Enhanced Security Algorithm using Hybrid Encryption and ECC
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: The AES and ECC are the best two algorithms of symmetric encryption technology and asymmetric encryption technology. The paper presents a hybrid model which uses a combination of two symmetric algorithms enhanced AES and Blowfish for data confidentiality, Message Digest-5 for data integrity, Elliptic Curve Diffie Hellman algorithm-ECDHA for key exchange and Elliptic Curve Digital signature algorithm-ECDSA is used for digital signature. AES is enhanced by modifying the S-boxes columns, and then combination of enhanced AES and blowfish is used for data confidentiality. Performance of this system is evaluated on different configurations on the basis of encryption/decryption time, throughput and memory usage for different data formats like text file, image file, audio file and video file.
Authors and Affiliations
A. P Shaikh , V. kaul
Research on Strongly Unforgeable Ring Signature Scheme Based on ID
Abstract : A ring signature system is strongly unforgeable if the ring signature is existential unforgeable and, given ring signatures on some message m, the adversary can not produce a new ring signature on m. Str...
BEST-1: A Light Weight Block Cipher
Abstract: The demand for applications involving Wireless Sensor Network (WSN) or RFID systems is increasing. The sensor in a WSN and RFID tag/reader in a RFID system are called resource constrained devices becaus...
Evaluating Total Cost of Ownership for University EnterpriseResource Planning: Case of Maseno University
Abstract: Higher learning institutions (HEI) are investing in IT to attain operational excellence. Organizationslooking to reduce technology costs typically look for ways to reduce the Total Cost of Ownership (TCO)...
Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Genetic Algorithm (GA)
An Ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any centralized administration or standard support services. MANET can be defined using unstable ne...
A Review on Concept Drift
Abstract: The concept changes in continuously evolving data streams are termed as concept drifts. It isrequired to address the problems caused due to concept drift and adapt according to the concept changes. Thisca...