SlideShare a Scribd company logo
1 of 4
Download to read offline
Khushdeep Kaur, Er.Seema / International Journal of Engineering Research and
                 Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.914-917
      Hybrid Algorithm with DSA, RSA and MD5 Encryption
                 Algorithm for wireless devices.
                                    Khushdeep Kaur1, Er. Seema 2

                                  1.Research scholar, 2.Assistant professor
 Department of Computer Engineering, Yadavindra College of Engineering, Punjabi University Guru Kashi
                                      Campus, Talwandi Sabo

Abstract                                                 security and privacy of transmitted data. Therefore,
         Security is the one of the biggest              the methods of securing information are becoming
concern in different type of networks. Due to            a major issue, for which the encryption and
diversify nature of network, security breaching          decryption systems have been created.
became a common issue in different form of                Secure digital communications are necessary for
networks. Solutions for network security comes           web-based e-commerce, mandated privacy for
with concepts like cryptography in which                 medical information, etc.Many hardware and
distribution of keys have been done. If you want         software protocols have been implemented to
to send data to some other persons through               improve the security of information, but the only
network then if you truly want to keep the               true method of securing data is to encrypt it. . The
information secret, you need to agree on some            national and societal view of the role of encryption
sort of key that you and he can use to                   will be one of the defining issues for our culture in
encode/decode messages. But you don’t want to            the twenty-first century. Network security
keep using the same key, or you will make it             problems can be divided roughly into four
easier and easier for others to crack your               intertwined areas: Secrecy, Authentication,
cipher.                                                  Nonrepudiation and Integrity control. Secrecy has
        As Encryption became a vital tool for            to do with keeping information out of hands of
preventing the threats to data sharing and tool          unauthorized users. Authentication deals with
to preserve the data integrity so we are focusing        determining whom you are talking to before
on security enhancing by enhancing the level of          revealing sensitive information non repudiation
encryption in network. This study’s main goal is         deals with signature. Security in networking is
to reflect the importance of security in network         based on cryptography
and provide the better encryption technique for          Encryption is the vital part of information sharing
currently implemented encryption techniques.             so we have put our efforts into encryption area for
In our research we have proposed a                       RSA algorithm with DSA powered by MD5
combination of DSA, RSA and MD5as a hybrid               security so that we can make security harder by
link for wireless devices. We have also                  giving a hybrid algorithm.
considered case study for Manet networks so              2. Problem Formulation:
that we can suggest the applications of proposed                  As Encryption became a vital tool for
algorithm.                                               preventing the threats to data sharing and tool to
                                                         preserve the data integrity so we have focused on
Keywords: RSA, Digital Signatures, Message               security enhancement by enhancing the level of
Digest, Encryption.                                      encryption in network. For required research we
                                                         have worked on well-known encryption algorithms
1. INTRODUCTION                                          RSA and DSA with MD5. We have proposed the
The world is becoming more interconnected with           hybrid algorithm for RSA Algorithm with digital
the advent of the Internet and new networking            signatures powered by MD5 security with a small
technology. There is a large amount of personal,         case study of applications for this hybrid
commercial, military, and government information         algorithm.
on networking infrastructures worldwide. Network         3. Objectives of the Study
security is becoming of great importance because                 To study the issues of Security for
of intellectual property that can be easily acquired              Different networks. To Harden up the
through the internet.                                             Encryption Process for Network Security
The privacy requirements normally encountered in                 To study the already implemented
the traditional paper document world are                          algorithms for public key exchange in
increasingly expected in Internet transactions                    communication of data.
today. So with the rapid spread of digital
communication networks, there is great need for


