Call for Paper - January 2015 Edition
IJCA solicits original research papers for the January 2015 Edition. Last date of manuscript submission is December 20, 2014. Read More

Bluetooth Communication using Hybrid Encryption Algorithm based on AES and RSA

Print
PDF
International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 71 - Number 22
Year of Publication: 2013
Authors:
Komal Rege
Nikita Goenka
Pooja Bhutada
Sunil Mane
10.5120/12617-9061

Komal Rege, Nikita Goenka, Pooja Bhutada and Sunil Mane. Article: Bluetooth Communication using Hybrid Encryption Algorithm based on AES and RSA. International Journal of Computer Applications 71(22):10-13, June 2013. Full text available. BibTeX

@article{key:article,
	author = {Komal Rege and Nikita Goenka and Pooja Bhutada and Sunil Mane},
	title = {Article: Bluetooth Communication using Hybrid Encryption Algorithm based on AES and RSA},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {71},
	number = {22},
	pages = {10-13},
	month = {June},
	note = {Full text available}
}

Abstract

A hybrid encryption algorithm based on AES and RSA is proposed to enhance the security of data transmission in Bluetooth communication. E0 algorithm is currently used in transmission of data via Bluetooth between two or more devices. E0 is a 128-bit symmetric stream cipher used in the bluetooth protocol. Several attacks and attempts at cryptanalysis of E0 and the Bluetooth protocol have shown that it may be broken in 264 operations [4]. In the proposed hybrid encryption algorithm, instead of the E0 encryption, AES algorithm, known for of its higher e?ciency in block encryption is used for data transmission and RSA algorithm is used for the encryption of the AES key due to its key management advantages. Thus the dual protection using AES and RSA algorithm will make the data transmission using Bluetooth more secure. Moreover, the hybrid encryption algorithm provides a very easy and convenient technique for the encryption of transmitted data. The confidentiality of the hybrid encryption algorithm is also discussed.

References

  • Gustavo Padovan, "Bluetooth Security", July 4, 2011
  • MR. GURJEEVAN SINGH; MR. ASHWANI SINGLA; MR. K S SANDHA, "CRYPTOGRAPHY ALGO-RITHM COMPARISON FOR SECURITY ENHANCE-MENT IN WIRELESS INTRUSION DETECTION SYSTEM", International Journal of Multidisciplinary Research, Vol. 1 Issue 4, August 2011.
  • Sudhir Nagwanshi, Akhilesh A. Waoo, P. S. Patheja, San-jay Sharma, "Performance Analysis of Triple DES-Tiger-RSA Vs DES-RSA algorithms for Bluetooth Security Systems", IOSR Journal of Engineering, July 2012.
  • Wuling Ren and Zhiqian Miao, "A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication", Second International Conference on Modelling, Simulation and Visualization Methods, 2010.
  • Ma Chui and Cao Pitying, "Research of Bluetooth Security Manager", Dec 14, 2003.
  • Cryptanalysis of Bluetooth key stream Generator two-level E0. Yale and Serge Vaudenay
  • WUxing-Hui ZHOU Yu-Ping. "Analysis of data encryption algorithm based on WEB"
  • Cracking the Bluetooth PIN, Yaniv Shaked and Avishai Wool
  • Man Young Rhee. Network Security Encryption Principle, algorithm and Protocol [M]. Peking: Tsinghua University Pres, 2007.