Enhanced Security Algorithm using Hybrid Encryption and ECC
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: The AES and ECC are the best two algorithms of symmetric encryption technology and asymmetric encryption technology. The paper presents a hybrid model which uses a combination of two symmetric algorithms enhanced AES and Blowfish for data confidentiality, Message Digest-5 for data integrity, Elliptic Curve Diffie Hellman algorithm-ECDHA for key exchange and Elliptic Curve Digital signature algorithm-ECDSA is used for digital signature. AES is enhanced by modifying the S-boxes columns, and then combination of enhanced AES and blowfish is used for data confidentiality. Performance of this system is evaluated on different configurations on the basis of encryption/decryption time, throughput and memory usage for different data formats like text file, image file, audio file and video file.
Authors and Affiliations
A. P Shaikh , V. kaul
Fuzzy Inference Rule Generation Using Genetic AlgorithmVariant
Abstract: In essence of fuzzy inference system (FIS) for classification, Genetic algorithm (GA) which is anoptimal searching technique is used for generation rules in the proposed work. This paper develops an FIS withrul...
A Trust Based Replica Detection System for Node Replication in Mobile Sensor Networks
Abstract: Nowadays, Mobile Wireless Sensor Networks (MWSN) has become most popular and is used to solve challenging problems as industrial sensing and environmental monitoring. MWSN are always ready to be attack by...
Design and implementation of massive MYSQL data intelligent export system to excel by using Apache –POI libraries
Abstract: To export nearly 1,0000 attribute from database to excel of 10-20 column information of students and papers of database format into the target Excel sheet, we developed the intelligent export system which...
A Hybrid Approach for Performance Enhancement of VANETusing CSMA-MACA: a Review
Abstract: A wireless sensor network (WSNs) have increased gigantic consideration for their extensive varietyof utilization, for example, environmental checking, military consideration, medical services, fiascoadmin...
Load Balancing In Cloud Computing:A Review
As the IT industry is growing day by day, the need of computing and storage is increasing rapidly. The amount of data exchanged over the network is constantly increasing. Thus the process of this increasi...