIS Review Vol. 19,
the difference of a few milliseconds the hybrid No. 2, March (2014), pp. 1-13.
[5] Dr.Vivek Kapoor, Rahul Yadav, ”A Hybrid cryptography
algorithm gives a very high security to the message. technique for increasing network security”,International
Journal of Computer Applications (0975 – 8887) Volume
V. CONCLUSION 141 – No.11, May 2016.
[6] Arpit Agarwal, Gunjan Patnakar, ”Design of Hybrid
The experimental results shows that the proposed Cryptography Algorithm for Secure Communication”,
solution is a more efficient way to encrypt messages International Research Journal of Engineering and Tech-
with a very slight difference in the runtime of the nology (IRJET) Volume: 03 Issue: 01 — Jan-2016.
[7] Introdution and aspects of Cryp-
algorithm , it provides us with high security in the tography, Imran Abdul Ghani
open internet world. The aim of this work was to http://www.topwcftutorials.net/2018/08/introduction-
design and implement a hybrid algorithm to address to-cryptography.html
[8] Manali J Dubal, Mahesh T R, Pinaki A Ghosh, ”Design
the issue of complexity and confidentiality ratio of a new Security Algorithm using hybrid cryptographic
which the existing algorithms provide, the work is architecture”, 3rd International conference on Electronics
also focused on the ease of communication using Computer Technology, April 2011.
[9] Chauhan, M. M. An implemented of hybrid cryptogra-
the proposed new algorithm. Keeping this goal in phy using elliptic curve cryptosystem (ECC) and MD5.
mind the proposed algorithm has been designed in a 2016 International Conference on Inventive Computation
quite simple manner but of-course not sacrificing the Technologies (ICICT).
[10] Alkady Y, Habib M. I., Rizk R. Y. A new security proto-
security issues. A single hybrid algorithm is used for col using hybrid cryptography algorithms. 2013 9th Inter-
both encryption and decryption i.e. it is fallen under national Computer Engineering Conference (ICENCO).

Authorized licensed use limited to: University College London. Downloaded on July 06,2020 at 17:04:11 UTC from IEEE Xplore. Restrictions apply.
[11] Introduction to Cryptography
https://www.topwcftutorials.net/2018/08/introduction-to-
cryptography.html

Authorized licensed use limited to: University College London. Downloaded on July 06,2020 at 17:04:11 UTC from IEEE Xplore. Restrictions apply.

You might also like