SlideShare a Scribd company logo
A
Technical seminar on

Hybrid Encryption Technology
Guided by
Mr. Y.S .INGLE

Presented By:
Prashant Dahake
Mtech 1st sem (CSE)
Roll No 20

G.H. Raisoni College of Engineering Nagpur
Dept. of Computer Science & Engineering
2013-2014

1 1
1
overview
 Introduction
 What is hybrid encryption.
 What is the need of hybrid encryption.
 Hybrid encryption using DES and RSA.
 Hybrid encryption using RSA and D-H.
 Hybrid encryption in electronic document.
 Conclusion
 References
Introduction
Security of data is important.
 Cryptography is used to secure data.
 4 main requirements of cryptography are
to maintain
 data confidentiality
 data integrity
 authentication and non-repudiation from
unauthenticated users
 To protect above properties symmetric or asymmetric
cryptography is used.

Continued…


Symmetric key algorithm :- uses same key .

 Asymmetric key algorithm : - uses different key.
 Use of individual algorithm is still vulnerable .

that’s why researchers came up with technology
called it as
“HYBRID ENCRYPTION TECHNOLOGY”
What is hybrid encryption?
 Combination of more than one cryptographic

algorithm
 It incorporates a combination of asymmetric and
symmetric encryption
 It provides more security.
 Hybrid encryption is considered as highly secure
type of encryption as long as the public and private
keys are fully secure.
What is the Need of Hybrid Encryption
Technology ?
 Conventional

encryption system uses only one key.

 If key is disclosed then complete encryption and
decryption process becomes vulnerable.
 key distribution problem.
 To provide greater security and to avoid explicit
transfer of secret key we need hybrid encryption system.
Hybrid Encryption using DES and RSA


using any symmetric algo and RSA algo

Encryption Steps using Hybrid Crypto System at the
Source
Prerequisite :-source has destination public key(PUK)

 Inputs: Plain Data Block (PDB) Symmetric Key (SK)
 Outputs: Encrypted Data Block (EDB)
 Note: EDB contains both the encrypted PDB (denoted
by ED) concatenated with encrypted SK (denoted by ESK)
Encryption Steps:
1) Encrypt PDB using SK to get ED.

(Note: This can be done using any symmetric-key crypto algorithm
like DES and AES)
2) Encrypt SK using destination’s PUK to get ESK. (Note: This can be
done using any public key algorithm like RSA)

3) Concatenate ED with its corresponding ESK to get EDB which is
sent to the destination.
EDB = { ESK , ED }
Decryption Steps using Hybrid Crypto System at the Destination
Prerequisite: Destination has its Private Key (PRK)
Inputs: Encrypted Data Block (EDB)
Note: EDB contains both the encrypted PDB (denoted by ED) concatenated with
encrypted SK (denoted by ESK)

Outputs: Plain Data Block (PDB)
Decryption Steps:
1) Decrypt ESK using PRK to retrieve SK.

(Note: This should be done using the same public key algorithm which
is used at source)
2) Use the retrieved SK as decryption key to decrypt ED to get PDB.
Figure. Block Diagram of hybrid crypto system
Although there is no explicit key transfer in the hybrid crypto system
our proposed key exchange works in the manner shown in Fig

Figure. Key transfer using hybrid crypto system
HYBRID CRYPTO SYSTEM USING RSA AND D-H
Steps of this algorithm are as

1. Choose two large prime numbers P and Q.
a. Calculate N = P x Q.
b. Select public key (i.e. encryption key) E such that it is
not a factor of (p-1) and (q-1)
c. Select the private key (i.e. the decryption key) D such that
the following equation is true (D x E) mod (P – 1) x (Q – 1) = 1
 Suppose R and G is automatic generated prime
constants
And put A=E and B=D
2. Now calculate following as public number
X= GA mod R Y= GB mod R
3. Calculate session key with formula
KA = YA mod R ,
Such that KA = KB = K.

KB = XB mod R
RSA

D-H
X

En

Figure 2: A Hybrid RSA & Diffie-Hellman
Hybrid Encryption in Electronic Document
Electronic document information suffers from
 disclosed, counterfeited, tampered, repudiated and so
on.
To solve the above problem we used hybrid encryption
technology using
 encryption technology, digital digest, digital
authentication and digital signature .
 Adobe Acrobat software uses hybrid approaches so
single documents can be protected for multiple recipients,
each possessing unique key pairs.

 The file size is not significantly increased during this
method because the entire document does not need to
be encrypted for each person.
 Instead, the document is encrypted with a single
symmetric key and that symmetric key is encrypted for
each recipient with their respective public key.
Conclusion
Hybrid encryption technology make use of two different
cryptographic algorithm. Which removes the drawback
of use of any single cryptographic algorithm and provide
double security to secret data .

