[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card

Published: 01 January 2022 Publication History

Abstract

In order to effectively solve the increasingly prominent network security problems, cryptographic algorithm is the key factor affecting the effectiveness of IPSec VPN encryption. Therefore, this paper mainly studies cryptographic algorithms and puts forward the following solutions: briefly analyze the concept and function of IPSec VPN, as well as the basic theoretical knowledge of IPSec Security Protocol and cryptography, and analyze the traditional cryptography, modern cryptography, symmetric cryptographic algorithms and asymmetric algorithms, and their security. At the same time, the executable and security performances of AES and DES algorithms are compared and analyzed. This paper studies the elliptic curve encryption algorithm ECC, expounds the mathematical basis of realizing the algorithm, and compares and analyzes the security performance and execution efficiency of ECC. Based on the above two algorithms, a hybrid encryption algorithm is proposed, and the realization mechanism of the hybrid encryption algorithm is studied and discussed. The hybrid encryption algorithm combines the advantages of ECC and AES. The algorithm selects 128-bit AES and 256-bit ECC. In order to better cover up plaintext C, AES is used to encrypt information. While enhancing security, speed is also considered. The improved encryption, decryption, and signature authentication algorithms are relatively safe and fast schemes. ECC algorithm is improved, and on this basis, ECC algorithm and AES algorithm are combined. Moreover, HMAC message authentication algorithm is added, and the performance of the improved algorithm is significantly improved.