                                                                                            914 | P a g e
Khushdeep Kaur, Er.Seema / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 2, Issue 5, September- October 2012, pp.914-917
        To provide a stable encryption, this can       encryption technique for currently implemented
         make good communication without                encryption techniques. It will explore how to tackle
         carrying about data integrity threat.          with the threats to data integrity and for safe
        To test the performance of mobile device       passage of data from one node to another. This
         networks for proposed experiment.              research will provides the great feasibility for
                                                        authentication process improvement for security in
4. Research Methodology                                 network.
          To achieve the set objectives, our research   6. SIMULATION AND RESULTS
focused on the performance measurement of               For evaluation the performance of Manet Network
network structure with implementation of Different      for our proposed work, in this section, we use a
security algorithm. We have considered RSA, DSA         simulation tool OPNET to conduct several
and MD5 algorithm for checking response time,           experiments
load, throughput and reliability of Ad-hoc              A. Simulation environment and parameters
networks with implementation of these algorithms.
We have considered OLSR protocol for general            In our simulations, we consider four different
connectivity in between the ad-hoc network. We          scenarios of sensing area: 100 m*1000m, each is
have considered different servers like Blade            with 10 randomly deployed mobile nodes. The BS
servers for providing different services to network.    is located on the corner of sensing field. Every
We start with different scenarios in OPNET              mobile node is initially equipped with 10m/s speed.
simulator for checking out the performance and          We define the database server and two blade
reliability of the network. Our research focused on     servers for testing our proposed research
these algorithms implementation in Six Phases           connected with 15 nodes LAN. We used a layer 2
                                                        router for load balancing between servers.
1st Phase: This phase contains the basic                Different tasks have been implemented by task
functionality and layout of network using servers       manager in OPNET according to the server
and ad-hoc devices.                                     management in Server manager. Applications used
2nd Phase: In this phase, we have implemented the       are FTP and HTTP for checking the behaviour of
different tasks to network by configuring the task      traffic filtered by encryption algorithms. Single
management through task manger in OPNET.                profile for whole simulation has been done with
After configuring tasks, we have configured the         random waypoint mobility algorithm for mobile
traffic type i.e. FTP and HTTP. After all               nodes.
configurations of applications, finally we have         B. Simulation results
configured the profile for different scenarios. We
have created topologies with help of Wlan Ethernet
Router, Wlan Workstation, Manet Station, Blade
servers and Database servers.
3rd Phase: In this phase, we have implemented the
different scenarios and different scenarios
including a scenario without any security
algorithm, a scenario with RSA algorithm, a
scenario with DSA algorithm and a scenario with
different algorithms (RSA, DSA, MD5).

4th Phase: We have implemented manet protocol
i.e. OLSR in network for general routing purposes.
5th Phase: We have done simulation of these
networks implemented with different type of
security algorithm for 10 minutes in OPNET.

6th Phase: Results from all Scenarios have
compared with proposed scenario (with all three
algorithm) to fetch parameters like End to End          Above Figure shows the simulation scenario for
Delay, Overall Throughput, Response time, Packet        testing different encryption schemes.
delivery. Ethernet delay, Traffic receive, Traffic
sent, Load etc.
                                                        Comparison of Our proposed hybrid algorithm
                                                        with Plane network, Network with RSA, Network
5. Scope and significance of study:                     with DSA.
There is an ample scope of research in the stated
area. Present study will reflect the importance of      1)Throughput
security in network and will provides the better

                                                                                          915 | P a g e
Khushdeep Kaur, Er.Seema / International Journal of Engineering Research and
                Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                  Vol. 2, Issue 5, September- October 2012, pp.914-917




2) Application Response Time




                                              4) Traffic Received (Packets/sec)




3) Delay




                                              5) Ethernet Delay




                                                                                  916 | P a g e
Khushdeep Kaur, Er.Seema / International Journal of Engineering Research and
                Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                  Vol. 2, Issue 5, September- October 2012, pp.914-917
                                                    algorithm with different scenarios and it is
                                                    providing better response time, less network delay
                                                    and best throughput. These parameters have been
                                                    shown in above table. We got better results than
                                                    other algorithms so proposed algorithm can be
                                                    implemented to mobile nodes for security
                                                    purposes. Also our research shows that it is
                                                    helping in efficient routing of packet with much
                                                    less load on servers.
                                                    .

