SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 3 Issue 6, October 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD29243 | Volume – 3 | Issue – 6 | September - October 2019 Page 834
Encryption Data Measurement and
Data Security of Hybrid AES and RSA Algorithm
Khet Khet Khaing Oo1, Yan Naung Soe2
1Faculty of Computer System and Technology,
2Faculty of Information Technology Support and Maintenance,
1,2University of Computer Studies, Myitkyina, Myanmar
ABSTRACT
Transferring the secure data becomes vital for the important data of every
day's life. The system is a secure data transferring, combining the two
techniques, Advance Encryption Standard (AES) and RSA. The data file is
encrypted by using AES with the randomly generated key. This key is also
encrypted by RSA using the receiver's public key. The encrypted data file and
encrypted key file are combined to form an output file to send to the receiver.
The file at the receiver's side is separated into two files,theencrypteddata file
and encrypted key file. The encrypted key file is decrypted by RSA method
using the receiver's private key. The AES key is acquired, the encrypted data
file is then decrypted by AES method using the acquired AES key. The system
includes file transferring process based on the Java socket technology.
Key Words: AES (Advanced Encryption Standard) and RSA (Rivest, Shamir and
Adleman) algorithms
How to cite this paper: Khet Khet Khaing
Oo | Yan Naung Soe "Encryption Data
Measurement and Data SecurityofHybrid
AES and RSA Algorithm" Published in
International Journal
of Trend in Scientific
Research and
Development(ijtsrd),
ISSN: 2456-6470,
Volume-3 | Issue-6,
October 2019,
pp.834-838, URL:
https://www.ijtsrd.com/papers/ijtsrd29
243.pdf
Copyright © 2019 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
1. INTRODUCTION:
To introduce cryptography, an understanding of issues
related to information security in general is necessary.
Information security manifestsitselfinmanywaysaccording
to the situation and requirement. Regardless of who is
involved, to one degree or another, all parties to a
transaction must have confidence that certain objectives
associated with information security have been met.
Conceptually, the way information is recorded has not
changed dramatically over time. Whereas information was
typically stored and transmitted on paper, much of it now
resides on magnetic media and is transmitted via
telecommunications systems, some wireless. What has
changed dramatically is the ability to copy and alter
information. Someone can produce thousands of identical
copies of a piece of information stored electronically and
each is indistinguishable from the original.Withinformation
on paper, this is much more difficult.Whatisneededthen for
a society where information is mostly stored and
transmitted in electronic form is a means to ensure
information security which is independent of the physical
medium recording or conveying it. The objectives of
information security rely solely on digital information itself
[3].
To gain more secure data transferring, the developments of
the encryption methods have been established. Since there
are two types of encryption method, one uses the public key
encryption and the other use the privatekey encryption.The
public key encryption methods use a pair of two key. One of
them is used at the encryption step. This is known as the
public key. This key is public for everybody who would like
to send data. The other one is used at the decryption step.
This is known as the private key. The pair of two keys
method is known as asymmetric type of encryption. One of
the most popular encryption methods of this type is RSA.
The other type of encryption method uses the same key for
the encryption steps and decryption steps. This method is
type of symmetric type of encryption. One of the most
popular encryption methods of this type is Advanced
Encryption Standard (AES).
The system is a type of a crypto system. It is a file encryption
system. The system will accept a file from the user and
performs the necessary encryptions. In this step of
encryption, there will be actually two encryption methods
but in a combined manner for the system's security affairs.
To get the better security for system, the system is
considered to use both encryptions as a hybrid system.
The system is composed of two main portions. They are the
crypto techniques and the communication technique. The
system can also send and receive the data files. The system
uses the socket technology supported by JAVA.
IJTSRD29243
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD29243 | Volume – 3 | Issue – 6 | September - October 2019 Page 835
2. RELATED WORKS
T. Mrokel expressed that encryption can be traced back for
