Enhanced Security Algorithm using Hybrid Encryption and ECC
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: The AES and ECC are the best two algorithms of symmetric encryption technology and asymmetric encryption technology. The paper presents a hybrid model which uses a combination of two symmetric algorithms enhanced AES and Blowfish for data confidentiality, Message Digest-5 for data integrity, Elliptic Curve Diffie Hellman algorithm-ECDHA for key exchange and Elliptic Curve Digital signature algorithm-ECDSA is used for digital signature. AES is enhanced by modifying the S-boxes columns, and then combination of enhanced AES and blowfish is used for data confidentiality. Performance of this system is evaluated on different configurations on the basis of encryption/decryption time, throughput and memory usage for different data formats like text file, image file, audio file and video file.
Authors and Affiliations
A. P Shaikh , V. kaul
A Deterministic Heterogeneous Clustering Algorithm
Abstract: The energy supply of nodes will be limited strictly in the wireless sensor networks (WSN). Manyalgorithms propose to increase the efficiency of Sensor Networks. Many Clustering protocols have beenproposed to im...
A Rapid and Reliable Receiver for Warning Delivery in Vehicular Ad-Hoc Networks
Abstract: Vehicular ad-hoc networks (VANETs) are known for highly mobile and frequently disconnected characteristics. To improve safety, a warning message in VANETs should be delivered both reliably and urgently.In the e...
Novel Hybrid k-D-Apriori Algorithm for Web Usage Mining
Abstract: The Web usage mining is a branch of web mining in which by clustering the datasets, frequently accessed patterns can be obtained for betterment of social portals, websites. The divisive analysis is one of the t...
W-LEACH Decentralized: Weighted LEACH with a Decentralized way
Abstract: A mobile WSN is considered as a collection of wireless mobile nodes and a base station forming an ad-hoc network. This type of network is used in various areas; such as underwater and underground. Each no...
IPv6: Threats Posed By Multicast Packets, Extension Headers and Their Counter Measures
Security issues concerning the spreading Internet Protocol version 6 (IPv6) is one of the major issues in the world of networking today. Since it is not the default network protocol deployed nowadays (but s...