                                                    References

                                                    [1] ] B. Schneier, “ Applied Cryptography, Second
                                                    Edition: Protocols, Algorithms, and Source Code in C ”,
                                                    John Wiley & Sons, Inc., 1996..

                                                    [2] FEDERAL INFORMATION PROCESSING
                                                    STANDARDS PUBLICATION, “ Digital Signature
                                                    Standard (DSS)”, june 2009, Information Technology
                                                    Laboratory National Institute of Standards and
                                                    Technology, Gaithersburg, MD 20899-8900.
                                                    [3] R.L. Rivest, A. Shamir, and L. Adleman, “A Method
                                                    for Obtaining Digital Signatures and Public-Key
                                                    Cryptosystems” in 1978.
Overall Comparison in form of table
                                                    [4] U. Somani, K. Lakhani, M. Mundra “Implementing
                                                    Digital Signature with RSA Encryption Algorithm to
                                                    Enhance the Data Security of Cloud in Cloud
                                                    Computing”. 1st International Conference on Parallel,
                                                    Distributed and Grid Computing (PDGC - 2010) 978-1-
                                                    4244-7674-9/10/©2010 IEEE
                                                    [5] R. Nagpal, “ An Introduction to Digital Signatures”,
                                                    Asian School of Cyber Laws in 2008.


                                                    [6] Announcing the Advanced Encryption Standard
                                                    (AES), Federal Information Processing Standards
                                                    Publication 197, 26 November 2001 .

                                                    [7] M.Ayoub Khan, Y.P.Singh, “On the Security of Joint
                                                    Signature and Hybrid Encryption”,Networks, 2005.
                                                    Jointly held with the 2005 IEEE 7th Malaysia
                                                    International Conference on Communication, vol.1, no.,
                                                    pp.1-4,
                                                     [8] R.L. Rivest, A. Shamir, and L. Adleman,” A Method
                                                    for Obtaining Digital Signatures and Public-Key
                                                    Cryptosystems” in 2006.
                                                    [9] P. Kitsos, N. Sklavos and O. Koufopavlou,” An
                                                    Efficient Implementation of the Digital Signature
                                                    Algorithm”, VLSI Design Laboratory, Electrical and
7. CONCLUSION                                       Computer Engineering Department, University of Patras.
In this paper, we discuss an efficient and secure   Patras, GREECE 2002.
hybrid algorithm for providing security to mobile
nodes. Since we have tested our proposed            [10] R. Rivest, “The MD5 Message-Digest Algorithm”,
                                                    RFC 1321, Network Working Group, April 1992.




                                                                                         917 | P a g e

More Related Content

What's hot

APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
ijiert bestjournal
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_final
Joseph Emmanuel
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
eSAT Journals
 

What's hot (19)

IRJET- Comparison Among RSA, AES and DES
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DES
 
319 325
319 325319 325
319 325
 
82 86
82 8682 86
82 86
 
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling conceptsHybrid cryptographic technique using rsa algorithm and scheduling concepts
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
 
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_final
 
Rsa Encryption in java
Rsa Encryption in java Rsa Encryption in java
Rsa Encryption in java
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
 
Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406Secured key distribution techniques in wireless sensor networks 150429171406
Secured key distribution techniques in wireless sensor networks 150429171406
 
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
 
Analysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security IssuesAnalysis of Different Steganography Algorithms and Security Issues
Analysis of Different Steganography Algorithms and Security Issues
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
 
Inscibe and Squeeze
Inscibe and SqueezeInscibe and Squeeze
Inscibe and Squeeze
 
Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122
 

Viewers also liked

comunicacion de la informacion
comunicacion de la informacioncomunicacion de la informacion
comunicacion de la informacion
guest5ba2c009
 
