Developing and Evaluation of New Hybrid Encryption Algorithms

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 13, Issue 1

Abstract

Wireless Sensor networks consist of hundreds or thousands of low cost, low power and self-organizing nodes which are highly distributed. As wireless sensor networks continue to grow, so does the need for effective security mechanisms because sensor networks may interact with sensitive data. Encryption algorithms play good roles in information security systems (ISS). Those algorithms consume a significant amount of computing resources such as battery power. Wireless Sensor networks are powered by a battery which is a very limited resource. At present, various types of cryptographic algorithms provide high security to information on networks, but there are also has some drawbacks.  The present asymmetric encryption methods and symmetric encryption methods can offer the security levels but with many limitations. For instance key maintenance is a great problem faced in symmetric encryption methods and less security level is the problem of asymmetric encryption methods even though key maintenance is easy. To improve the strength of these algorithms, we propose a new hybrid cryptographic algorithm in this paper. The algorithm is designed using combination of two symmetric cryptographic techniques and two Asymmetric cryptographic techniques. This protocol provides three cryptographic primitives, integrity, confidentiality and authentication. It is a hybrid encryption method where elliptical curve cryptography (ECC) and advanced encryption (AES) are combined to provide node encryption. RSA algorithm and Blowfish are combined to provide authentication and (MD5) for integrity. The results show that the proposed hybrid cryptographic algorithm gives better performance in terms of computation time and the size of cipher text.This paper tries to present a fair comparison between the new protocols with four existing different hybrid protocols according to power consumption. A comparison has been conducted for those protocols at different settings for each protocol such as different sizes of data blocks, and finally encryption/decryption speed. Experimental results are given to demonstrate the effectiveness of each algorithm.

Authors and Affiliations

DiaaSalama AbdElminaam, Hatem M. Abdul Kader, Mohie M. Hadhoud, Salah M El-Sayed

Keywords

Related Articles

Design and Implementation of RSA Algorithm using FPGA

RSA cryptographic algorithm used to encrypt and decrypt the messages to send it over the secure transmission channel like internet.  The RSA algorithm is a secure, high quality, public key algorithm. In this paper, a ne...

Finite State Testing and Syntax Testing

This paper is concerned with the testing of the software which is being developed in a structured way. The advantages which accrue from a well-structured or modular organization of software depend upon an ability to inde...

Expert System Approach for CAD/CAM Integration & Optimization based on International Standard (STEP) and Computer based Concurrent Engineering

This paper addresses the concept of the Expert system approach for CASD/CAM integration and optimization of product design and manufacturing in computer base concurrent engineering environment. The Expert system links wi...

Analyzing patients' EEG energy for brain death determination based on Dynamic 2T-EMD

EEG (electroencephalography) energy is an important evaluation indicator in brain death determination based on EEG analysis. In related works, the static EEG energy value can be discovered using EMD (empirical mode decom...

A Heuristic Algorithm that Finds the Minimum and the Maximum of the Outputs of a Fuzzy Socio-political Model of E-democracy

Most of the techniques of nonlinear optimization assume the existence of a differential function, but there also exist other approaches. In this paper, we propose a non-differential algorithm that solves the problem of m...

Download PDF file
  • EP ID EP650466
  • DOI 10.24297/ijct.v13i1.2926
  • Views 103
  • Downloads 0

How To Cite

DiaaSalama AbdElminaam, Hatem M. Abdul Kader, Mohie M. Hadhoud, Salah M El-Sayed (2014). Developing and Evaluation of New Hybrid Encryption Algorithms. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 13(1), 4038-4052. https://europub.co.uk/articles/-A-650466