thousands of years. Since people first started to use
encryption methods, the techniques that we know and use
today have come a long way. The purpose of this paper is to
construct a timeline of important encryption events that
have occurred throughout the ages, and to discuss current
and future encryption methods. Each event in the timeline is
further researched and presented in more detail. Added
attention is given to quantum encryption, the latest addition
to encryption techniques. In this paper, different encryption
techniques are evaluated, especially from a business
perspective, and compared according to a set of criteria [5].
Syed S. Rizvi presents the implementation of a secure
application for an academic institution that offers numerous
services to both students and the faculty. The primary focus
of this paper is to provide a technical implementation of a
new architecture for encrypting the database. The scope of
this paper mainly includes but is not limited to symmetric
and public-key cryptography, authentication, key
management, and digital signatures. The final results of this
paper demonstrate that what security features one should
implement in order to achieve a highly secured application.
This paper presents the implementation of a stand alone
system that can be implemented on any legacy systems, and
still operates effectively. In other words, it isselfsufficientin
terms of the data that it stores [4].
3. BACKGROUND THEORY
3.1. Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) is an encryption
standard adopted by the U.S. government. The standard
comprises three block ciphers, AES-128, AES-192 and AES-
256, enhanced from AES originally published as Rijndael.
Each AES cipher has a 128-bit block size, with key sizes of
128, 192 and 256 bits, respectively.
The Rijndael cipher was developed by two Belgian
cryptographers, Joan Daemen and Vincent Rijmen, and
submitted by them to the AES selection process. Rijndael
(pronounced [rεinda:l]) is a portmanteauofthenamesof the
two inventors.
AES is based on a design principle known as a Substitution
permutation network. It is fast in for implementation with
software and hardware. Unlike its predecessor, DES, AES
does not use a Feistel network. AES has a fixed block size of
128 bits and a key size of 128, 192, or 256 bits, whereas
Rijndael can be specified with block and key sizes in any
multiple of 32 bits, with a minimum of 128 bits and a
maximum of 256 bits. AES operates on a 4×4 array of bytes,
termed the state (versions of Rijndael with a larger block
size have additional columns in the state). Most AES
calculations are done in a special finite field. The AES cipher
is specified as a number of repetitions of transformation
rounds that convert the input plaintext into the final output
of ciphertext. Each round consists of several processing
steps, including one that depends on the encryption key. A
set of reverse rounds are applied to transform ciphertext
back into the original plaintext using the same encryption
key [2][1].
3.2. RSA Encryption Method
In cryptography, RSA (which stands for Rivest, Shamir and
Adleman who first publicly described it) is an algorithm for
public-key cryptography. Itisthefirstalgorithmknowntobe
suitable for signing as well as encryption, and was one of the
first great advances in public key cryptography. RSA is
widely used in electronic commerce protocols, and is
believed to be secure given sufficiently longkeysandtheuse
of up-to-date implementations.
The system includesa communicationschannel coupledtoat
least one terminal having an encoding device and to at least
one terminal having a decoding device. A message-to-be-
transferred is enciphered to ciphertext at the encoding
terminal by encoding the message as a number M in a
predetermined set. That number is then raised to a first
predetermined power (associated with the intended
receiver) and finally computed.
The remainder or residue, C, is... computed when the
exponentiated number is divided by the product of two
predetermined prime numbers (associated with the
intended receiver) [2].
The RSA algorithm involves three steps: key generation,
encryption and decryption.
Key generation: RSA involves a public key and a private key.
The public key can be known to everyone and is used for
encrypting messages. Messages encrypted with the public
key can only be decrypted using the private key.
Encryption: The sender of the messageusesthepublickeyof
the receiver and encrypts the message by mathematical
calculations defined for RSA encryption.
Decryption: After the receiver received the encrypted
message (cipher-message), the receiver decrypt the
encrypted message using the private key of the receiver by
mathematical calculations defined for RSA decryption [6].