Heat transfer and Marangoni flow in a circular heat pipe using self rewetting...
Heat transfer and Marangoni flow in a circular heat pipe using self rewetting...Heat transfer and Marangoni flow in a circular heat pipe using self rewetting...
Heat transfer and Marangoni flow in a circular heat pipe using self rewetting...
Mohammadreza Bohloul
 

Viewers also liked (20)

Fe25959964
Fe25959964Fe25959964
Fe25959964
 
Gg2511351142
Gg2511351142Gg2511351142
Gg2511351142
 
Gk2511681173
Gk2511681173Gk2511681173
Gk2511681173
 
Fw2510721076
Fw2510721076Fw2510721076
Fw2510721076
 
He2513001307
He2513001307He2513001307
He2513001307
 
Hi2513201329
Hi2513201329Hi2513201329
Hi2513201329
 
Hb2512851289
Hb2512851289Hb2512851289
Hb2512851289
 
Hl2513421351
Hl2513421351Hl2513421351
Hl2513421351
 
Gz2512721277
Gz2512721277Gz2512721277
Gz2512721277
 
Ho2513601370
Ho2513601370Ho2513601370
Ho2513601370
 
Fl2510031009
Fl2510031009Fl2510031009
Fl2510031009
 
Ge2511241129
Ge2511241129Ge2511241129
Ge2511241129
 
Ft2510561062
Ft2510561062Ft2510561062
Ft2510561062
 
Fo2510211029
Fo2510211029Fo2510211029
Fo2510211029
 
Ga2510971106
Ga2510971106Ga2510971106
Ga2510971106
 
Km2417821785
Km2417821785Km2417821785
Km2417821785
 
comunicacion de la informacion
comunicacion de la informacioncomunicacion de la informacion
comunicacion de la informacion
 
Heat transfer and Marangoni flow in a circular heat pipe using self rewetting...
Heat transfer and Marangoni flow in a circular heat pipe using self rewetting...Heat transfer and Marangoni flow in a circular heat pipe using self rewetting...
Heat transfer and Marangoni flow in a circular heat pipe using self rewetting...
 
Espanya
EspanyaEspanya
Espanya
 
Amica
AmicaAmica
Amica
 

Similar to Ew25914917

COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORKCOMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
ijesajournal
 

Similar to Ew25914917 (20)

A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
 
Secure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA AlgorithmSecure Cloud Environment Using RSA Algorithm
Secure Cloud Environment Using RSA Algorithm
 
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
COMPARATIVE ANALYSIS OF DIFFERENT ENCRYPTION TECHNIQUES IN MOBILE AD HOC NETW...
 
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
Applications of RSA and AES256 in End-to-End encryption using Diffie- Hellman...
 
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesResearch trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniques
 
An Efficient Approach for Data Security in Cloud Environment using Watermarki...
An Efficient Approach for Data Security in Cloud Environment using Watermarki...An Efficient Approach for Data Security in Cloud Environment using Watermarki...
An Efficient Approach for Data Security in Cloud Environment using Watermarki...
 
State of the art parallel approaches for
State of the art parallel approaches forState of the art parallel approaches for
State of the art parallel approaches for
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORKCOMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
 
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORKCOMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
COMPARISON AND EVALUATION OF DIGITAL SIGNATURE SCHEMES EMPLOYED IN NDN NETWORK
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
Cloud Encryption
Cloud EncryptionCloud Encryption
Cloud Encryption
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 

