Double Encryption Using AES and RSA Algorithm
Double Encryption Using AES and RSA Algorithm
St.Joseph’s Institute of Technology, St. Joseph’s College of Engineering, St.Joseph’s Institute of Technology,
Chennai, Tamil Nadu, Chennai, Tamil Nadu, Chennai, Tamil Nadu,
India 600119, India 600 119, India 600 119,
[email protected] [email protected] [email protected]
Thanmai.G
UG Scholar,
St.Joseph’s Institute of Technology,
Chennai, Tamil Nadu,
India 600 119,
[email protected]
Abstract—With recent advances in Cloud computing, fragmentation, encryption and dispersion. Fragmentation
information is being contracted by cloud services. Dropbox methods used a public cloud of the less confidential data
and Google Drive provide cloud services to users with low-cost fragments [1]. We prefer to present a novel data protection
storage. Here we present a protection method by encrypting scheme by using a double encryption technique using AES
and decrypting the files which offer an enhanced level of and RSA algorithm for encryption and decryption.
protection. To encrypt the file that we upload in cloud, we
make use of Double encryption technique. The file is being II. RELATED WORKS
encrypted twice using the two algorithms one after the other.
The file is first encrypted using AES algorithm and then by Yibin Li et.al, [1] focused on the data over collection
RSA algorithm. The corresponding keys are being generated problem.They tried to put all customer details into a cloud
during the execution of the algorithm. This technique the security of customer details could be increased They
increases the security level. The various parameters that we have explored various experiments and the output shows the
have considered here are security level, speed, data effectiveness of their approach. Their most direct
confidentiality, data integrity and cipher text size. Our method improvement was reducing the storage in customer
is more efficient as it satisfies all the parameters where the smartphone Pictures, videos and other storage information or
conventional methods failed to do so. The cloud we used to data occupy more storage space so these are vacated which
store the content of the file is DropBox, which is in the enable users to install new applications. They showcased an
encrypted format using AES and RSA algorithms. active approach. Whenever an application requires customer
data it needs to access request in cloud.
Keywords—Double Encryption, Security in Cloud storage,
Security analysis, AES, RSA. Liwei Kuang et.al [2], implemented a method that could
process large scale heterogeneous data that safely
I. INTRODUCTION decompose a tensor [15][37]. Tensor is used in applications
In this fast-moving world data security plays a vital role. that are rich in data or information [15]. Required number of
Cloud is becoming very much popular with the person users orthogonal bases is multiplied along with the core tensor.
for the purpose of data storage. Cloud platform has been Fully homomorphic encryption is used to encrypt the data,
used by the individual's as it offers a lot of free services. after which decomposition is performed by an algorithm. It
Cloud-based services like DropBox provide personal users could secure data processing on the cloud. A security
with cost effective storage, but this can affect fidelity of the scheme for cluster management detailed by Jun Wu et.al
service provided. As they give a lot of services at low-cost provides high security [3].
this situation raises the problem of trustworthiness of Cloud Krikor et.al, in [4] presented a selective encryption
service providers. The necessity to secure data has also been method by using high frequency DCT coefficients that
increased drastically. There are many attacks known in the contain more visual information. Security is added to the
cloud. Some privacy and security breaches are also observed encrypted block by making use of shuffling method. The use
in today’s cloud services [1] [2] [3]. The service providers of DCT transform helps in data reduction. It is well known
also face many external attacks. In 2018, cosmetic data was that multimedia data are compressed using DCT. At the
looted from a wellness system in Singapore. In such cases, receiver end, Han Qui et.al [5] estimated the DC
people lose their confidence in providers. Personal data coefficients, which help to reduce the transmission error.
could be used as in the case of Cambridge Analytica data
scandal [1]. Therefore, it becomes necessary that end users Andreas Pommer et.al in [6] designed a scheme to
protect their data from providers by keeping the data onto protect content and provide security for a specific
the personal computer. The other solution will be to use the multimedia application. This scheme which made use of
encryption algorithms. Our base paper suggested the idea of classical ciphers on the multimedia proved to be inefficient
selective encryption along with novel data protection such as as it required high computation. Med Karim Abdmouleh
et.al [7] encrypted the LL band after performing DWT on
Authorized licensed use limited to: Western Sydney University. Downloaded on June 15,2021 at 08:26:07 UTC from IEEE Xplore. Restrictions apply.
the image. This method proved to be fast, robust, and encrypted data. They also tried to improve the time for multi
efficient. Keke Gai et.al, in [8] proposed CRN it is widely keyword search over the RSA.
used in wireless networking. CRN make use of WSGNs.
Their proposed approach was examined and the outputs A more secure algorithm implemented in VHDL used a
were positive. A method of data storage from end-users to digital signature [19]. The usage of both cryptography and
clouds was presented by Han Qiu et.al [9]. Zafar Shahid et.al steganography at the same time improved security to a large
[10] presented a selective encryption idea that satisfies all extent [20]. Naga Hemanth et.al in [21] proposed an RSA
real time constraints. In spite of Data integrity being an algorithm for the purpose of security of the information and
essential factor, it was not considered in earlier SE methods the key which is used for encrypting the information or data.