References

[1]
G. D. Belga, “Hybrid encryption algorithm towards secured instant messaging application,” International Journal of Advanced Trends in Computer Science and Engineering, vol. 9, no. 2, pp. 236–242, 2020.
[2]
M. Omid, F. Eshghi, and A. Zamani, “A hybrid encryption algorithm for security enhancement of wireless sensor networks: a supervisory approach to pipelines,” Computer Modeling in Engineering and Sciences, vol. 122, no. 1, pp. 323–349, 2020.
[3]
A. Vahi and S. J. Jassbi, “Separ: A new lightweight hybrid encryption algorithm with a novel design approach for IoT,” Wireless Personal Communications, vol. 114, no. 10, pp. 1–32, 2020.
[4]
D. Rachmawati, A. Sharif, and Ericko, “Hybrid cryptosystem combination algorithm of hill cipher 3 × 3 and Elgamal to secure instant messaging for Android,” Journal of Physics: Conference Series, vol. 1235, no. 1, 2019.
[5]
M. Zarebnia, H. Pakmanesh, and R. Parvaz, “A fast multiple-image encryption algorithm based on hybrid chaotic systems for gray scale images,” Optik, vol. 179, pp. 761–773, 2019.
[6]
Z. Cao and O. Markowitch, “Comment on “circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing”,” IEEE Transactions on Parallel and Distributed Systems, vol. 32, no. 2, pp. 392–393, 2021.
[7]
Y. Tang, “Security design and application of internet of things based on asymmetric encryption algorithm and neural network for Covid-19,” Journal of Intelligent and Fuzzy Systems, vol. 39, no. 6, pp. 8703–8711, 2020.
[8]
P. L. Lekshmy and M. Abdul Rahiman, “Hybrid approach to speed-up the privacy preserving kernel k-means clustering and its application in social distributed environment,” Journal of Network and Systems Management, vol. 28, no. 2, pp. 398–422, 2020.
[9]
Ahmadrufa’i, A. T. Balarabe, I. Muazu, and M. Sirajo, “Formulation of an improved hybrid cipher system,” International Journal of Innovative Research in Science Engineering and Technology, vol. 5, no. 12, pp. 605–611, 2020.
[10]
K. Tamilarasi and A. Jawahar, “Medical data security for healthcare applications using hybrid lightweight encryption and swarm optimization algorithm,” Wireless Personal Communications, vol. 114, no. 3, pp. 1865–1886, 2020.
[11]
L. B. Rivera, J. A. Bay, E. R. Arboleda, M. R. Perea, and R. M. Dellosa, “Hybrid cryptosystem using RSA, DSA, Elgamal, and AES,” International Journal of Scientific & Technology Research, vol. 8, no. 10, pp. 1777–1781, 2019.
[12]
J. P. Magsino, E. R. Arboleda, and R. R. Corpuz, “Enhancing security of Elgamal encryption scheme using RSA and Chaos algorithm for e- commerce application,” International Journal of Scientific & Technology Research, vol. 8, no. 11, pp. 1343–1347, 2019.
[13]
O. Beckham, G. Oldman, J. Karrie, and D. Craig, “Techniques used to formulate confidential data by means of fragmentation and hybrid encryption,” International Research Journal of Management, IT and Social Sciences, vol. 6, no. 6, pp. 68–86, 2019.
[14]
X. Wang, Y. Su, H. Zhang, and C. Zou, “A new hybrid image encryption algorithm based on Gray code transformation and snake-like diffusion,” The Visual Computer, vol. 2021, pp. 1–22, 2021.
[15]
I. T. Almalkawi, R. Halloush, A. Alsarhan, A. Al-Dubai, and J. N. Al-Karaki, “A lightweight and efficient digital image encryption using hybrid chaotic systems for wireless network applications,” Journal of Information Security and Applications, vol. 49, pp. 102384.1–102384.13, 2019.
[16]
S. Khan, L. Han, H. Lu, K. K. Butt, and N. U. Khan, “A new hybrid image encryption algorithm based on 2d-ca, fsm-dna rule generator, and fsbi,” IEEE Access, vol. 2019, no. 99, p. 1, 2019.
[17]
A. Babbar, C. Prakash, S. Singh, M. K. Gupta, M. Mia, and C. I. Pruncu, “Application of hybrid nature-inspired algorithm: single and bi-objective constrained optimization of magnetic abrasive finishing process parameters,” Journal of Materials Research and Technology, vol. 9, no. 4, pp. 7961–7974, 2020.
[18]
H. D. J. R. H. Utami, R. Arifudin, and A. Alamsyah, “Security login system on mobile application with implementation of advanced encryption standard (AES) using 3 keys variation 128-bit, 192-bit, and 256-bit,” Scientific Journal of Informatics, vol. 6, no. 1, pp. 34–44, 2019.
[19]
R. F. S. L. Et.al, “Image encryption using rk-rsa algorithm in aadhaar card,” Turkish Journal of Computer and Mathematics Education, vol. 12, no. 3, pp. 4683–4693, 2021.
[20]
G. Shrividya, “Application of hybrid genetic algorithm for successful cs-mri reconstruction,” Journal of Advanced Research in Dynamical and Control Systems, vol. 12, no. 3, pp. 408–414, 2020.
[21]
J. Jayakumar, B. Nagaraj, S. Chacko, and P. Ajay, “Conceptual implementation of artificial intelligent based E-mobility controller in smart city environment,” Wireless Communications and Mobile Computing, vol. 2021, 8 pages, 2021.
[22]
M. Bradha, N. Balakrishnan, S. Suvi, T. Arumanayagam, M. Rekha, P. Vivek, P. Ajay, V. Sangeetha, and A. Steephen, “Experimental, computational analysis of Butein and Lanceoletin for natural dye-sensitized solar cells and stabilizing efficiency by IoT,” Environment, Development and Sustainability, vol. 24, no. 6, pp. 8807–8822, 2021.
[23]
N. Yuvaraj, K. Srihari, G. Dhiman, K. Somasundaram, A. Sharma, S. Rajeskannan, M. Soni, G. S. Gaba, M. A. AlZain, and M. Masud, “Nature-inspired-based approach for automated cyberbullying classification on multimedia social networking,” Mathematical Problems in Engineering, vol. 2021, 12 pages, 2021.
[24]
R. Huang, S. Zhang, W. Zhang, and X. Yang, “Progress of zinc oxide‐based nanocomposites in the textile industry,” IET Collaborative Intelligent Manufacturing, vol. 3, no. 3, pp. 281–289, 2021.
[25]
D. Selva, B. Nagaraj, D. Pelusi, R. Arunkumar, and A. Nair, “Intelligent network intrusion prevention feature collection and classification algorithms,” Algorithms, vol. 14, no. 8, p. 224, 2021.
[26]
Q. W. A. Et.al, “Energetic data security management scheme using hybrid encryption algorithm over cloud environment,” Turkish Journal of Computer and Mathematics Education, vol. 12, no. 6, pp. 201–208, 2021.
[27]
X. Liu, J. Liu, J. Chen, F. Zhong, and C. Ma, “Study on treatment of printing and dyeing waste gas in the atmosphere with Ce-Mn/GF catalyst,” Arabian Journal of sciences, vol. 14, no. 8, pp. 1–6, 2021.
[28]
A. Hafsa, A. Sghaier, J. Malek, and M. Machhout, “Image encryption method based on improved ECC and modified aes algorithm,” Multimedia Tools and Applications, vol. 2021, no. 2, pp. 1–33, 2021.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Security and Communication Networks
Security and Communication Networks  Volume 2022, Issue
2022
13851 pages
ISSN:1939-0114
EISSN:1939-0122
Issue’s Table of Contents
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Publisher

John Wiley & Sons, Inc.

United States

Publication History

Published: 01 January 2022

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media