Optimization of Hybrid Encryption Algorithm for Secure Communication System

被引:0
作者
Ghosh, Papri [1 ]
Thakor, Vishal [1 ]
机构
[1] Auro Univ, Surat 394510, Gujarat, India
来源
THIRD INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY | 2019年 / 797卷
关键词
Cryptography; Encryption; Decryption; Cryptanalysis; Symmetric key; Asymmetric key; Hybrid; Transposition;
D O I
10.1007/978-981-13-1165-9_89
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cryptography is the art or technique of encoding a message by a sender in such a manner that only the intended receiver can decode it. It is a technique by which we can secure our data from attackers. With the advent use of the Internet, the situation is very different now. The Internet is used by a large number of users, and virtually all attacks originate from within the network. Strong encryption algorithms and optimized key management techniques help in securing the data and achieving confidentiality, authentication, and integrity of data. The algorithm encrypts the message character by character using stream cipher, and the number of keys depends on the size of the message. This paper proposes a hybrid cryptographic algorithm which uses both substitution and transposition techniques to address the security of data or plaintext. Decryption will be done at receiver's side in the reverse way of encryption. Using this technique, we can protect the data and avoid unauthorized access to an unsecure communication channel. The number of keys is not predefined and it depends on the size of the plaintext making the encryption technique more secure.
引用
收藏
页码:973 / 981
页数:9
相关论文
共 14 条
[1]  
[Anonymous], 2013, INT J ADV TECHNOL EN
[2]  
[Anonymous], NETWORK SECURITY ESS
[3]  
Babu R., 2012, INT J ADV SCI TECHNO, V4
[4]   An Efficient Approach to Enhance Data Security in Cloud Using Recursive Blowfish Algorithm [J].
Balkish, Naziya ;
Prasad, A. M. ;
Suma, V. .
ICT AND CRITICAL INFRASTRUCTURE: PROCEEDINGS OF THE 48TH ANNUAL CONVENTION OF COMPUTER SOCIETY OF INDIA - VOL I, 2014, 248 :575-582
[5]  
Disina AH, 2014, ROBUST CAESAR CIPHER
[6]  
Gupta Dharmendra K, 2012, J GLOBAL RES COMPUTE, VV3, P60
[7]  
Jain Aishwarya, 2015, IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015). Proceedings, DOI 10.1109/ISBA.2015.7126353
[8]  
KAHATE A., 2013, Cryptography and network security
[9]  
Kuppuswamy P, INT J COMPUTER INFOR, V6
[10]  
Omolara OE., 2014, COMPUTER ENG INTELLI, V5, P34