4. OVERVIEW OF THE SYSTEM
The system is an implementation for securedata transferfor
local area network as a portable program structure. The
symmetric key encryption uses the same key for encryption
and decryption. For the asymmetric key encryption, a key is
applied for encryption and the other key is applied for
decryption.
The system comes in contact with the two encryption
method. The data file beingtransferredisbeingencryptedby
the symmetric key encryption. The key for the former
encryption is also encrypted by the asymmetric key
encryption method. The former encryption applied for the
system is Advanced Encryption Standard (AES). And the
later encryption is the RSA encryption system. The two
encrypted files are combined to form a file. The result file is
sent from the send to the receiver. At the receiver side,there
will be an accepted file. This file has to be separated by the
system running at the receiver's side. Then the two files will
be gained. One file is the encrypted AESkeyfileandtheother
file is a encrypted data file.
The encrypted AES key is first decrypted by means of the
RSA decryption using the receiver's private key. Theapplied
AES key is gained. The system will use thiskeytodecrypt the
encrypted data file by means of AES decryption method.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD29243 | Volume – 3 | Issue – 6 | September - October 2019 Page 836
The system is aimed to develop the secure data transfer for
any types of data file such as audio file, movie file, DBMS file.
The system also aimed to be in portable program structure.
The system just only needs the JAVA run time environment,
no other web features are not necessary for the system to be
executed.
The overview of the system is divided into sender side and
the receiver side. The figure 1 shows the overview of the
system for the sender's side. The figure 2 shows the
overview of the system for the receiver's side.
Figure1. Overview of the system for the sender's side
Figure2. Overview of the system for the receiver's side
At the two end points of the communication median, there
will be two instances of system at each end point. The two
instances of the system will be running at both end points.
The system accepts the file to be transmitted on the
communication media, performs the random generation of
AES key, perform the encryption with AES, encryptionofthe
AES key with RSA and sending the encrypted files to the
send. These activities are of the sender's side of the system.
The system accepts the file from the communication-media,
performs the RSA decryption technique to encrypted file of
AES-Key, performs the AES encryption totheencrypteddata
file sent from the sender. These activities are of the
receiver's side of the system.
5. SYSTEM DESIGN AND IMPLEMENTATION
The system can be divided into following steps. They are
divided into sender's steps and receiver'ssteps.Actually,the
system is a multi-threaded program. The main thread of the
program is handling twosub-threads.Oneofthesub-threads
is to accept from the user for encryption and sending to the
other. The other sub-thread is to check the incoming signal
from the other.
Figure3. System flow diagram of the system
The steps of the system are as follows:
1. Accept data file for encryption and sending totheothers
2. Accept the RSA key from the user
3. Generate AES key process
4. Encryption process using AES method to data file
5. Encryption process using RSA method to applied AES
key
6. Files Sending Process
7. Files Accepting process
8. Decryption process using RSA method to accepted
encrypted AES key
9. Decryption process using AES method to accepted
encrypted data file
10. Generate the new RSA key pair
11. Sending the new RSA key
The Figure 3 shows the system flow diagram of the system.
The system flow diagram shows the processes of the system
and the interactions among the process of the system and
interactions between the user and the processofthesystem.
6. SYSTEM EXECUTION STEPS
On the main graphical user interface, there are three groups
of buttons shown to the user. The first group of button is for
crypto-activities which are encryption, decryption and
generation of new RSA key pair. The second group of button
is for communication-activities for sending and receiving
data to and fro. The last group of button has only one button
which is for terminating the system.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD29243 | Volume – 3 | Issue – 6 | September - October 2019 Page 837
At this step, user has to enter or choose the input file for
encryption process at the text field labeled with In File
Name.
The user can click to Generate AES key for generation of AES
key for this time of encryption. If the user does not generate,