 It removes the key distribution problem
 Security systems tends to use a hybrid solution to
increase the security and speed of encrypting
documents.
References
1. 2012 International Conference on Advanced Computer Science Applications and
Technologies. Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key
Cryptosystems. Adnan Abdul-Aziz Gutub Center of Research Excellence in Hajj.
2. 2012 IEEE International Conference on Computational Intelligence and Computing
Research A Hybrid Encryption Algorithm based on RSA and Diffie-Hellman Shilpi
Gupta and Jaya Sharma Department of Computer Science & Engineering Amity School
of Engineering & Technology
Amity University, India.
3. 2010 International Conference of Information Science and Management
Engineering A Study on the hybrid encryption technology in the security transmission
of electronic documents
4. Xin Zhou, Xiaofei Tang, Research and Implementation of RSA Algorithm for
Encryption and Decryption, 2011 the 6thInternational Forum on Strategic Technology.
Hybrid encryption ppt

More Related Content

What's hot

Key management
Key managementKey management
Key management
Sujata Regoti
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network security
NEHA PATEL
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
Hossain Md Shakhawat
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
Srilal Buddika
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
Mohsin Ali
 
Cryptography ppt
Cryptography pptCryptography ppt
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
 
Cryptography
CryptographyCryptography
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
zahid-mian
 
Cryptography
CryptographyCryptography
Cryptography
subodh pawar
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Sathish Kumar
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
Pa Van Tanku
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
Niloy Biswas
 
Diffie Hellman.pptx
Diffie Hellman.pptxDiffie Hellman.pptx
Diffie Hellman.pptx
Sou Jana
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
Gopal Sakarkar
 

What's hot (20)

Key management
Key managementKey management
Key management
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Introduction of cryptography and network security
Introduction of cryptography and network securityIntroduction of cryptography and network security
Introduction of cryptography and network security
 
Fundamentals of cryptography
Fundamentals of cryptographyFundamentals of cryptography
Fundamentals of cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Cryptography
CryptographyCryptography
Cryptography
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Cryptography and Network Security
Cryptography and Network SecurityCryptography and Network Security
Cryptography and Network Security
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
Diffie Hellman.pptx
Diffie Hellman.pptxDiffie Hellman.pptx
Diffie Hellman.pptx
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
cryptography
cryptographycryptography
cryptography
 

Similar to Hybrid encryption ppt

Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
IRJET Journal
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
IJERA Editor
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Tharindu Weerasinghe
 
Encryption
EncryptionEncryption
Encryption
Naiyan Noor
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
journalBEEI
 
Improving Cloud Efficiency using ECDH, AES & Blowfish Algorithms
Improving Cloud Efficiency using ECDH, AES & Blowfish AlgorithmsImproving Cloud Efficiency using ECDH, AES & Blowfish Algorithms
Improving Cloud Efficiency using ECDH, AES & Blowfish Algorithms
IRJET Journal
 
Whitepaper - Protecting Data in Transit
Whitepaper - Protecting Data in TransitWhitepaper - Protecting Data in Transit
Whitepaper - Protecting Data in Transit
Phil Bartlett
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
ijsrd.com
 
IS Unit 3_Public Key Cryptography
IS Unit 3_Public Key CryptographyIS Unit 3_Public Key Cryptography
IS Unit 3_Public Key CryptographySarthak Patel
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
Jayanth Dwijesh H P
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
International Journal of Science and Research (IJSR)
 
Moein
MoeinMoein
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperNithin Cv
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
 

Similar to Hybrid encryption ppt (20)

Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption AlgorithmsSecrecy and Performance Analysis of Symmetric Key Encryption Algorithms
Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms
 
Encryption
EncryptionEncryption
Encryption
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
Improving Cloud Efficiency using ECDH, AES & Blowfish Algorithms
Improving Cloud Efficiency using ECDH, AES & Blowfish AlgorithmsImproving Cloud Efficiency using ECDH, AES & Blowfish Algorithms
Improving Cloud Efficiency using ECDH, AES & Blowfish Algorithms
 
Whitepaper - Protecting Data in Transit
Whitepaper - Protecting Data in TransitWhitepaper - Protecting Data in Transit
Whitepaper - Protecting Data in Transit
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
IS Unit 3_Public Key Cryptography
IS Unit 3_Public Key CryptographyIS Unit 3_Public Key Cryptography
IS Unit 3_Public Key Cryptography
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
82 86
82 8682 86
82 86
 
82 86
82 8682 86
82 86
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
Moein
MoeinMoein
Moein
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 

