CFP last date
21 October 2024
Reseach Article

A Hybrid Cryptography Technique for Improving Network Security

by V. Kapoor, Rahul Yadav
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 141 - Number 11
Year of Publication: 2016
Authors: V. Kapoor, Rahul Yadav
10.5120/ijca2016909863

V. Kapoor, Rahul Yadav . A Hybrid Cryptography Technique for Improving Network Security. International Journal of Computer Applications. 141, 11 ( May 2016), 25-30. DOI=10.5120/ijca2016909863

@article{ 10.5120/ijca2016909863,
author = { V. Kapoor, Rahul Yadav },
title = { A Hybrid Cryptography Technique for Improving Network Security },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 141 },
number = { 11 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 25-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume141/number11/24830-2016909863/ },
doi = { 10.5120/ijca2016909863 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:43:16.889523+05:30
%A V. Kapoor
%A Rahul Yadav
%T A Hybrid Cryptography Technique for Improving Network Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 141
%N 11
%P 25-30
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The security of network and the network data is primary aspect of the network providers and service providers. Therefore during the data exchange the cryptographic techniques are utilized for securing the data during various communications. On the other hand the traditional cryptographic techniques are well known and the attackers are known about the solution. Therefore new kind of cryptographic technique is required which improve the security and complexity of data cipher. In this paper a hybrid cryptographic technique for improving data security during network transmission is proposed and their implementation and results are reported. The proposed secure cryptographic technique promises to provide the highly secure cipher generation technique using the RSA, DES and SHA1 technique. The implementation of the proposed technique is provided using the JAVA technology and their performance in terms of space and time complexity is estimated and compared with the traditional RSA cryptography. The proposed cryptographic technique found the efficient and improved cipher text during comparative performance analysis.

References
  1. Dr. Vivek Kapoor, Rahul Yadav, “A Hybrid Cryptography Technique to Support Cyber Security Infrastructure”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 4 Issue 11, November 2015
  2. V Gampala, S Inuganti, S Muppidi, “Data Security in Cloud Computing with Elliptic Curve Cryptography”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231- 2307, Volume-2, Issue-3, July 2012
  3. Akanksha Samadhiya, Trapti ozha, “Secure Mobile Cloud Storage and Data Transmission”, Int.J.Computer Technology & Applications,Vol 6 (4),567-570
  4. Seyed Mohammad Seyedzadeh, Sattar Mirzakuchaki, “A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map”, & 2011 Elsevier B.V. All rights reserved.
  5. Sun-Jung Kim, Young Jun Yoo, Jungmin So, Jeong Gun Lee, Jin Kim and Young Woong Ko, “Design and Implementation of Binary File Similarity Evaluation System”, International Journal of Multimedia and Ubiquitous Engineering Vol.9, No.1 (2014), pp.1-10
  6. Mykola Karpinskyy, Yaroslav Kinakh, “RELIABILITY OF RSA ALGORITHM AND ITS COMPUTATIONAL COMPLEXITY”, Computing, 2003, Vol. 2, Issue 3, 119-122
  7. Ashita Sharma, Navroz Kaur, “Implementation of DES (Data Encryption Standard) Algorithm”, International Journal for Multi Disciplinary Engineering and Business Management, Volume-2, Issue-3, July-September, 2014
  8. Hybrid Compression Encryption Technique for Securing SMS Tarek M Mahmoud, Bahgat A. Abdel-latef, Awny A. Ahmed & Ahmed M Mahfouz
  9. HexiMcEliece Public Key Cryptosystem K. Ilanthenral∗ and K. S. Easwarakumar Department of Computer Science and Engineering, Anna University, Chennai 600 025, India
  10. Crypto-Compression System: An Integrated Approach using Stream Cipher Cryptography and Entropy Encoding International Journal of Computer Applications (0975 – 8887) Volume 116 – No. 21, April 2015 34.
  11. Sonal Modh, DR. M. K. Rawat, “Mobile Data Security using TPA Initiated Token Based Cryptography”, IJSETR, Vol.05,Issue.06, March-2016, Pages:1140-1146
Index Terms

Computer Science
Information Sciences

Keywords

Data security Network transmission Cryptographic security Data exchange Hybrid cryptography RSA DES and SHA1.