the recently generated key will be used at the encryption
process.
The user must type or choose the file name of the RSA public
key file at the text field labeled with RSA Key(receiver's
public).
After the system performs the encryption, and a file will be
result. This result filename for the system can be entered at
the text field labeled with Out File Name.
To ask the system to perform the encryption process
according to the input, the user must click the Encrypt
button. At this time, the system will perform the encryption
and will generate an output file of encryption process with
the name at the text field labeled with Out File Name. This
file has to be send to the receiver.
The user must send the encryption-output file to the
receiver. The sender must start the send process by clicking
the Send button of the main graphical user interface of the
system. The user must enter the file name of the sending file
at the text field labeled with Send File.
At the time of sending, the system at the receiver's sidemust
start the Accept File graphical user interface by clicking the
Accept button on the main graphical user interface of the
system.
After file transfer has been done, the system at the receiver
side must start the decryption process by clicking the
Decrypt button on the main graphical user interface of the
system.
User must enter the accepted sent file from the sender. This
file name must be entered or chosen at the text field labeled
with In File Name. Then the user must enter or choose the
file name of the RSA private key file at the text field labeled
with RSA key (receiver's private). The user must enter out
file name at the text field labeled without file name.
7. EXPERIMENTAL RESULT
The following table, table 1, shows the run time taken by the
system along with the time taken by the other encryption
system.
The following figure, figure 4, shows the cluster column
chart for the table1. The time taken by the system is less
than the RSA encryption method and is greater than the AES
encryption method.
Table1. Run time taken by the systems
File Name AES RSA
Proposed System
AES+RSA
db1.mdb
560Kb
1200 ms 2650 ms 1355 ms
image.jpg
3255Kb
7000 ms 12355ms 8047 ms
Figure4. Run time analysis of the systems
8. CONCLUSION
The system is a secure data transfer system using the
combined method of the two encryptionalgorithms. Thetwo
algorithms used for the system are the Advance Encryption
Standard (AES) and RSA. The system can perform the
encryption and decryption of any data file. It is aimed to be
applied in portable program format.
The system generates random AES Key and performs the
encryption for the accepted data file. Then the applied AES
key is encrypted with the RSA encryption method. The
encrypted AES key and the encrypted data file are combined
and sent through thecommunicationmedia.Atthereceiver's
side, the combined file is accepted. This file is split into two
files, one is the encrypted AES key file and the other is the
encrypted data file. The receiver uses the RSA key of its own
and the AES key is decrypted with RSA method. The gained
AES key is applied for the decryption with AES method for
the data file.
The system is aimed to gain more security by using the
random AES key. This process can make the hacking person
with more difficulties. The system can also allow the users
(sender and receiver) to change the RSA key pair
periodically. For this process, the system can gain more
security than other hybrid systems.
The advantages of the system are as follows:
1. The system is a more secure system than the system
using only one method of encryption, such as DES, AES
and RSA.
2. The system uses Random key generation for AES key
and lets the user to change its keys of RSA periodically.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD29243 | Volume – 3 | Issue – 6 | September - October 2019 Page 838
3. Although the system uses two encryption techniques as
a hybrid system, the system takes lesser timethanusing
only RSA method.
REFERENCES
[1] A. Menezes, P. V. Oorschot, andS.Vanstone,"Handbook
of Applied Cryptography", CRC Press, 1996.
[2] E. Schaefer, Santa Clara University, "An introductionto
cryptography and cryptanalysis".
[3] S. Goldwasser, M. Bellare, "Lecture Notes on
Cryptography", MIT Computer Science and Artificial
Intelligence Laboratory, 2008.
[4] S. S. Rizvi, International Journal of Network Security &
Its Application (IJNSA), Vol.2, No.1, January 2010,
"Combining Private And Public Key Encryption
Techniques For Providing Extreme Secure
EnvironmentForAnAcademicInstitutionApplication".
[5] T. Mrokel, Information and Computer Security
Architecture (ICSA) Research Group, University of
Pretoria, South Africa, "Encryption Techniques: A
Timeline Approach".
[6] http://www.umich.edu/~umich/fm-34-40-2.

