Submit Search
Upload
IRJET- Message Encryption using Hybrid Cryptography
•
1 like
•
14 views
IRJET Journal
Follow
https://www.irjet.net/archives/V7/i1/IRJET-V7I168.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
IRJET- Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
IRJET Journal
50120140507006
50120140507006
IAEME Publication
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
Yekini Nureni
IRJET- Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
IRJET Journal
Image Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
ijtsrd
82 86
82 86
Editor IJARCET
IRJET- Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DES
IRJET Journal
Recommended
IRJET- Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
IRJET Journal
50120140507006
50120140507006
IAEME Publication
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
Yekini Nureni
IRJET- Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
IRJET Journal
Image Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
ijtsrd
82 86
82 86
Editor IJARCET
IRJET- Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DES
IRJET Journal
State of the art parallel approaches for
State of the art parallel approaches for
ijcsa
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
ijtsrd
Implementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
IRJET Journal
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
eSAT Journals
IRJET- Data Security in Network Flow using Obfuscation Technique
IRJET- Data Security in Network Flow using Obfuscation Technique
IRJET Journal
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniques
journalBEEI
Master thesis 14023164
Master thesis 14023164
Thivya Devaraj
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
Review on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES Algorithm
EECJOURNAL
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal
Survey of the end to end secure communication in ADHOC networks
Survey of the end to end secure communication in ADHOC networks
Ahmad Sharifi
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
Jayanth Dwijesh H P
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
File transfer with multiple security mechanism
File transfer with multiple security mechanism
Shubham Patil
Ew25914917
Ew25914917
IJERA Editor
RSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
Universitas Pembangunan Panca Budi
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
Jayanth Dwijesh H P
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
IRJET Journal
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
More Related Content
What's hot
State of the art parallel approaches for
State of the art parallel approaches for
ijcsa
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
ijtsrd
Implementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
IRJET Journal
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
eSAT Journals
IRJET- Data Security in Network Flow using Obfuscation Technique
IRJET- Data Security in Network Flow using Obfuscation Technique
IRJET Journal
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniques
journalBEEI
Master thesis 14023164
Master thesis 14023164
Thivya Devaraj
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
Review on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES Algorithm
EECJOURNAL
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
IRJET Journal
Survey of the end to end secure communication in ADHOC networks
Survey of the end to end secure communication in ADHOC networks
Ahmad Sharifi
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
Jayanth Dwijesh H P
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
File transfer with multiple security mechanism
File transfer with multiple security mechanism
Shubham Patil
Ew25914917
Ew25914917
IJERA Editor
RSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
Universitas Pembangunan Panca Budi
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
Jayanth Dwijesh H P
What's hot
(20)
State of the art parallel approaches for
State of the art parallel approaches for
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Implementation of De-Duplication Algorithm
Implementation of De-Duplication Algorithm
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
IRJET- Data Security in Network Flow using Obfuscation Technique
IRJET- Data Security in Network Flow using Obfuscation Technique
Research trends review on RSA scheme of asymmetric cryptography techniques
Research trends review on RSA scheme of asymmetric cryptography techniques
Master thesis 14023164
Master thesis 14023164
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
Review on Encrypted Image with Hidden Data Using AES Algorithm
Review on Encrypted Image with Hidden Data Using AES Algorithm
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Survey of the end to end secure communication in ADHOC networks
Survey of the end to end secure communication in ADHOC networks
Vtu network security(10 ec832) unit 5 notes.
Vtu network security(10 ec832) unit 5 notes.
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
File transfer with multiple security mechanism
File transfer with multiple security mechanism
Ew25914917
Ew25914917
RSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
Similar to IRJET- Message Encryption using Hybrid Cryptography
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
IRJET Journal
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
DES- Data Encryption Standard
DES- Data Encryption Standard
IRJET Journal
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
IJECEIAES
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
IRJET Journal
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET Journal
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
IRJET Journal
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
IRJET Journal
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET Journal
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
IRJET Journal
Development and performance comparison of modified RSA algorithm with other c...
Development and performance comparison of modified RSA algorithm with other c...
IRJET Journal
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET Journal
Ijcnc050208
Ijcnc050208
IJCNCJournal
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET Journal
Cloud security: literature survey
Cloud security: literature survey
IJECEIAES
An Efficient Approach for Data Security in Cloud Environment using Watermarki...
An Efficient Approach for Data Security in Cloud Environment using Watermarki...
IRJET Journal
Similar to IRJET- Message Encryption using Hybrid Cryptography
(20)
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
DES- Data Encryption Standard
DES- Data Encryption Standard
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
IRJET- Implementation of AES Algorithm in Arduino Mega2560 Board
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Development and performance comparison of modified RSA algorithm with other c...
Development and performance comparison of modified RSA algorithm with other c...
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
Ijcnc050208
Ijcnc050208
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
IRJET- A Survey on Searching of Keyword on Encrypted Data in Cloud using ...
Cloud security: literature survey
Cloud security: literature survey
An Efficient Approach for Data Security in Cloud Environment using Watermarki...
An Efficient Approach for Data Security in Cloud Environment using Watermarki...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
mulugeta48
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
roncy bisnoi
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
University management System project report..pdf
University management System project report..pdf
Kamal Acharya
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
Call Girls in Nagpur High Profile Call Girls
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
sivaprakash250
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
JiananWang21
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
RagavanV2
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
BhangaleSonal
Hostel management system project report..pdf
Hostel management system project report..pdf
Kamal Acharya
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
203318pmpc
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
DineshKumar4165
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Omar Fathy
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
RishantSharmaFr
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
Recently uploaded
(20)
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
University management System project report..pdf
University management System project report..pdf
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
Hostel management system project report..pdf
Hostel management system project report..pdf
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
IRJET- Message Encryption using Hybrid Cryptography
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 367 Message Encryption using Hybrid Cryptography Anirudh K1, M Ramachandra Kashyap2, K Radha3 1,2IV-CSE, CSE,GITAM UNIVERSITY, Patancheru, Rudraram, Telangana, India 3Asst Professor, CSE, GITAM UNIVERSITY, Patancheru, Rudraram, Telangana, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Communication through Messages has become a major and effective part of our day to life. But, as the amount of available data grew, so did the sensitivity of the data at hand. So, it is necessary to make sure that the Data that is being transmitted via messages is usually safe from unauthorised and third party sources. That is where encryption comes into play and there exists multiple encryption algorithms to serve the purpose. But, using only one algorithm for this, is generally not secure enough. So, by using two effectives encryption standards (AES and Triple DES), we aim to provide a lighter, easy to understand and effective approach to Message encryption. Since, we are using more than one techniques of encryption, its called hybrid cryptography. Since, the algorithms used are symmetric key encryptions, the users are required to transfer a key within them prior. Then , the message is split into two equal halves and each half is encrypted using any one algorithm and the previously acquired key. These encrypted parts are transmitted as a single message and then decrypted at users side to get the original message back. Key Words: Cryptography, Encryption, AES (advanced encryption standard), DES (Data encryption standard), Key (secure variable) 1. INTRODUCTION Cryptography technique translates original message into a sequence of unreadable symbols and characters. The Cryptography techniquesavailableinthemarketare broadly divided into two types,theyaresymmetric keycryptography and public key cryptography. These techniquesuseskeysfor encrypting the data into unreadable form, so that only authorized persons that have the preagreedkeycanactually decrypt and view the message that is being transmitted. The techniques that we are applying in our system both fall under the symmetric key cryptographic techniques. This involves transferring a secure, private key between boththe parties prior to establishing the communicationpathvia any secure source like Mail. So, since no two algorithms are similar in nature, there are different requirementsfordifferentalgorithms.Forexample, DES can only work