scholarly journals A Hybrid Encryption and Decryption Algorithm using Caesar and Vigenere Cipher

2021 ◽  
Vol 1997 (1) ◽  
pp. 012021
Author(s):  
Camille Merlin S. Tan ◽  
Gerald P. Arada ◽  
Alexander C. Abad ◽  
Elmer R. Magsino
Author(s):  
Keith M. Martin

In this chapter, we introduce public-key encryption. We first consider the motivation behind the concept of public-key cryptography and introduce the hard problems on which popular public-key encryption schemes are based. We then discuss two of the best-known public-key cryptosystems, RSA and ElGamal. For each of these public-key cryptosystems, we discuss how to set up key pairs and perform basic encryption and decryption. We also identify the basis for security for each of these cryptosystems. We then compare RSA, ElGamal, and elliptic-curve variants of ElGamal from the perspectives of performance and security. Finally, we look at how public-key encryption is used in practice, focusing on the popular use of hybrid encryption.


2018 ◽  
Vol 7 (2.6) ◽  
pp. 236 ◽  
Author(s):  
Tenzin Kunchok ◽  
Prof Kirubanand V. B

Internet of Things(IOT) is the rising innovation without bounds is required to associate billions of devices. IoT is the future where many low power resources and constrained devices are connected by means of the internet for communication, compute process and take actions in the communication network. The increased number of communication is relied upon to produce heaps of information and the security of information can be a threat resulting a secure solution for communication is necessitates among heterogenous devices. Focus of the work is to provide confidentiality, authentication and integrity of data in transit between IoT edge devices and back-end systems. This paper proposes a lightweight hybrid encryption system using ECDH key exchange mechanism for generating keys and establishing connection, digital signature for authentication, thereafter AES algorithm for encryption and decryption of user data file.  The proposed combination is referred to as “three way secured data encryption mechanism” which interpret all the 3 protection schemes of authentication, info security and verification with the characteristics of lower calculation cost and faster speed makes it robust for hackers to crack the security system, thereby protective data in transmission.   


Author(s):  
Samar Zaineldeen ◽  
Abdelrahim Ate

Cloud computing is a model of sophisticated computing which has a strong effect on data innovation. Cloud computing offers remote access to shared computerized assets in the stored cloud. Operationally cloud servers utilize Web services that give enormus advantage to the user in a variety of applications such as banking and finance, storage, social networking and e-mail. Cloud computing accomplishes many of the features interrelated to elasticity, ease of utility, efficiency and performance with low cost.  There are a number of potential concerns related to security and privacy since the requirement to protect cloud computing expanded, the encryption algorithms play the key part in data and information security systems, on side these algorithms consume a considerable quantity of computing resource.This paper,presenting  a new hybrid encryption algorithm emphasising  on AES and Enhanced Homomorphic Cryptosystem (EHC) as a hybrid encryption  to guarantee the secure exchange of data between the user and the cloud server, and compression study for two proficient homomorphic encryption techniques for encoding Data Encryption Standard (DES), Advance Encryption Stander (AES).With The proposed techniques an evaluation has been conducted for those encryption algorithms at diverse file sizes of data, to evaluate time taking for encryption and decryption, throughput, memory consumption and power consumption. The major finding was thats the proposed method has the extremity throughput; memory consumption and our proposed work took advantage of the least time taken in sec for encryption and decryption.


2015 ◽  
Vol 52 (2) ◽  
pp. 221-232
Author(s):  
Pál Dömösi ◽  
Géza Horváth

In this paper we introduce a novel block cipher based on the composition of abstract finite automata and Latin cubes. For information encryption and decryption the apparatus uses the same secret keys, which consist of key-automata based on composition of abstract finite automata such that the transition matrices of the component automata form Latin cubes. The aim of the paper is to show the essence of our algorithms not only for specialists working in compositions of abstract automata but also for all researchers interested in cryptosystems. Therefore, automata theoretical background of our results is not emphasized. The introduced cryptosystem is important also from a theoretical point of view, because it is the first fully functioning block cipher based on automata network.


Sign in / Sign up

Export Citation Format

Share Document