More Related Content

What's hot

Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationIRJET Journal
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEAM Publications,India
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...IOSR Journals
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystemsijtsrd
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET Journal
 
B03302007012
B03302007012B03302007012
B03302007012theijes
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographicijcsa
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption StandardIRJET Journal
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET Journal
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
Modified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachModified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachTELKOMNIKA JOURNAL
 
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET Journal
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture NotesFellowBuddy.com
 
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...EECJOURNAL
 
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesResearch trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesjournalBEEI
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithmpaperpublications3
 

What's hot (20)

Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
 
Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...Achieving data integrity by forming the digital signature using RSA and SHA-1...
Achieving data integrity by forming the digital signature using RSA and SHA-1...
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
B03302007012
B03302007012B03302007012
B03302007012
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 AlgorithmIRJET -  	  DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
IRJET - DOD Data Hiding Technique using Advanced LSB with AES-256 Algorithm
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
Modified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approachModified RSA-based algorithm: a double secure approach
Modified RSA-based algorithm: a double secure approach
 
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
IRJET- Schemes for Securing Cloud Data when the Cryptographic Material is Exp...
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...
 
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniquesResearch trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniques
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
 

Similar to Hybrid AES RSA Data Encryption

Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsIJERA Editor
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic TechniquesStacy Taylor
 
Particle magic need for quantum
Particle magic need for quantumParticle magic need for quantum
Particle magic need for quantumijaia
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security IssuesEditor IJCATR
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewFaith Nweke
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature surveyIJECEIAES
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationIRJET Journal
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
 
Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...Iaetsd Iaetsd
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardYogeshIJTSRD
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...caijjournal
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
 

Similar to Hybrid AES RSA Data Encryption (20)

Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
 
A Study On Cryptographic Techniques
A Study On Cryptographic TechniquesA Study On Cryptographic Techniques
A Study On Cryptographic Techniques
 
Particle magic need for quantum
Particle magic need for quantumParticle magic need for quantum
Particle magic need for quantum
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security Issues
 
Cryptoandnetworksecuritylitreview
CryptoandnetworksecuritylitreviewCryptoandnetworksecuritylitreview
Cryptoandnetworksecuritylitreview
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
J017667582
J017667582J017667582
J017667582
 
Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...Iaetsd a novel approach to provide the security for distributed adaptive netw...
Iaetsd a novel approach to provide the security for distributed adaptive netw...
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
Hybrid information security system via combination of compression, cryptogra...
Hybrid information security system via combination of  compression, cryptogra...Hybrid information security system via combination of  compression, cryptogra...
Hybrid information security system via combination of compression, cryptogra...
 
H42063743
H42063743H42063743
H42063743
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption Standard
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 

Recently uploaded (20)

AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 

Hybrid AES RSA Data Encryption

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 3 Issue 6, October 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD29243 | Volume – 3 | Issue – 6 | September - October 2019 Page 834 Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm Khet Khet Khaing Oo1, Yan Naung Soe2 1Faculty of Computer System and Technology, 2Faculty of Information Technology Support and Maintenance, 1,2University of Computer Studies, Myitkyina, Myanmar ABSTRACT Transferring the secure data becomes vital for the important data of every day's life. The system is a secure data transferring, combining the two techniques, Advance Encryption Standard (AES) and RSA. The data file is encrypted by using AES with the randomly generated key. This key is also encrypted by RSA using the receiver's public key. The encrypted data file and encrypted key file are combined to form an output file to send to the receiver. The file at the receiver's side is separated into two files,theencrypteddata file and encrypted key file. The encrypted key file is decrypted by RSA method using the receiver's private key. The AES key is acquired, the encrypted data file is then decrypted by AES method using the acquired AES key. The system includes file transferring process based on the Java socket technology. Key Words: AES (Advanced Encryption Standard) and RSA (Rivest, Shamir and Adleman) algorithms How to cite this paper: Khet Khet Khaing Oo | Yan Naung Soe "Encryption Data Measurement and Data SecurityofHybrid AES and RSA Algorithm" Published in International Journal of Trend in Scientific Research and Development(ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6, October 2019, pp.834-838, URL: https://www.ijtsrd.com/papers/ijtsrd29 243.pdf Copyright © 2019 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) 1. INTRODUCTION: To introduce cryptography, an understanding of issues related to information security in general is necessary. Information security manifestsitselfinmanywaysaccording to the situation and requirement. Regardless of who is involved, to one degree or another, all parties to a transaction must have confidence that certain objectives associated with information security have been met. Conceptually, the way information is recorded has not changed dramatically over time. Whereas information was typically stored and transmitted on paper, much of it now resides on magnetic media and is transmitted via telecommunications systems, some wireless. What has changed dramatically is the ability to copy and alter information. Someone can produce thousands of identical copies of a piece of information stored electronically and each is indistinguishable from the original.Withinformation on paper, this is much more difficult.Whatisneededthen for a society where information is mostly stored and transmitted in electronic form is a means to ensure information security which is independent of the physical medium recording or conveying it. The objectives of information security rely solely on digital information itself [3]. To gain more secure data transferring, the developments of the encryption methods have been established. Since there are two types of encryption method, one uses the public key encryption and the other use the privatekey encryption.The public key encryption methods use a pair of two key. One of them is used at the encryption step. This is known as the public key. This key is public for everybody who would like to send data. The other one is used at the decryption step. This is known as the private key. The pair of two keys method is known as asymmetric type of encryption. One of the most popular encryption methods of this type is RSA. The other type of encryption method uses the same key for the encryption steps and decryption steps. This method is type of symmetric type of encryption. One of the most popular encryption methods of this type is Advanced Encryption Standard (AES). The system is a type of a crypto system. It is a file encryption system. The system will accept a file from the user and performs the necessary encryptions. In this step of encryption, there will be actually two encryption methods but in a combined manner for the system's security affairs. To get the better security for system, the system is considered to use both encryptions as a hybrid system. The system is composed of two main portions. They are the crypto techniques and the communication technique. The system can also send and receive the data files. The system uses the socket technology supported by JAVA. IJTSRD29243
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD29243 | Volume – 3 | Issue – 6 | September - October 2019 Page 835 2. RELATED WORKS T. Mrokel expressed that encryption can be traced back for thousands of years. Since people first started to use encryption methods, the techniques that we know and use today have come a long way. The purpose of this paper is to construct a timeline of important encryption events that have occurred throughout the ages, and to discuss current and future encryption methods. Each event in the timeline is further researched and presented in more detail. Added attention is given to quantum encryption, the latest addition to encryption techniques. In this paper, different encryption techniques are evaluated, especially from a business perspective, and compared according to a set of criteria [5]. Syed S. Rizvi presents the implementation of a secure application for an academic institution that offers numerous services to both students and the faculty. The primary focus of this paper is to provide a technical implementation of a new architecture for encrypting the database. The scope of this paper mainly includes but is not limited to symmetric and public-key cryptography, authentication, key management, and digital signatures. The final results of this paper demonstrate that what security features one should implement in order to achieve a highly secured application. This paper presents the implementation of a stand alone system that can be implemented on any legacy systems, and still operates effectively. In other words, it isselfsufficientin terms of the data that it stores [4]. 