Developing and Evaluation of New Hybrid Encryption Algorithms
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 1
Abstract
Wireless Sensor networks consist of hundreds or thousands of low cost, low power and self-organizing nodes which are highly distributed. As wireless sensor networks continue to grow, so does the need for effective security mechanisms because sensor networks may interact with sensitive data. Encryption algorithms play good roles in information security systems (ISS). Those algorithms consume a significant amount of computing resources such as battery power. Wireless Sensor networks are powered by a battery which is a very limited resource. At present, various types of cryptographic algorithms provide high security to information on networks, but there are also has some drawbacks. The present asymmetric encryption methods and symmetric encryption methods can offer the security levels but with many limitations. For instance key maintenance is a great problem faced in symmetric encryption methods and less security level is the problem of asymmetric encryption methods even though key maintenance is easy. To improve the strength of these algorithms, we propose a new hybrid cryptographic algorithm in this paper. The algorithm is designed using combination of two symmetric cryptographic techniques and two Asymmetric cryptographic techniques. This protocol provides three cryptographic primitives, integrity, confidentiality and authentication. It is a hybrid encryption method where elliptical curve cryptography (ECC) and advanced encryption (AES) are combined to provide node encryption. RSA algorithm and Blowfish are combined to provide authentication and (MD5) for integrity. The results show that the proposed hybrid cryptographic algorithm gives better performance in terms of computation time and the size of cipher text.This paper tries to present a fair comparison between the new protocols with four existing different hybrid protocols according to power consumption. A comparison has been conducted for those protocols at different settings for each protocol such as different sizes of data blocks, and finally encryption/decryption speed. Experimental results are given to demonstrate the effectiveness of each algorithm.
Authors and Affiliations
DiaaSalama AbdElminaam, Hatem M. Abdul Kader, Mohie M. Hadhoud, Salah M El-Sayed
EEG Analysis for Differentiating between Brain Death and Coma in Humans
To have an accuracy and fast diagnosis of brain death is very urgent for patients especially for distinguishing brain death from coma circumstance. Electroencephalogram is a method of invasive recording brain signals wit...
Logical Database Design
The design, development and implementation of every database are mainly to serve as an information hub for organisations. The database is a key factor to the success of most organisations. The process of designing a data...
Defending Against Denial of Sleep Attack in Wireless Sensor Network
A wireless sensor network is a wireless network organized with a large number of sensor nodes with specialized sensors that can monitor various physical attributes such as temperature, pressure, vibration, and sound. Sen...
Continuous & Piecewise Convex Behavior Of Maximum Values Of Some Generalized Measures Of Fuzzy Cross Entropy.
Consider two fuzzy sets A and B with same supporting points and the corresponding fuzzy vectors and respectively, where each can vary subject to the total fuzziness and each is known to us .In this paper, a compreh...
SIMULATION AND PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FSR AND ZRP IN VEHICULAR AD-HOC NETWORK (VANET)
Vehicular Ad-Hoc Network (VANET) is a wireless routing network which used ad hoc network system as the basis. VANET was formed to give solution to the unclear network infrastructure or frequently changing network topolog...