[11]. Image quality and Integrity are not assured in fractional This methodology is implemented in three steps. In the first
wavelet based SE methods [12]. step text is been encrypted using playfair cipher which make
use of 9x6 matrices. The second step deals with XOR
In another method, data packets are checked if required operation carried out between key and encrypted text. At the
to be split during operation period. It provides security and last step of encryption the key was made using the RSA
can guard threats from clouds [12]. Han Qiu et al [13] did algorithm and further XOR operation was continued. Finally
DCT on bitmap images and tried to reduce rounding errors the encrypted information along with key is received and
and recovery from non-selected DCT coefficients. Another decrypted to read the message. This algorithm provided by
encryption algorithm uses a secret key, a map to change them provides extra security among the existing algorithms.
positions of image pixels and a second map to modify A hybrid encryption algorithm that could protect data in
intensity of image pixels. This method could enhance Cloud used three encryption keys [22]. An Enhanced RSA
security to a large level [14]. algorithm made it difficult for data stealing and consumed
less time [23].
Han Qiu Et.al in [14] proposed an image protection with
shorter calculation resources but with larger image input. III. SYSTEM DESIGN
The traditional encryption method is very slow. As it is not
fast it consumes a lot of CPU calculation resource. For this We propose a method that provides high security. The
issue they came up with a combined selective encryption user uploads a file into the cloud which has public and
along with the current GPGPU acceleration. Yulen Sadourny private fragments. The private fragment is supposed to
et al [15] proposed selective encryption and impact of securely protect. As said before we have proposed to use the
signaling information. When the signaling was taken into Double Encryption Technique. For Double Encryption the
account there was lot of problems, So they tried to resolve algorithms that we have used are AES and RSA. Here we
by applying the selective encryption scheme. This was first encrypt the private fragment containing the important
implemented because the image code stream provided extra information with AES128. After the first encryption is over
information to the transcoding application the corresponding key is generated. This encrypted file is
again subjected to encryption with another algorithm.
W.Puech et al [16] incorporated AES cipher to encrypt
JPEG images. A major advantage of this method is the Figure 1 shows the process of how a file is being
reduction of calculation resources for big sized data. Ayoub uploaded. Initially the user first registers and then logs into
Massoudi et al [17] proposed a cost effective encryption the profile. The user then selects the file which he wanted to
method for JPEG2000 . Harshitha.Y et.al in [18] proposed a upload into the cloud to keep it safe. After choosing the file
study which is based on keyword and multi-keyword. this some internal process is undergone by the file before it gets
compares the term efficiency. Here the performance is uploaded. First the file is being encrypted using the AES
calculated based on the speed of search done over the algorithm and then by RSA algorithm. Double Encryption is
done for security purposes.
792
Authorized licensed use limited to: Western Sydney University. Downloaded on June 15,2021 at 08:26:07 UTC from IEEE Xplore. Restrictions apply.
Figure 2 shows the system architecture for file download The various keys used by this algorithm are 128,192,256
purpose. The user again logs into account. The user views bits.It is considered as the most secured algorithm.
the cloud to check out the files that are being uploaded by
others. The user requests the file that he wishes for. This file
request is sent to the owner of the file. If the owner of the
file wishes to grant access he accepts the request otherwise
he deletes it. If the request is accepted, send the key to the
user through Email to open the file. The requested user shall
make the user of the key to download the file to view or read
it. The downloaded file gets stored in the requested user’s
system
793
Authorized licensed use limited to: Western Sydney University. Downloaded on June 15,2021 at 08:26:07 UTC from IEEE Xplore. Restrictions apply.
as Security level, Speed, Data confidentiality, Data integrity
and Ciphertext size. These are all considered as important
parameters to compare various algorithms. This analysis was
done by reading various reference papers. This performance
efficiency helped us to get to know that the combination of
AES and RSA provides more security for file protection
than the convolution methods.
The following performance was observed by considering
the various parameters such as security, speed, Data
confidentiality, Data Integrity etc. The various results are
discussed below.
TABLE I. COMPARISION OF PROPOSED WORK WITH EXISTING Fig. 5. File Size Vs time (Downloading)
METHODS
AES+ Figure 4 is the graph which shows the time taken to
BLOWFIS 3-DE upload the file .The graph shows the time taken by various
Paramete RC5 RSA
DES[4] H S
rs
[23]
[18]
[28]
(PROP files of sizes in MB to upload. The time is calculated by
OSED) first taking the start time from the system before uploading.
Better The time taken for uploading the file followed by
Not Partially Very
Security Secure than
secure secure
DES
secure encryption and decryption is the end time. The difference
Very Very between both the times is considered as the upload time.
Speed Fast Slow Slow Figure 5 is the graph which shows the time taken to
slow Fast
Data download the file.