3. BACKGROUND THEORY 3.1. Advanced Encryption Standard (AES) The Advanced Encryption Standard (AES) is an encryption standard adopted by the U.S. government. The standard comprises three block ciphers, AES-128, AES-192 and AES- 256, enhanced from AES originally published as Rijndael. Each AES cipher has a 128-bit block size, with key sizes of 128, 192 and 256 bits, respectively. The Rijndael cipher was developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen, and submitted by them to the AES selection process. Rijndael (pronounced [rεinda:l]) is a portmanteauofthenamesof the two inventors. AES is based on a design principle known as a Substitution permutation network. It is fast in for implementation with software and hardware. Unlike its predecessor, DES, AES does not use a Feistel network. AES has a fixed block size of 128 bits and a key size of 128, 192, or 256 bits, whereas Rijndael can be specified with block and key sizes in any multiple of 32 bits, with a minimum of 128 bits and a maximum of 256 bits. AES operates on a 4×4 array of bytes, termed the state (versions of Rijndael with a larger block size have additional columns in the state). Most AES calculations are done in a special finite field. The AES cipher is specified as a number of repetitions of transformation rounds that convert the input plaintext into the final output of ciphertext. Each round consists of several processing steps, including one that depends on the encryption key. A set of reverse rounds are applied to transform ciphertext back into the original plaintext using the same encryption key [2][1]. 3.2. RSA Encryption Method In cryptography, RSA (which stands for Rivest, Shamir and Adleman who first publicly described it) is an algorithm for public-key cryptography. Itisthefirstalgorithmknowntobe suitable for signing as well as encryption, and was one of the first great advances in public key cryptography. RSA is widely used in electronic commerce protocols, and is believed to be secure given sufficiently longkeysandtheuse of up-to-date implementations. The system includesa communicationschannel coupledtoat least one terminal having an encoding device and to at least one terminal having a decoding device. A message-to-be- transferred is enciphered to ciphertext at the encoding terminal by encoding the message as a number M in a predetermined set. That number is then raised to a first predetermined power (associated with the intended receiver) and finally computed. The remainder or residue, C, is... computed when the exponentiated number is divided by the product of two predetermined prime numbers (associated with the intended receiver) [2]. The RSA algorithm involves three steps: key generation, encryption and decryption. Key generation: RSA involves a public key and a private key. The public key can be known to everyone and is used for encrypting messages. Messages encrypted with the public key can only be decrypted using the private key. Encryption: The sender of the messageusesthepublickeyof the receiver and encrypts the message by mathematical calculations defined for RSA encryption. Decryption: After the receiver received the encrypted message (cipher-message), the receiver decrypt the encrypted message using the private key of the receiver by mathematical calculations defined for RSA decryption [6]. 4. OVERVIEW OF THE SYSTEM The system is an implementation for securedata transferfor local area network as a portable program structure. The symmetric key encryption uses the same key for encryption and decryption. For the asymmetric key encryption, a key is applied for encryption and the other key is applied for decryption. The system comes in contact with the two encryption method. The data file beingtransferredisbeingencryptedby the symmetric key encryption. The key for the former encryption is also encrypted by the asymmetric key encryption method. The former encryption applied for the system is Advanced Encryption Standard (AES). And the later encryption is the RSA encryption system. The two encrypted files are combined to form a file. The result file is sent from the send to the receiver. At the receiver side,there will be an accepted file. This file has to be separated by the system running at the receiver's side. Then the two files will be gained. One file is the encrypted AESkeyfileandtheother file is a encrypted data file. The encrypted AES key is first decrypted by means of the RSA decryption using the receiver's private key. Theapplied AES key is gained. The system will use thiskeytodecrypt the encrypted data file by means of AES decryption method.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD29243 | Volume – 3 | Issue – 6 | September - October 2019 Page 836 The system is aimed to develop the secure data transfer for any types of data file such as audio file, movie file, DBMS file. The system also aimed to be in portable program structure. The system just only needs the JAVA run time environment, no other web features are not necessary for the system to be executed. The overview of the system is divided into sender side and the receiver side. The figure 1 shows the overview of the system for the sender's side. The figure 2 shows the overview of the system for the receiver's side. Figure1. Overview of the system for the sender's side Figure2. Overview of the system for the receiver's side At the two end points of the communication median, there will be two instances of system at each end point. The two instances of the system will be running at both end points. The system accepts the file to be transmitted on the communication media, performs the random generation of AES key, perform the encryption with AES, encryptionofthe AES key with RSA and sending the encrypted files to the send. These activities are of the sender's side of the system. The system accepts the file from the communication-media, performs the RSA decryption technique to encrypted file of AES-Key, performs the AES encryption totheencrypteddata file sent from the sender. These activities are of the receiver's side of the system. 