Open Access   Article Go Back

Design and Implementation of Hybrid Cryptographic Model based on Data Authentication, Integrity and Privacy Schemes

S.M. Bhat1 , V. Kapoor2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 107-112, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.107112

Online published on Jun 30, 2018

Copyright © S.M. Bhat, V. Kapoor . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S.M. Bhat, V. Kapoor, “Design and Implementation of Hybrid Cryptographic Model based on Data Authentication, Integrity and Privacy Schemes,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.107-112, 2018.

MLA Style Citation: S.M. Bhat, V. Kapoor "Design and Implementation of Hybrid Cryptographic Model based on Data Authentication, Integrity and Privacy Schemes." International Journal of Computer Sciences and Engineering 6.6 (2018): 107-112.

APA Style Citation: S.M. Bhat, V. Kapoor, (2018). Design and Implementation of Hybrid Cryptographic Model based on Data Authentication, Integrity and Privacy Schemes. International Journal of Computer Sciences and Engineering, 6(6), 107-112.

BibTex Style Citation:
@article{Bhat_2018,
author = {S.M. Bhat, V. Kapoor},
title = {Design and Implementation of Hybrid Cryptographic Model based on Data Authentication, Integrity and Privacy Schemes},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {107-112},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2147},
doi = {https://doi.org/10.26438/ijcse/v6i6.107112}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.107112}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2147
TI - Design and Implementation of Hybrid Cryptographic Model based on Data Authentication, Integrity and Privacy Schemes
T2 - International Journal of Computer Sciences and Engineering
AU - S.M. Bhat, V. Kapoor
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 107-112
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
559 340 downloads 299 downloads
  
  
           

Abstract

Information security is the one of the ultimate generous apprehension in each turf of today’s period. In order to shelter the data broadcast over the ambiguous passage, formerly abundant cryptographic procedures are accomplished. But several limits present in the currently asymmetric and symmetric encryption procedures. The key transaction is a prime delinquent of symmetric cryptographic techniques though quicker in ciphering. Prolonged encryption interval is foremost delinquent convoyed with asymmetric methods but key transaction is simple & secure. Now, to incredulous these anomalies, in this paper a hybrid model is projected which agreements extreme security with decreased key maintenance problem and encryption time using unification of the together symmetric and asymmetric cryptographic procedures. To achieve the embryonic security services as authentication, integrity, and confidentiality in this hybrid model message digest, encryption methods and digital signature respectively is used and a digital envelope is also incorporated which involves all of this to transfer them confidently over the connection.

Key-Words / Index Term

Hybrid Cryptography, Information Security, Asymmetric cryptographic technique, Symmetric cryptographic technique, Digital signature, Digital envelope

References

[1] K. Kaur, Er. Seema “Hybrid Algorithm with DSA, RSA and MD5 Encryption Algorithm for wireless devices” International Journal of Engineering Research and Applications (IJERA) Vol. 2, Issue 5, pp.914-917 , Sept-Oct 2012.
[2] S. Sharma, V. Kapoor “A Novel Approach for Improving Security by Digital Signature and Image Steganography” International Journal of Computer Applications , Volume 171 – No. 8, August 2017.
[3] S. Subasree, N. K. Sakthivel “Design of New Security Protocol Using Hybrid Cryptographic Algorithm” IJRRAS 2 (2) February 2010.
[4] Dr. V. Kapoor, R. Yadav “A Hybrid Cryptography method to Support Cyber Security Infrastructure” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 4 Issue 11, November 2015.
[5] A.M.S. Rahma, R.N. Farhan, H. J. Mohammad “Hybrid Model For Securing E-Commerse Transaction” International Journal of Advances in Engineering & Technology, Vol. 1, Issue 5, pp. 14-20, Nov 2011.
[6] S.Deshmukh, Prof. R.Patil “Hybrid cryptography method using modified Diffie-Hellman and RSA” International Journal of Computer Science and Information Technologies, Vol. 5 (6) , 2014,.
[7] G. Mateescu, M. Vladescu “A Hybrid Approach of System Security for Medium and Small Enterprises: combining different Cryptography method” Federated Conference on Computer Science and Information Systems pp. 659–662, 2013.
[8] M. Gobi, Dr. K. Vivekanandan “A New Digital Envelope Approach for Secure Electronic Medical Records” International Journal of Computer Science and Network Security, VOL.9 No.1, January 2009.
[9] Md. G. Rashed, S. Ullah “ Secured message data transactions with a Digital Envelope (DE) - High level cryptographic method” International Conference on Engineering Research, Innovation and Education 2013, Bangladesh, 11 ̶ 13 January 2013.
[10] R. Ganesan, M. Gobi, K. Vivekanandan “A Novel Digital Envelope Approach for Secure E-Commerce Channel”. International Journal of Network Security, Vol.11, No.3, PP.121–127, Nov. 2010.
[11] L.M. Bottasso “A public-key cryptography tool for personal use: A true-world implementation of ECC for secure file exchange”. E-Business and Telecommunications (ICETE), 12th International Joint Conference on 2016, July 2015.
[12] F. Li, M. Shirase, T. Takagi “Identity-Based Hybrid Signcryption” Availability, Reliability and Security, 2009. ARES `09. International Conference on March 2009.