Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.

Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.

Like this presentation? Why not share!

- Hybrid encryption by ranjit banshpal 4811 views
- Hybrid Cryptography with examples i... by Eleanor McHugh 1330 views
- Implementation of-hybrid-cryptograp... by Ijcem Journal 461 views
- Cryptography.ppt by kusum sharma 98704 views
- Alice & bob public key cryptograph... by Joshua Thijssen 11626 views
- Alice & bob public key cryptograph... by Joshua Thijssen 2157 views

4,018 views

Published on

Hybrid encryption technology is used for providing see

No Downloads

Total views

4,018

On SlideShare

0

From Embeds

0

Number of Embeds

4

Shares

0

Downloads

293

Comments

0

Likes

4

No embeds

No notes for slide

- 1. A Technical seminar on Hybrid Encryption Technology Guided by Mr. Y.S .INGLE Presented By: Prashant Dahake Mtech 1st sem (CSE) Roll No 20 G.H. Raisoni College of Engineering Nagpur Dept. of Computer Science & Engineering 2013-2014 1 1 1
- 2. overview Introduction What is hybrid encryption. What is the need of hybrid encryption. Hybrid encryption using DES and RSA. Hybrid encryption using RSA and D-H. Hybrid encryption in electronic document. Conclusion References
- 3. Introduction Security of data is important. Cryptography is used to secure data. 4 main requirements of cryptography are to maintain data confidentiality data integrity authentication and non-repudiation from unauthenticated users To protect above properties symmetric or asymmetric cryptography is used.
- 4. Continued… Symmetric key algorithm :- uses same key . Asymmetric key algorithm : - uses different key. Use of individual algorithm is still vulnerable . that’s why researchers came up with technology called it as “HYBRID ENCRYPTION TECHNOLOGY”
- 5. What is hybrid encryption? Combination of more than one cryptographic algorithm It incorporates a combination of asymmetric and symmetric encryption It provides more security. Hybrid encryption is considered as highly secure type of encryption as long as the public and private keys are fully secure.
- 6. What is the Need of Hybrid Encryption Technology ? Conventional encryption system uses only one key. If key is disclosed then complete encryption and decryption process becomes vulnerable. key distribution problem. To provide greater security and to avoid explicit transfer of secret key we need hybrid encryption system.
- 7. Hybrid Encryption using DES and RSA using any symmetric algo and RSA algo Encryption Steps using Hybrid Crypto System at the Source Prerequisite :-source has destination public key(PUK) Inputs: Plain Data Block (PDB) Symmetric Key (SK) Outputs: Encrypted Data Block (EDB) Note: EDB contains both the encrypted PDB (denoted by ED) concatenated with encrypted SK (denoted by ESK)
- 8. Encryption Steps: 1) Encrypt PDB using SK to get ED. (Note: This can be done using any symmetric-key crypto algorithm like DES and AES) 2) Encrypt SK using destination’s PUK to get ESK. (Note: This can be done using any public key algorithm like RSA) 3) Concatenate ED with its corresponding ESK to get EDB which is sent to the destination. EDB = { ESK , ED }
- 9. Decryption Steps using Hybrid Crypto System at the Destination Prerequisite: Destination has its Private Key (PRK) Inputs: Encrypted Data Block (EDB) Note: EDB contains both the encrypted PDB (denoted by ED) concatenated with encrypted SK (denoted by ESK) Outputs: Plain Data Block (PDB)
- 10. Decryption Steps: 1) Decrypt ESK using PRK to retrieve SK. (Note: This should be done using the same public key algorithm which is used at source) 2) Use the retrieved SK as decryption key to decrypt ED to get PDB.
- 11. Figure. Block Diagram of hybrid crypto system
- 12. Although there is no explicit key transfer in the hybrid crypto system our proposed key exchange works in the manner shown in Fig Figure. Key transfer using hybrid crypto system
- 13. HYBRID CRYPTO SYSTEM USING RSA AND D-H Steps of this algorithm are as 1. Choose two large prime numbers P and Q. a. Calculate N = P x Q. b. Select public key (i.e. encryption key) E such that it is not a factor of (p-1) and (q-1) c. Select the private key (i.e. the decryption key) D such that the following equation is true (D x E) mod (P – 1) x (Q – 1) = 1
- 14. Suppose R and G is automatic generated prime constants And put A=E and B=D 2. Now calculate following as public number X= GA mod R Y= GB mod R 3. Calculate session key with formula KA = YA mod R , Such that KA = KB = K. KB = XB mod R
- 15. RSA D-H X En Figure 2: A Hybrid RSA & Diffie-Hellman
- 16. Hybrid Encryption in Electronic Document Electronic document information suffers from disclosed, counterfeited, tampered, repudiated and so on. To solve the above problem we used hybrid encryption technology using encryption technology, digital digest, digital authentication and digital signature .
- 17. Adobe Acrobat software uses hybrid approaches so single documents can be protected for multiple recipients, each possessing unique key pairs. The file size is not significantly increased during this method because the entire document does not need to be encrypted for each person. Instead, the document is encrypted with a single symmetric key and that symmetric key is encrypted for each recipient with their respective public key.
- 18. Conclusion Hybrid encryption technology make use of two different cryptographic algorithm. Which removes the drawback of use of any single cryptographic algorithm and provide double security to secret data . It removes the key distribution problem Security systems tends to use a hybrid solution to increase the security and speed of encrypting documents.
- 19. References 1. 2012 International Conference on Advanced Computer Science Applications and Technologies. Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems. Adnan Abdul-Aziz Gutub Center of Research Excellence in Hajj. 2. 2012 IEEE International Conference on Computational Intelligence and Computing Research A Hybrid Encryption Algorithm based on RSA and Diffie-Hellman Shilpi Gupta and Jaya Sharma Department of Computer Science & Engineering Amity School of Engineering & Technology Amity University, India. 3. 2010 International Conference of Information Science and Management Engineering A Study on the hybrid encryption technology in the security transmission of electronic documents 4. Xin Zhou, Xiaofei Tang, Research and Implementation of RSA Algorithm for Encryption and Decryption, 2011 the 6thInternational Forum on Strategic Technology.

No public clipboards found for this slide

×
### Save the most important slides with Clipping

Clipping is a handy way to collect and organize the most important slides from a presentation. You can keep your great finds in clipboards organized around topics.

Be the first to comment