5. SYSTEM DESIGN AND IMPLEMENTATION The system can be divided into following steps. They are divided into sender's steps and receiver'ssteps.Actually,the system is a multi-threaded program. The main thread of the program is handling twosub-threads.Oneofthesub-threads is to accept from the user for encryption and sending to the other. The other sub-thread is to check the incoming signal from the other. Figure3. System flow diagram of the system The steps of the system are as follows: 1. Accept data file for encryption and sending totheothers 2. Accept the RSA key from the user 3. Generate AES key process 4. Encryption process using AES method to data file 5. Encryption process using RSA method to applied AES key 6. Files Sending Process 7. Files Accepting process 8. Decryption process using RSA method to accepted encrypted AES key 9. Decryption process using AES method to accepted encrypted data file 10. Generate the new RSA key pair 11. Sending the new RSA key The Figure 3 shows the system flow diagram of the system. The system flow diagram shows the processes of the system and the interactions among the process of the system and interactions between the user and the processofthesystem. 6. SYSTEM EXECUTION STEPS On the main graphical user interface, there are three groups of buttons shown to the user. The first group of button is for crypto-activities which are encryption, decryption and generation of new RSA key pair. The second group of button is for communication-activities for sending and receiving data to and fro. The last group of button has only one button which is for terminating the system.
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD29243 | Volume – 3 | Issue – 6 | September - October 2019 Page 837 At this step, user has to enter or choose the input file for encryption process at the text field labeled with In File Name. The user can click to Generate AES key for generation of AES key for this time of encryption. If the user does not generate, the recently generated key will be used at the encryption process. The user must type or choose the file name of the RSA public key file at the text field labeled with RSA Key(receiver's public). After the system performs the encryption, and a file will be result. This result filename for the system can be entered at the text field labeled with Out File Name. To ask the system to perform the encryption process according to the input, the user must click the Encrypt button. At this time, the system will perform the encryption and will generate an output file of encryption process with the name at the text field labeled with Out File Name. This file has to be send to the receiver. The user must send the encryption-output file to the receiver. The sender must start the send process by clicking the Send button of the main graphical user interface of the system. The user must enter the file name of the sending file at the text field labeled with Send File. At the time of sending, the system at the receiver's sidemust start the Accept File graphical user interface by clicking the Accept button on the main graphical user interface of the system. After file transfer has been done, the system at the receiver side must start the decryption process by clicking the Decrypt button on the main graphical user interface of the system. User must enter the accepted sent file from the sender. This file name must be entered or chosen at the text field labeled with In File Name. Then the user must enter or choose the file name of the RSA private key file at the text field labeled with RSA key (receiver's private). The user must enter out file name at the text field labeled without file name. 7. EXPERIMENTAL RESULT The following table, table 1, shows the run time taken by the system along with the time taken by the other encryption system. The following figure, figure 4, shows the cluster column chart for the table1. The time taken by the system is less than the RSA encryption method and is greater than the AES encryption method. Table1. Run time taken by the systems File Name AES RSA Proposed System AES+RSA db1.mdb 560Kb 1200 ms 2650 ms 1355 ms image.jpg 3255Kb 7000 ms 12355ms 8047 ms Figure4. Run time analysis of the systems 8. CONCLUSION The system is a secure data transfer system using the combined method of the two encryptionalgorithms. Thetwo algorithms used for the system are the Advance Encryption Standard (AES) and RSA. The system can perform the encryption and decryption of any data file. It is aimed to be applied in portable program format. The system generates random AES Key and performs the encryption for the accepted data file. Then the applied AES key is encrypted with the RSA encryption method. The encrypted AES key and the encrypted data file are combined and sent through thecommunicationmedia.Atthereceiver's side, the combined file is accepted. This file is split into two files, one is the encrypted AES key file and the other is the encrypted data file. The receiver uses the RSA key of its own and the AES key is decrypted with RSA method. The gained AES key is applied for the decryption with AES method for the data file. The system is aimed to gain more security by using the random AES key. This process can make the hacking person with more difficulties. The system can also allow the users (sender and receiver) to change the RSA key pair periodically. For this process, the system can gain more security than other hybrid systems. The advantages of the system are as follows: 1. The system is a more secure system than the system using only one method of encryption, such as DES, AES and RSA. 2. The system uses Random key generation for AES key and lets the user to change its keys of RSA periodically.
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD29243 | Volume – 3 | Issue – 6 | September - October 2019 Page 838 3. Although the system uses two encryption techniques as a hybrid system, the system takes lesser timethanusing only RSA method. REFERENCES [1] A. Menezes, P. V. Oorschot, andS.Vanstone,"Handbook of Applied Cryptography", CRC Press, 1996. [2] E. Schaefer, Santa Clara University, "An introductionto cryptography and cryptanalysis". [3] S. Goldwasser, M. Bellare, "Lecture Notes on Cryptography", MIT Computer Science and Artificial Intelligence Laboratory, 2008. [4] S. S. Rizvi, International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January 2010, "Combining Private And Public Key Encryption Techniques For Providing Extreme Secure EnvironmentForAnAcademicInstitutionApplication". [5] T. Mrokel, Information and Computer Security Architecture (ICSA) Research Group, University of Pretoria, South Africa, "Encryption Techniques: A Timeline Approach". [6] http://www.umich.edu/~umich/fm-34-40-2.