IMPLEMENTING HYBRID CRYPTOGRAPHY ALGORITHM TO ENHANCE THE SECURITY IN CLOUD COMPUTING
S. Rajendira Kumar1 , A. Marimuthu2
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-10 , Page no. 62-68, Oct-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i10.6268
Online published on Oct 31, 2018
Copyright © S. Rajendira Kumar, A. Marimuthu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: S. Rajendira Kumar, A. Marimuthu, “IMPLEMENTING HYBRID CRYPTOGRAPHY ALGORITHM TO ENHANCE THE SECURITY IN CLOUD COMPUTING,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.10, pp.62-68, 2018.
MLA Style Citation: S. Rajendira Kumar, A. Marimuthu "IMPLEMENTING HYBRID CRYPTOGRAPHY ALGORITHM TO ENHANCE THE SECURITY IN CLOUD COMPUTING." International Journal of Computer Sciences and Engineering 6.10 (2018): 62-68.
APA Style Citation: S. Rajendira Kumar, A. Marimuthu, (2018). IMPLEMENTING HYBRID CRYPTOGRAPHY ALGORITHM TO ENHANCE THE SECURITY IN CLOUD COMPUTING. International Journal of Computer Sciences and Engineering, 6(10), 62-68.
BibTex Style Citation:
@article{Kumar_2018,
author = {S. Rajendira Kumar, A. Marimuthu},
title = {IMPLEMENTING HYBRID CRYPTOGRAPHY ALGORITHM TO ENHANCE THE SECURITY IN CLOUD COMPUTING},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2018},
volume = {6},
Issue = {10},
month = {10},
year = {2018},
issn = {2347-2693},
pages = {62-68},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2982},
doi = {https://doi.org/10.26438/ijcse/v6i10.6268}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i10.6268}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2982
TI - IMPLEMENTING HYBRID CRYPTOGRAPHY ALGORITHM TO ENHANCE THE SECURITY IN CLOUD COMPUTING
T2 - International Journal of Computer Sciences and Engineering
AU - S. Rajendira Kumar, A. Marimuthu
PY - 2018
DA - 2018/10/31
PB - IJCSE, Indore, INDIA
SP - 62-68
IS - 10
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
617 | 344 downloads | 274 downloads |
Abstract
Nowadays, both public and private sector organization have come to be increasingly dependent on Digital Statistics Processing. These Virtual data are going by means of an insecure channel from one location to any other location via networks and anyone can get that critical information without the knowledge of the sender. For protecting those crucial records, Cryptography plays a vital role in community protection. Many Cryptographic algorithms are applied by the Studies Community all around the world. Also they had some limitations and implemented for precise packages, Key size or Block size restricted to some minimum number of bits. This paper provides an implementation of Symmetric and Asymmetric Cryptography techniques and also it elaborates the Hybrid Cryptography techniques by fusing the Cryptographic algorithms. A comparison has been conducted for those Algorithms at different settings such as Sizes of data blocks, Throughput, Encryption Speed and Decryption speed. Finally, the Performance Metrics shows the better performance of the Hybrid Cryptographic Technique.
Key-Words / Index Term
Cryptography, Encryption, Decryption, AES, RSA
References
[1]. Kruti H. Patel, Shrikant S.Patel, "Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing", International Journal for Scientific Research & Development, Vol. 4, Iss. 1, 2016.
[2]. Amit Jain, Avinash Panwar, Divya Bhatnagar, "A Comparative Study of Symmetric Key Encryption Algorithms", International Journal of Advances in Engineering Research, Vol. 8, Iss. 2, 2014.
[3]. Vijay M, Sujatha R, "Intrusion Detection System to Detect Malicious Misbehavior Nodes in Manet", International Journal of Innovative Research in Computer and Communication Engineering, Vol.2, Iss. 1, 2014.
[4]. Vishnu Priya R, Yuvarani G, "Attribute based LZ4 Encryption with Efficient Signature Verifiable Decryption", International Journal of Science Technology and Management", Vol.5, Iss.03, 2016.
[5]. Prerna Mahajan, Abhishek Sachdeva, "A Study of Encryption Algorithms AES, DES and RSA for Security", Global Journal of Computer Science and Technology, Network, Vol. 13, Iss. 15, 2013.
[6]. Ashutosh Bhargave, Niranjan Jadhav, Apurva Joshi, Prachi Oke, Prof. Mr. S. R Lahane, "Digital Ordering System for Restaurant Using Android", International Journal of Scientific and Research Publications, Vol. 3, Iss.4, 2013.
[7]. Arpit Agrawal, gunjan Patankar, "Design of Hybrid Cryptography Algorithm for Secure Communication", International Research Journal of Engineering and Technology, Vol.3, Iss. 1, 2016.
[8]. Ritu Pahal, Vikas Kumar, "Efficient Implementation of AES", International Journal of Advanced Research in Computer Science and Software Engineering, Vol.3, Iss. 7, 2013.
[9]. Pavithra S, Ramadevi E, "Throughput Analysis of Symmetric Algorithms", International Journal of Advanced Networking and Applications", Vol. 4, Iss. 2, 2012.
[10]. Abraham Lemma, Maribel Tolentino, Gebremedhn Mehari, "Performance Analysis on the Implementation of Data Encryption Algorithms used in Network Security", International Journal of Computer and Information Technology, Vol. 4, Iss. 4, 2015.
[11]. S.Rajendirakumar, Dr.A.Marimuthu, “Cryptographic Algorithms used in Cloud Computing – An Analysis and Comparison”, International Journal for Research in Applied Science & Engineering Technology, Vol 6, Iss. 1, 2018.