with a 56 bit key and AES on the other hand can work with 128, 192 or 256 bit keys. The plain text or the initial message to be encrypted in DES should not exceed 64 bit block size where as AES can work with larger block sizes as well. So, when we are attempting to try and incorporate thesetechniquesasa singlealgorithm,wewould need to keep track of these anomalies and make sure that no ambiguities arise in the implementation. To handle varying input sizes and key sizes, the approach of the algorithm has been modeled in the given way, initially, the key is expected from the user and if the key does not meet the minimum size, usually multiples of 16, we use the concept of padding to increase its size. That is, we append trailing zeros to the content and then use it as the key. In case of the message, the text is broken down into two equal halves and each of the halves are encrypted using any one of the algorithm. Once again, if the plain text doesn’t meet the minimum size requirements of the algorithm require, we perform padding. Once, both parts of the message are encrypted , it is converted into a arbitrary sequence of symbols then the encrypted parts are combined intoa single message and transmitted to the receiver. Now, the user performs decryption with the prior obtained key via secure sources using both AES and DESandultimatelygetstheplain text or initial message that was transmitted. One main advantage of this approach is that even if the network is compromised and an attacker manages to get access to the encrypted part of message,itappearsgibberish and without the private key, the attacker would be clueless to what the actual message might be. The reason AES and DES were chosen is because, symmetric key encryptions are easy to understand and implement and other encryption standards like mono or poly alphabetic ciphers werebroken by Brute Force attacks that were possible with the advent of modern computing technologies. AESisalsocurrentlythe go to Encryption technique for applications like WhatsApp, but to prioritize simplicity, we have gone with DES along with AES to make it a lighter and effective approach. 2. BACKGROUND STUDY The basic ideology of this project came from background study of the Hybrid Cryptography algorithm paper written by Punam V. Maitri and Aruna Verma. Where, they had used AES, Blowfish and RC6 to from the hybrid cryptography and Image steganography technique to securely transfer thekey from one user to the other. So, we in an effort to simplify and make the above said approach lighter have gone for a simpler way of transferring key.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 368 3. RESULT ANALYSIS The time taken for execution for proposed system and AES: Even though here we can observe that AES alone performs better, AES is known to use a large number of rounds of ciphers to encrypt the content. So, for our input size it might perform better, but as the size oftheinputincreases,AES can get considerably slow. Moreover, AES works fine as a standalone algorithm for large applications, but for simpler purposes like ours, using it on entire message would only lead to it using up the resources as it needs more number of rounds than DES. Another question that might arise is why not use any other algorithm into the mix like RC6, the reason being that of the used algorithms, AES, 3DES and RC6, RC6 has the highest throughput thus delaying the process which can especially be frustrating for larger input sizes. Moreover, since Python was used as the language of choice, additional changes can be made by the user to meet the required specifications. 4. FUTURE SCOPE This idea and approach that we have implemented do not end here. There can be a future scope for development and we can extend this particularprojectinto multipleplatforms. Particularly, we can incorporate additional algorithms into the mix to make it more appealing. One other source of improvement is expanding the idea into cloud based systems so that applications and web sites can make use of the algorithm at hand to secure their way of communication between their users and themselves. Especially, since the data that is stored on clouds or any other remote storages is sensitive, an added level ofsecurity never goes in vain. 5. APPENDIX 1. SHOWING THE ACTUAL APPROACH USED IN PYTHON: key = input("enter key ") l=len(key) if l<16: r=16 keyA = key.ljust(r, '0') keyA=keyA.encode() string = input("enter plain text ") l=len(string) aes_str, des_str = string[:l//2], string[l//2:] final_encrypt= aes_en + des_en 6. SHOWING THE APPRAOCH TO CALCULATE THE TIME Using a Python time library to measure the time taken for executing Import time # starting time start =time.time() end= time.time() print (end-start)
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 369 7. REFERENCES [1] Punam V Maitri, Aruna Verma, Secure File Storage in Cloud Computing Using Hybrid Cryprographic algorithm, IEEE, WiSPNET-2016. [2] V S Mahalle, A.K. Shahade, “Enhancing the Data Security in Cloud by Implementing Hybrid (RSA & AES) Encryption Algorithm, IEEE, INPAC, pp 146-149,Oct. 2014. [3] S. Hesham and Klaus Hofmann, “High Throughput Architecture for the Advanced Encryption Standard Algorithm” IEEE, International Symposium on Design and Diagnostics of Electronic Circuits & Systems, pages 167170,April 2014.
Download now