Confid No Yes No No Yes
entiality
Data
No Yes No No Yes
Integrity
Larger Larger Large
Same as
Cipher than Same as than r than
plain
Text plain plain text plain plain
text
text text text
Execution time for Execution time for Fig. 6. RSA public key generation graph
File Size
Encryption Decryption
1 0.75sec 1sec
15 1.25sec 1.5sec
25 1.5sec 2sec
794
Authorized licensed use limited to: Western Sydney University. Downloaded on June 15,2021 at 08:26:07 UTC from IEEE Xplore. Restrictions apply.
lengths take the least time and 2048 key length takes the
largest.
795
Authorized licensed use limited to: Western Sydney University. Downloaded on June 15,2021 at 08:26:07 UTC from IEEE Xplore. Restrictions apply.
[4] Krikor, Lala, et al. "Image encryption using DCT and stream cipher." [15] Sadourny, Yulen, and Vania Conan. "A proposal for supporting
European Journal of Scientific Research 32.1 (2009): 47-57. selective encryption in JPSEC." IEEE Transactions on Consumer
[5] H.Qiu,G.Memmi,X.Chen,andJ.Xiong,“DCcoefficientrecovery for Electronics 49.4 (2003): 846-849.
JPEG images in ubiquitous communication systems,” Future [16] Puech, William, and José M. Rodrigues. "Crypto-compression of
Generation Computer Systems,2019. medical images by selective encryption of DCT." 2005 13th
[6] Pommer, Andreas, and Andreas Uhl. "Selective encryption of European signal processing conference. IEEE, 2005.
wavelet-packet encoded image data: efficiency and security." [17] Massoudi, Ayoub, et al. "Secure and low cost selective encryption for
Multimedia Systems 9.3 (2003): 279-287. JPEG2000." 2008 Tenth IEEE International Symposium on
[7] Abdmouleh, Med Karim, Ali Khalfallah, and Med Salim Bouhlel. "A Multimedia. IEEE, 2008.
novel selective encryption DWT-based algorithm for medical [18] Harshitha, Y., S. Seema, and P. Apoorva. "Comparative study on
images." 2017 14th International Conference on Computer Graphics, RSA algorithm of multi-keyword search scheme over encrypted
Imaging and Visualization. IEEE, 2017. cloud data." 2017 International Conference on Intelligent Computing
[8] Gai, Keke, et al. "Spoofing-jamming attack strategy using optimal and Control (I2C2). IEEE, 2017.
power distributions in wireless smart grid networks." IEEE [19] Viney Pal Bansal and Sandeep Singh “A Hybrid Data Encryption
Transactions on Smart Grid 8.5 (2017): 2431-2439. Technique using RSA and Blowfish for Cloud Computing on
[9] Qiu, Han, and Gerard Memmi. "Fast selective encryption methods FPGAs”, in Proceedings of 2015 RAECS UIET Panjab University
for bitmap images." International Journal of Multimedia Data Chandigarh ,2015
Engineering and Management (IJMDEM) 6.3 (2015): 51-69. [20] Shubhi Mittal, Shivika Arora and Rachna Jain “PData Security using
[10] Shahid, Zafar, and William Puech. "Visual protection of HEVC RSA Encryption Combined with Image Steganography” ,2016.
video by selective encryption of CABAC binstrings." ieee [21] Naga Hemanth P, Abhinay Raj N, Nishi Yadav “Secure Message
transactions on multimedia 16.1 (2013): 24-36. Transfer using RSA algorithm and Improved Playfair cipher in Cloud
[11] Xiang, Tao, Chenyun Yu, and Fei Chen. "Secure MQ coder: An Computing” in 2nd International Conference for Convergence in
efficient way to protect JPEG 2000 images in wireless multimedia Technology,2017.
sensor networks." Signal Processing: Image Communication 29.9 [22] Mahalle, Vishwanath S., and Aniket K. Shahade. "Enhancing the
(2014): 1015-1027. data security in Cloud by implementing hybrid (Rsa & Aes)
[12] Li, Yibin, et al. "Intelligent cryptography approach for secure encryption algorithm." 2014 International Conference on Power,
distributed big data storage in cloud computing." Information Automation and Communication (INPAC). IEEE, 2014.
Sciences 387 (2017): 103-115. [23] Dr.D.I.GeorgeAmalarethinam,H.Leena “Enhanced RSA Algorithm
[13] Qiu, Han, Nathalie Enfrin, and Gerard Memmi. "A case study for with varying Key Sizes for Data Security in Cloud” in World
practical issues of DCT based bitmap selective encryption methods." Congress on Computing and Communication Technologies,2017.
2018 Third International Conference on Security of Smart Cities, [24] https://www.geeksforgeeks.org/rsa-algorithm-cryptography
Industrial Control System and Communications (SSIC). IEEE, 2018. [25] https://www.google.com/search?source=univ&tbm=isch&q=Liverpo
[14] Qiu, Han, and Gerard Memmi. "Fast selective encryption method for ol+Community+College+%2B+Encryption+and+Decryption%
bitmaps based on GPU acceleration." 2014 IEEE International
Symposium on Multimedia. IEEE, 2014.
796
Authorized licensed use limited to: Western Sydney University. Downloaded on June 15,2021 at 08:26:07 UTC from IEEE Xplore. Restrictions apply.