Recently uploaded

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Hybrid encryption ppt

  • 1. A Technical seminar on Hybrid Encryption Technology Guided by Mr. Y.S .INGLE Presented By: Prashant Dahake Mtech 1st sem (CSE) Roll No 20 G.H. Raisoni College of Engineering Nagpur Dept. of Computer Science & Engineering 2013-2014 1 1 1
  • 2. overview  Introduction  What is hybrid encryption.  What is the need of hybrid encryption.  Hybrid encryption using DES and RSA.  Hybrid encryption using RSA and D-H.  Hybrid encryption in electronic document.  Conclusion  References
  • 3. Introduction Security of data is important.  Cryptography is used to secure data.  4 main requirements of cryptography are to maintain  data confidentiality  data integrity  authentication and non-repudiation from unauthenticated users  To protect above properties symmetric or asymmetric cryptography is used. 
  • 4. Continued…  Symmetric key algorithm :- uses same key .  Asymmetric key algorithm : - uses different key.  Use of individual algorithm is still vulnerable . that’s why researchers came up with technology called it as “HYBRID ENCRYPTION TECHNOLOGY”
  • 5. What is hybrid encryption?  Combination of more than one cryptographic algorithm  It incorporates a combination of asymmetric and symmetric encryption  It provides more security.  Hybrid encryption is considered as highly secure type of encryption as long as the public and private keys are fully secure.
  • 6. What is the Need of Hybrid Encryption Technology ?  Conventional encryption system uses only one key.  If key is disclosed then complete encryption and decryption process becomes vulnerable.  key distribution problem.  To provide greater security and to avoid explicit transfer of secret key we need hybrid encryption system.
  • 7. Hybrid Encryption using DES and RSA  using any symmetric algo and RSA algo Encryption Steps using Hybrid Crypto System at the Source Prerequisite :-source has destination public key(PUK)  Inputs: Plain Data Block (PDB) Symmetric Key (SK)  Outputs: Encrypted Data Block (EDB)  Note: EDB contains both the encrypted PDB (denoted by ED) concatenated with encrypted SK (denoted by ESK)
  • 8. Encryption Steps: 1) Encrypt PDB using SK to get ED. (Note: This can be done using any symmetric-key crypto algorithm like DES and AES) 2) Encrypt SK using destination’s PUK to get ESK. (Note: This can be done using any public key algorithm like RSA) 3) Concatenate ED with its corresponding ESK to get EDB which is sent to the destination. EDB = { ESK , ED }
  • 9. Decryption Steps using Hybrid Crypto System at the Destination Prerequisite: Destination has its Private Key (PRK) Inputs: Encrypted Data Block (EDB) Note: EDB contains both the encrypted PDB (denoted by ED) concatenated with encrypted SK (denoted by ESK) Outputs: Plain Data Block (PDB)
  • 10. Decryption Steps: 1) Decrypt ESK using PRK to retrieve SK. (Note: This should be done using the same public key algorithm which is used at source) 2) Use the retrieved SK as decryption key to decrypt ED to get PDB.
  • 11. Figure. Block Diagram of hybrid crypto system
  • 12. Although there is no explicit key transfer in the hybrid crypto system our proposed key exchange works in the manner shown in Fig Figure. Key transfer using hybrid crypto system
  • 13. HYBRID CRYPTO SYSTEM USING RSA AND D-H Steps of this algorithm are as 1. Choose two large prime numbers P and Q. a. Calculate N = P x Q. b. Select public key (i.e. encryption key) E such that it is not a factor of (p-1) and (q-1) c. Select the private key (i.e. the decryption key) D such that the following equation is true (D x E) mod (P – 1) x (Q – 1) = 1
  • 14.  Suppose R and G is automatic generated prime constants And put A=E and B=D 2. Now calculate following as public number X= GA mod R Y= GB mod R 3. Calculate session key with formula KA = YA mod R , Such that KA = KB = K. KB = XB mod R
  • 15. RSA D-H X En Figure 2: A Hybrid RSA & Diffie-Hellman
  • 16. Hybrid Encryption in Electronic Document Electronic document information suffers from  disclosed, counterfeited, tampered, repudiated and so on. To solve the above problem we used hybrid encryption technology using  encryption technology, digital digest, digital authentication and digital signature .
  • 17.  Adobe Acrobat software uses hybrid approaches so single documents can be protected for multiple recipients, each possessing unique key pairs.  The file size is not significantly increased during this method because the entire document does not need to be encrypted for each person.  Instead, the document is encrypted with a single symmetric key and that symmetric key is encrypted for each recipient with their respective public key.
  • 18. Conclusion Hybrid encryption technology make use of two different cryptographic algorithm. Which removes the drawback of use of any single cryptographic algorithm and provide double security to secret data .  It removes the key distribution problem  Security systems tends to use a hybrid solution to increase the security and speed of encrypting documents.
  • 19. References 1. 2012 International Conference on Advanced Computer Science Applications and Technologies. Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems. Adnan Abdul-Aziz Gutub Center of Research Excellence in Hajj. 2. 2012 IEEE International Conference on Computational Intelligence and Computing Research A Hybrid Encryption Algorithm based on RSA and Diffie-Hellman Shilpi Gupta and Jaya Sharma Department of Computer Science & Engineering Amity School of Engineering & Technology Amity University, India. 3. 2010 International Conference of Information Science and Management Engineering A Study on the hybrid encryption technology in the security transmission of electronic documents 4. Xin Zhou, Xiaofei Tang, Research and Implementation of RSA Algorithm for Encryption and Decryption, 2011 the 6thInternational Forum on Strategic Technology.