Hybrid Encryption Model of Symmetric and Asymmetric Cryptography with AES and Elgamal Encryption Algorithms

Authors: E.Jincharadze
Affiliation: Georgian Technical University, Tbilisi, Georgia

Category:

Keywords: assymmmetric cryptography, cryptography, Elgamal, encryption
ABSTRACT. Cryptography is the science or study of the techniques of secret writing, especially code and cipher systems, methods, and the like. Cryptography must ensure the high-level security of transferring and saving data. There are two types of cryptography algorithms such as symmetric key cryptography and asymmetric key cryptography. Nowadays there are various types of cryptographic algorithms which provides high security of information, but they also have some weak points too. To improve weakeness of these algorithms, in this paper we propose a new hybrid cryptographic algorithm model. This algorithm is designed using combination of two cryptographic algorithms AES and Elgamal. Was done analyses and comparision of the performance of proposed algorithms by following parameters encryption time, decryption time and system requirements. For this cryptography algorithms were created program on Java in NetBeans IDE. Implementation and performance analysis of this proposed models were done by Java. As a final result shows the hybrid model has better performance than AES and Elgamal systems.

References:

Introduction to Cryptography, Second Edition, Johhanes A. Buhman, 2000
Handbook of Applied Cryptography, Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanston, Massachusetts Institute of Technology, June 1996
Physical Security of Cryptographic Algorithm Implementations, Ilya KIZHVATOV, L’UNIVERSITÉ DU LUXEMBOURG, 2009
The official Advanced Encryption Standard" (PDF). Computer Security Resource Center. National Institute of Standards and Technology. Retrieved 26 March 2015.
Introduction to Modern Cryptography by Phillip Rogaway and Mihir Bellare, 2005
"An Introduction to Modern Cryptosystems". Andrew Zwicke, 2003
"Quantum cryptography: An emerging technology in network security". - Sharbaf, M.S. IEEE International Conference on Technologies for Homeland Security . 2011
Adleman, Leonard M.; Rothemund, Paul W.K.; Roweis, Sam; Winfree, Erik (June 10–12, 1996). On Applying Molecular Computation To The Data Encryption Standard. Proceedings of the Second Annual Meeting on DNA Based Computers. Princeton University
Cramer, Ronald; Shoup, Victor (2004). "Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack"
Hofheinz, Dennis; Kiltz, Eike (2007). "Secure Hybrid Encryption from Weakened Key Encapsulation"
Taher ElGamal (1985). «A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms