SlideShare a Scribd company logo
Khushdeep Kaur, Er.Seema / International Journal of Engineering Research and
                 Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.914-917
      Hybrid Algorithm with DSA, RSA and MD5 Encryption
                 Algorithm for wireless devices.
                                    Khushdeep Kaur1, Er. Seema 2

                                  1.Research scholar, 2.Assistant professor
 Department of Computer Engineering, Yadavindra College of Engineering, Punjabi University Guru Kashi
                                      Campus, Talwandi Sabo

Abstract                                                 security and privacy of transmitted data. Therefore,
         Security is the one of the biggest              the methods of securing information are becoming
concern in different type of networks. Due to            a major issue, for which the encryption and
diversify nature of network, security breaching          decryption systems have been created.
became a common issue in different form of                Secure digital communications are necessary for
networks. Solutions for network security comes           web-based e-commerce, mandated privacy for
with concepts like cryptography in which                 medical information, etc.Many hardware and
distribution of keys have been done. If you want         software protocols have been implemented to
to send data to some other persons through               improve the security of information, but the only
network then if you truly want to keep the               true method of securing data is to encrypt it. . The
information secret, you need to agree on some            national and societal view of the role of encryption
sort of key that you and he can use to                   will be one of the defining issues for our culture in
encode/decode messages. But you don’t want to            the twenty-first century. Network security
keep using the same key, or you will make it             problems can be divided roughly into four
easier and easier for others to crack your               intertwined areas: Secrecy, Authentication,
cipher.                                                  Nonrepudiation and Integrity control. Secrecy has
        As Encryption became a vital tool for            to do with keeping information out of hands of
preventing the threats to data sharing and tool          unauthorized users. Authentication deals with
to preserve the data integrity so we are focusing        determining whom you are talking to before
on security enhancing by enhancing the level of          revealing sensitive information non repudiation
encryption in network. This study’s main goal is         deals with signature. Security in networking is
to reflect the importance of security in network         based on cryptography
and provide the better encryption technique for          Encryption is the vital part of information sharing
currently implemented encryption techniques.             so we have put our efforts into encryption area for
In our research we have proposed a                       RSA algorithm with DSA powered by MD5
combination of DSA, RSA and MD5as a hybrid               security so that we can make security harder by
link for wireless devices. We have also                  giving a hybrid algorithm.
considered case study for Manet networks so              2. Problem Formulation:
that we can suggest the applications of proposed                  As Encryption became a vital tool for
algorithm.                                               preventing the threats to data sharing and tool to
                                                         preserve the data integrity so we have focused on
Keywords: RSA, Digital Signatures, Message               security enhancement by enhancing the level of
Digest, Encryption.                                      encryption in network. For required research we
                                                         have worked on well-known encryption algorithms
1. INTRODUCTION                                          RSA and DSA with MD5. We have proposed the
The world is becoming more interconnected with           hybrid algorithm for RSA Algorithm with digital
the advent of the Internet and new networking            signatures powered by MD5 security with a small
technology. There is a large amount of personal,         case study of applications for this hybrid
commercial, military, and government information         algorithm.
on networking infrastructures worldwide. Network         3. Objectives of the Study
security is becoming of great importance because                 To study the issues of Security for
of intellectual property that can be easily acquired              Different networks. To Harden up the
through the internet.                                             Encryption Process for Network Security
The privacy requirements normally encountered in                 To study the already implemented
the traditional paper document world are                          algorithms for public key exchange in
increasingly expected in Internet transactions                    communication of data.
today. So with the rapid spread of digital
communication networks, there is great need for


                                                                                            914 | P a g e
Khushdeep Kaur, Er.Seema / International Journal of Engineering Research and
                  Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                    Vol. 2, Issue 5, September- October 2012, pp.914-917
        To provide a stable encryption, this can       encryption technique for currently implemented
         make good communication without                encryption techniques. It will explore how to tackle
         carrying about data integrity threat.          with the threats to data integrity and for safe
        To test the performance of mobile device       passage of data from one node to another. This
         networks for proposed experiment.              research will provides the great feasibility for
                                                        authentication process improvement for security in
4. Research Methodology                                 network.
          To achieve the set objectives, our research   6. SIMULATION AND RESULTS
focused on the performance measurement of               For evaluation the performance of Manet Network
network structure with implementation of Different      for our proposed work, in this section, we use a
security algorithm. We have considered RSA, DSA         simulation tool OPNET to conduct several
and MD5 algorithm for checking response time,           experiments
load, throughput and reliability of Ad-hoc              A. Simulation environment and parameters
networks with implementation of these algorithms.
We have considered OLSR protocol for general            In our simulations, we consider four different
connectivity in between the ad-hoc network. We          scenarios of sensing area: 100 m*1000m, each is
have considered different servers like Blade            with 10 randomly deployed mobile nodes. The BS
servers for providing different services to network.    is located on the corner of sensing field. Every
We start with different scenarios in OPNET              mobile node is initially equipped with 10m/s speed.
simulator for checking out the performance and          We define the database server and two blade
reliability of the network. Our research focused on     servers for testing our proposed research
these algorithms implementation in Six Phases           connected with 15 nodes LAN. We used a layer 2
                                                        router for load balancing between servers.
1st Phase: This phase contains the basic                Different tasks have been implemented by task
functionality and layout of network using servers       manager in OPNET according to the server
and ad-hoc devices.                                     management in Server manager. Applications used
2nd Phase: In this phase, we have implemented the       are FTP and HTTP for checking the behaviour of
different tasks to network by configuring the task      traffic filtered by encryption algorithms. Single
management through task manger in OPNET.                profile for whole simulation has been done with
After configuring tasks, we have configured the         random waypoint mobility algorithm for mobile
traffic type i.e. FTP and HTTP. After all               nodes.
configurations of applications, finally we have         B. Simulation results
configured the profile for different scenarios. We
have created topologies with help of Wlan Ethernet
Router, Wlan Workstation, Manet Station, Blade
servers and Database servers.
3rd Phase: In this phase, we have implemented the
different scenarios and different scenarios
including a scenario without any security
algorithm, a scenario with RSA algorithm, a
scenario with DSA algorithm and a scenario with
different algorithms (RSA, DSA, MD5).

4th Phase: We have implemented manet protocol
i.e. OLSR in network for general routing purposes.
5th Phase: We have done simulation of these
networks implemented with different type of
security algorithm for 10 minutes in OPNET.

6th Phase: Results from all Scenarios have
compared with proposed scenario (with all three
algorithm) to fetch parameters like End to End          Above Figure shows the simulation scenario for
Delay, Overall Throughput, Response time, Packet        testing different encryption schemes.
delivery. Ethernet delay, Traffic receive, Traffic
sent, Load etc.
                                                        Comparison of Our proposed hybrid algorithm
                                                        with Plane network, Network with RSA, Network
5. Scope and significance of study:                     with DSA.
There is an ample scope of research in the stated
area. Present study will reflect the importance of      1)Throughput
security in network and will provides the better

                                                                                          915 | P a g e
Khushdeep Kaur, Er.Seema / International Journal of Engineering Research and
                Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                  Vol. 2, Issue 5, September- October 2012, pp.914-917




2) Application Response Time




                                              4) Traffic Received (Packets/sec)




3) Delay




                                              5) Ethernet Delay




                                                                                  916 | P a g e
Khushdeep Kaur, Er.Seema / International Journal of Engineering Research and
                Applications (IJERA) ISSN: 2248-9622 www.ijera.com
                  Vol. 2, Issue 5, September- October 2012, pp.914-917
                                                    algorithm with different scenarios and it is
                                                    providing better response time, less network delay
                                                    and best throughput. These parameters have been
                                                    shown in above table. We got better results than
                                                    other algorithms so proposed algorithm can be
                                                    implemented to mobile nodes for security
                                                    purposes. Also our research shows that it is
                                                    helping in efficient routing of packet with much
                                                    less load on servers.
                                                    .

                                                    References

                                                    [1] ] B. Schneier, “ Applied Cryptography, Second
                                                    Edition: Protocols, Algorithms, and Source Code in C ”,
                                                    John Wiley & Sons, Inc., 1996..

                                                    [2] FEDERAL INFORMATION PROCESSING
                                                    STANDARDS PUBLICATION, “ Digital Signature
                                                    Standard (DSS)”, june 2009, Information Technology
                                                    Laboratory National Institute of Standards and
                                                    Technology, Gaithersburg, MD 20899-8900.
                                                    [3] R.L. Rivest, A. Shamir, and L. Adleman, “A Method
                                                    for Obtaining Digital Signatures and Public-Key
                                                    Cryptosystems” in 1978.
Overall Comparison in form of table
                                                    [4] U. Somani, K. Lakhani, M. Mundra “Implementing
                                                    Digital Signature with RSA Encryption Algorithm to
                                                    Enhance the Data Security of Cloud in Cloud
                                                    Computing”. 1st International Conference on Parallel,
                                                    Distributed and Grid Computing (PDGC - 2010) 978-1-
                                                    4244-7674-9/10/©2010 IEEE
                                                    [5] R. Nagpal, “ An Introduction to Digital Signatures”,
                                                    Asian School of Cyber Laws in 2008.


                                                    [6] Announcing the Advanced Encryption Standard
                                                    (AES), Federal Information Processing Standards
                                                    Publication 197, 26 November 2001 .

                                                    [7] M.Ayoub Khan, Y.P.Singh, “On the Security of Joint
                                                    Signature and Hybrid Encryption”,Networks, 2005.
                                                    Jointly held with the 2005 IEEE 7th Malaysia
                                                    International Conference on Communication, vol.1, no.,
                                                    pp.1-4,
                                                     [8] R.L. Rivest, A. Shamir, and L. Adleman,” A Method
                                                    for Obtaining Digital Signatures and Public-Key
                                                    Cryptosystems” in 2006.
                                                    [9] P. Kitsos, N. Sklavos and O. Koufopavlou,” An
                                                    Efficient Implementation of the Digital Signature
                                                    Algorithm”, VLSI Design Laboratory, Electrical and
7. CONCLUSION                                       Computer Engineering Department, University of Patras.
In this paper, we discuss an efficient and secure   Patras, GREECE 2002.
hybrid algorithm for providing security to mobile
nodes. Since we have tested our proposed            [10] R. Rivest, “The MD5 Message-Digest Algorithm”,
                                                    RFC 1321, Network Working Group, April 1992.




                                                                                         917 | P a g e

More Related Content

PDF
Literature Survey: Secure transmitting of data using RSA public key implement...
PDF
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
PDF
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
PDF
A Literature Review of Some Modern RSA Variants
PDF
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
DOC
File transfer using cryptography techniques
PDF
50120140507006
PDF
Image Cryptography using RSA Algorithm
Literature Survey: Secure transmitting of data using RSA public key implement...
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
Analyzing and Securing Data Transmission in Wireless Sensor Networks through ...
A Literature Review of Some Modern RSA Variants
A RSA- DWT Based Visual Cryptographic Steganogrphy Technique by Mohit Goel
File transfer using cryptography techniques
50120140507006
Image Cryptography using RSA Algorithm

What's hot (19)

PDF
IRJET- Comparison Among RSA, AES and DES
PDF
PDF
PDF
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
PDF
IRJET- Data Transmission using RSA Algorithm
PDF
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
PDF
Data security using stegnography and quantum cryptography
PDF
Prevention of Cheating Message based on Block Cipher using Digital Envelope
DOCX
final_Paper_springer_final
PPT
Rsa Encryption in java
PDF
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
PDF
Security analysis of fbdk block cipher for digital images
PDF
Secured key distribution techniques in wireless sensor networks 150429171406
PDF
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
PDF
Analysis of Different Steganography Algorithms and Security Issues
DOCX
Efficient authentication for mobile and pervasive computing
PDF
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
PPTX
Inscibe and Squeeze
PDF
Ijaiem 2014-11-30-122
IRJET- Comparison Among RSA, AES and DES
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
IRJET- Data Transmission using RSA Algorithm
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...
Data security using stegnography and quantum cryptography
Prevention of Cheating Message based on Block Cipher using Digital Envelope
final_Paper_springer_final
Rsa Encryption in java
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Security analysis of fbdk block cipher for digital images
Secured key distribution techniques in wireless sensor networks 150429171406
A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters ...
Analysis of Different Steganography Algorithms and Security Issues
Efficient authentication for mobile and pervasive computing
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Inscibe and Squeeze
Ijaiem 2014-11-30-122
Ad

Viewers also liked (20)

PDF
Fe25959964
PDF
Gg2511351142
PDF
Gk2511681173
PDF
Fw2510721076
PDF
He2513001307
PDF
Hi2513201329
PDF
Hb2512851289
PDF
Hl2513421351
PDF
Gz2512721277
PDF
Ho2513601370
PDF
Fl2510031009
PDF
Ge2511241129
PDF
Ft2510561062
PDF
Fo2510211029
PDF
Ga2510971106
PDF
Km2417821785
PPT
comunicacion de la informacion
PDF
Heat transfer and Marangoni flow in a circular heat pipe using self rewetting...
PPT
Espanya
PPTX
Fe25959964
Gg2511351142
Gk2511681173
Fw2510721076
He2513001307
Hi2513201329
Hb2512851289
Hl2513421351
Gz2512721277
Ho2513601370
Fl2510031009
Ge2511241129
Ft2510561062
Fo2510211029
Ga2510971106
Km2417821785
comunicacion de la informacion
Heat transfer and Marangoni flow in a circular heat pipe using self rewetting...
Espanya
Ad

Similar to Ew25914917 (20)

PDF
Nt1310 Unit 6 Powerpoint
PDF
Design of Hybrid Cryptography Algorithm for Secure Communication
PDF
Em24873876
PDF
Network Security
PDF
Iaetsd a novel approach to provide the security for distributed adaptive netw...
PDF
Secured and Encrypted Data Transmission over the Web Using Cryptography
PDF
PDF
G05114043
PPT
Lecture3a symmetric encryption
DOC
Social Engg. Assignment it17 final (1)
PDF
Crypto Vision Bot Using RSA Algorithm
PPTX
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
PDF
M.E Computer Science Network Security Projects
DOCX
7222019 TestOut LabSimhttpscdn.testout.comclient-v5-.docx
PDF
M.Phil Computer Science Network Security Projects
PDF
M phil-computer-science-network-security-projects
PDF
Pki Training V1.5
PDF
Essay On Cryptography
PDF
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
PDF
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Nt1310 Unit 6 Powerpoint
Design of Hybrid Cryptography Algorithm for Secure Communication
Em24873876
Network Security
Iaetsd a novel approach to provide the security for distributed adaptive netw...
Secured and Encrypted Data Transmission over the Web Using Cryptography
G05114043
Lecture3a symmetric encryption
Social Engg. Assignment it17 final (1)
Crypto Vision Bot Using RSA Algorithm
CRYPTOGRAPHY & NETWORK SECURITY [Autosaved].pptx
M.E Computer Science Network Security Projects
7222019 TestOut LabSimhttpscdn.testout.comclient-v5-.docx
M.Phil Computer Science Network Security Projects
M phil-computer-science-network-security-projects
Pki Training V1.5
Essay On Cryptography
Performance Analysis of Encryption Algorithm for Network Security on Parallel...
Improved Image Encryption for Real-Time Application over Wireless Communicati...

Ew25914917

  • 1. Khushdeep Kaur, Er.Seema / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.914-917 Hybrid Algorithm with DSA, RSA and MD5 Encryption Algorithm for wireless devices. Khushdeep Kaur1, Er. Seema 2 1.Research scholar, 2.Assistant professor Department of Computer Engineering, Yadavindra College of Engineering, Punjabi University Guru Kashi Campus, Talwandi Sabo Abstract security and privacy of transmitted data. Therefore, Security is the one of the biggest the methods of securing information are becoming concern in different type of networks. Due to a major issue, for which the encryption and diversify nature of network, security breaching decryption systems have been created. became a common issue in different form of Secure digital communications are necessary for networks. Solutions for network security comes web-based e-commerce, mandated privacy for with concepts like cryptography in which medical information, etc.Many hardware and distribution of keys have been done. If you want software protocols have been implemented to to send data to some other persons through improve the security of information, but the only network then if you truly want to keep the true method of securing data is to encrypt it. . The information secret, you need to agree on some national and societal view of the role of encryption sort of key that you and he can use to will be one of the defining issues for our culture in encode/decode messages. But you don’t want to the twenty-first century. Network security keep using the same key, or you will make it problems can be divided roughly into four easier and easier for others to crack your intertwined areas: Secrecy, Authentication, cipher. Nonrepudiation and Integrity control. Secrecy has As Encryption became a vital tool for to do with keeping information out of hands of preventing the threats to data sharing and tool unauthorized users. Authentication deals with to preserve the data integrity so we are focusing determining whom you are talking to before on security enhancing by enhancing the level of revealing sensitive information non repudiation encryption in network. This study’s main goal is deals with signature. Security in networking is to reflect the importance of security in network based on cryptography and provide the better encryption technique for Encryption is the vital part of information sharing currently implemented encryption techniques. so we have put our efforts into encryption area for In our research we have proposed a RSA algorithm with DSA powered by MD5 combination of DSA, RSA and MD5as a hybrid security so that we can make security harder by link for wireless devices. We have also giving a hybrid algorithm. considered case study for Manet networks so 2. Problem Formulation: that we can suggest the applications of proposed As Encryption became a vital tool for algorithm. preventing the threats to data sharing and tool to preserve the data integrity so we have focused on Keywords: RSA, Digital Signatures, Message security enhancement by enhancing the level of Digest, Encryption. encryption in network. For required research we have worked on well-known encryption algorithms 1. INTRODUCTION RSA and DSA with MD5. We have proposed the The world is becoming more interconnected with hybrid algorithm for RSA Algorithm with digital the advent of the Internet and new networking signatures powered by MD5 security with a small technology. There is a large amount of personal, case study of applications for this hybrid commercial, military, and government information algorithm. on networking infrastructures worldwide. Network 3. Objectives of the Study security is becoming of great importance because  To study the issues of Security for of intellectual property that can be easily acquired Different networks. To Harden up the through the internet. Encryption Process for Network Security The privacy requirements normally encountered in  To study the already implemented the traditional paper document world are algorithms for public key exchange in increasingly expected in Internet transactions communication of data. today. So with the rapid spread of digital communication networks, there is great need for 914 | P a g e
  • 2. Khushdeep Kaur, Er.Seema / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.914-917  To provide a stable encryption, this can encryption technique for currently implemented make good communication without encryption techniques. It will explore how to tackle carrying about data integrity threat. with the threats to data integrity and for safe  To test the performance of mobile device passage of data from one node to another. This networks for proposed experiment. research will provides the great feasibility for authentication process improvement for security in 4. Research Methodology network. To achieve the set objectives, our research 6. SIMULATION AND RESULTS focused on the performance measurement of For evaluation the performance of Manet Network network structure with implementation of Different for our proposed work, in this section, we use a security algorithm. We have considered RSA, DSA simulation tool OPNET to conduct several and MD5 algorithm for checking response time, experiments load, throughput and reliability of Ad-hoc A. Simulation environment and parameters networks with implementation of these algorithms. We have considered OLSR protocol for general In our simulations, we consider four different connectivity in between the ad-hoc network. We scenarios of sensing area: 100 m*1000m, each is have considered different servers like Blade with 10 randomly deployed mobile nodes. The BS servers for providing different services to network. is located on the corner of sensing field. Every We start with different scenarios in OPNET mobile node is initially equipped with 10m/s speed. simulator for checking out the performance and We define the database server and two blade reliability of the network. Our research focused on servers for testing our proposed research these algorithms implementation in Six Phases connected with 15 nodes LAN. We used a layer 2 router for load balancing between servers. 1st Phase: This phase contains the basic Different tasks have been implemented by task functionality and layout of network using servers manager in OPNET according to the server and ad-hoc devices. management in Server manager. Applications used 2nd Phase: In this phase, we have implemented the are FTP and HTTP for checking the behaviour of different tasks to network by configuring the task traffic filtered by encryption algorithms. Single management through task manger in OPNET. profile for whole simulation has been done with After configuring tasks, we have configured the random waypoint mobility algorithm for mobile traffic type i.e. FTP and HTTP. After all nodes. configurations of applications, finally we have B. Simulation results configured the profile for different scenarios. We have created topologies with help of Wlan Ethernet Router, Wlan Workstation, Manet Station, Blade servers and Database servers. 3rd Phase: In this phase, we have implemented the different scenarios and different scenarios including a scenario without any security algorithm, a scenario with RSA algorithm, a scenario with DSA algorithm and a scenario with different algorithms (RSA, DSA, MD5). 4th Phase: We have implemented manet protocol i.e. OLSR in network for general routing purposes. 5th Phase: We have done simulation of these networks implemented with different type of security algorithm for 10 minutes in OPNET. 6th Phase: Results from all Scenarios have compared with proposed scenario (with all three algorithm) to fetch parameters like End to End Above Figure shows the simulation scenario for Delay, Overall Throughput, Response time, Packet testing different encryption schemes. delivery. Ethernet delay, Traffic receive, Traffic sent, Load etc. Comparison of Our proposed hybrid algorithm with Plane network, Network with RSA, Network 5. Scope and significance of study: with DSA. There is an ample scope of research in the stated area. Present study will reflect the importance of 1)Throughput security in network and will provides the better 915 | P a g e
  • 3. Khushdeep Kaur, Er.Seema / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.914-917 2) Application Response Time 4) Traffic Received (Packets/sec) 3) Delay 5) Ethernet Delay 916 | P a g e
  • 4. Khushdeep Kaur, Er.Seema / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.914-917 algorithm with different scenarios and it is providing better response time, less network delay and best throughput. These parameters have been shown in above table. We got better results than other algorithms so proposed algorithm can be implemented to mobile nodes for security purposes. Also our research shows that it is helping in efficient routing of packet with much less load on servers. . References [1] ] B. Schneier, “ Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C ”, John Wiley & Sons, Inc., 1996.. [2] FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION, “ Digital Signature Standard (DSS)”, june 2009, Information Technology Laboratory National Institute of Standards and Technology, Gaithersburg, MD 20899-8900. [3] R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems” in 1978. Overall Comparison in form of table [4] U. Somani, K. Lakhani, M. Mundra “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”. 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010) 978-1- 4244-7674-9/10/©2010 IEEE [5] R. Nagpal, “ An Introduction to Digital Signatures”, Asian School of Cyber Laws in 2008. [6] Announcing the Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, 26 November 2001 . [7] M.Ayoub Khan, Y.P.Singh, “On the Security of Joint Signature and Hybrid Encryption”,Networks, 2005. Jointly held with the 2005 IEEE 7th Malaysia International Conference on Communication, vol.1, no., pp.1-4, [8] R.L. Rivest, A. Shamir, and L. Adleman,” A Method for Obtaining Digital Signatures and Public-Key Cryptosystems” in 2006. [9] P. Kitsos, N. Sklavos and O. Koufopavlou,” An Efficient Implementation of the Digital Signature Algorithm”, VLSI Design Laboratory, Electrical and 7. CONCLUSION Computer Engineering Department, University of Patras. In this paper, we discuss an efficient and secure Patras, GREECE 2002. hybrid algorithm for providing security to mobile nodes. Since we have tested our proposed [10] R. Rivest, “The MD5 Message-Digest Algorithm”, RFC 1321, Network Working Group, April 1992. 917 | P a g e