Ew25914917

  • 1. Khushdeep Kaur, Er.Seema / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.914-917 Hybrid Algorithm with DSA, RSA and MD5 Encryption Algorithm for wireless devices. Khushdeep Kaur1, Er. Seema 2 1.Research scholar, 2.Assistant professor Department of Computer Engineering, Yadavindra College of Engineering, Punjabi University Guru Kashi Campus, Talwandi Sabo Abstract security and privacy of transmitted data. Therefore, Security is the one of the biggest the methods of securing information are becoming concern in different type of networks. Due to a major issue, for which the encryption and diversify nature of network, security breaching decryption systems have been created. became a common issue in different form of Secure digital communications are necessary for networks. Solutions for network security comes web-based e-commerce, mandated privacy for with concepts like cryptography in which medical information, etc.Many hardware and distribution of keys have been done. If you want software protocols have been implemented to to send data to some other persons through improve the security of information, but the only network then if you truly want to keep the true method of securing data is to encrypt it. . The information secret, you need to agree on some national and societal view of the role of encryption sort of key that you and he can use to will be one of the defining issues for our culture in encode/decode messages. But you don’t want to the twenty-first century. Network security keep using the same key, or you will make it problems can be divided roughly into four easier and easier for others to crack your intertwined areas: Secrecy, Authentication, cipher. Nonrepudiation and Integrity control. Secrecy has As Encryption became a vital tool for to do with keeping information out of hands of preventing the threats to data sharing and tool unauthorized users. Authentication deals with to preserve the data integrity so we are focusing determining whom you are talking to before on security enhancing by enhancing the level of revealing sensitive information non repudiation encryption in network. This study’s main goal is deals with signature. Security in networking is to reflect the importance of security in network based on cryptography and provide the better encryption technique for Encryption is the vital part of information sharing currently implemented encryption techniques. so we have put our efforts into encryption area for In our research we have proposed a RSA algorithm with DSA powered by MD5 combination of DSA, RSA and MD5as a hybrid security so that we can make security harder by link for wireless devices. We have also giving a hybrid algorithm. considered case study for Manet networks so 2. Problem Formulation: that we can suggest the applications of proposed As Encryption became a vital tool for algorithm. preventing the threats to data sharing and tool to preserve the data integrity so we have focused on Keywords: RSA, Digital Signatures, Message security enhancement by enhancing the level of Digest, Encryption. encryption in network. For required research we have worked on well-known encryption algorithms 1. INTRODUCTION RSA and DSA with MD5. We have proposed the The world is becoming more interconnected with hybrid algorithm for RSA Algorithm with digital the advent of the Internet and new networking signatures powered by MD5 security with a small technology. There is a large amount of personal, case study of applications for this hybrid commercial, military, and government information algorithm. on networking infrastructures worldwide. Network 3. Objectives of the Study security is becoming of great importance because  To study the issues of Security for of intellectual property that can be easily acquired Different networks. To Harden up the through the internet. Encryption Process for Network Security The privacy requirements normally encountered in  To study the already implemented the traditional paper document world are algorithms for public key exchange in increasingly expected in Internet transactions communication of data. today. So with the rapid spread of digital communication networks, there is great need for 914 | P a g e
  • 2. Khushdeep Kaur, Er.Seema / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.914-917  To provide a stable encryption, this can encryption technique for currently implemented make good communication without encryption techniques. It will explore how to tackle carrying about data integrity threat. with the threats to data integrity and for safe  To test the performance of mobile device passage of data from one node to another. This networks for proposed experiment. research will provides the great feasibility for authentication process improvement for security in 4. Research Methodology network. To achieve the set objectives, our research 6. SIMULATION AND RESULTS focused on the performance measurement of For evaluation the performance of Manet Network network structure with implementation of Different for our proposed work, in this section, we use a security algorithm. We have considered RSA, DSA simulation tool OPNET to conduct several and MD5 algorithm for checking response time, experiments load, throughput and reliability of Ad-hoc A. Simulation environment and parameters networks with implementation of these algorithms. We have considered OLSR protocol for general In our simulations, we consider four different connectivity in between the ad-hoc network. We scenarios of sensing area: 100 m*1000m, each is have considered different servers like Blade with 10 randomly deployed mobile nodes. The BS servers for providing different services to network. is located on the corner of sensing field. Every We start with different scenarios in OPNET mobile node is initially equipped with 10m/s speed. simulator for checking out the performance and We define the database server and two blade reliability of the network. Our research focused on servers for testing our proposed research these algorithms implementation in Six Phases connected with 15 nodes LAN. We used a layer 2 router for load balancing between servers. 1st Phase: This phase contains the basic Different tasks have been implemented by task functionality and layout of network using servers manager in OPNET according to the server and ad-hoc devices. management in Server manager. Applications used 2nd Phase: In this phase, we have implemented the are FTP and HTTP for checking the behaviour of different tasks to network by configuring the task traffic filtered by encryption algorithms. Single management through task manger in OPNET. profile for whole simulation has been done with After configuring tasks, we have configured the random waypoint mobility algorithm for mobile traffic type i.e. FTP and HTTP. After all nodes. configurations of applications, finally we have B. Simulation results configured the profile for different scenarios. We have created topologies with help of Wlan Ethernet Router, Wlan Workstation, Manet Station, Blade servers and Database servers. 3rd Phase: In this phase, we have implemented the different scenarios and different scenarios including a scenario without any security algorithm, a scenario with RSA algorithm, a scenario with DSA algorithm and a scenario with different algorithms (RSA, DSA, MD5). 4th Phase: We have implemented manet protocol i.e. OLSR in network for general routing purposes. 5th Phase: We have done simulation of these networks implemented with different type of security algorithm for 10 minutes in OPNET. 6th Phase: Results from all Scenarios have compared with proposed scenario (with all three algorithm) to fetch parameters like End to End Above Figure shows the simulation scenario for Delay, Overall Throughput, Response time, Packet testing different encryption schemes. delivery. Ethernet delay, Traffic receive, Traffic sent, Load etc. Comparison of Our proposed hybrid algorithm with Plane network, Network with RSA, Network 5. Scope and significance of study: with DSA. There is an ample scope of research in the stated area. Present study will reflect the importance of 1)Throughput security in network and will provides the better 915 | P a g e
  • 3. Khushdeep Kaur, Er.Seema / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.914-917 2) Application Response Time 4) Traffic Received (Packets/sec) 3) Delay 5) Ethernet Delay 916 | P a g e
  • 4. Khushdeep Kaur, Er.Seema / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.914-917 algorithm with different scenarios and it is providing better response time, less network delay and best throughput. These parameters have been shown in above table. We got better results than other algorithms so proposed algorithm can be implemented to mobile nodes for security purposes. Also our research shows that it is helping in efficient routing of packet with much less load on servers. . References [1] ] B. Schneier, “ Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C ”, John Wiley & Sons, Inc., 1996.. [2] FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION, “ Digital Signature Standard (DSS)”, june 2009, Information Technology Laboratory National Institute of Standards and Technology, Gaithersburg, MD 20899-8900. [3] R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems” in 1978. Overall Comparison in form of table [4] U. Somani, K. Lakhani, M. Mundra “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”. 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010) 978-1- 4244-7674-9/10/©2010 IEEE [5] R. Nagpal, “ An Introduction to Digital Signatures”, Asian School of Cyber Laws in 2008. [6] Announcing the Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, 26 November 2001 . [7] M.Ayoub Khan, Y.P.Singh, “On the Security of Joint Signature and Hybrid Encryption”,Networks, 2005. Jointly held with the 2005 IEEE 7th Malaysia International Conference on Communication, vol.1, no., pp.1-4, [8] R.L. Rivest, A. Shamir, and L. Adleman,” A Method for Obtaining Digital Signatures and Public-Key Cryptosystems” in 2006. [9] P. Kitsos, N. Sklavos and O. Koufopavlou,” An Efficient Implementation of the Digital Signature Algorithm”, VLSI Design Laboratory, Electrical and 7. CONCLUSION Computer Engineering Department, University of Patras. In this paper, we discuss an efficient and secure Patras, GREECE 2002. hybrid algorithm for providing security to mobile nodes. Since we have tested our proposed [10] R. Rivest, “The MD5 Message-Digest Algorithm”, RFC 1321, Network Working Group, April 1992. 917 | P a g e