SlideShare a Scribd company logo
3
Most read
5
Most read
8
Most read
1
Hybrid encryption
1
1
What is hybrid encryption?
 combination of more than one cryptographic algorithm
 it provides more security.
 It incorporates a combination of asymmetric and symmetric
encryption
 Hybrid encryption is considered a highly secure type of encryption as
long as the public and private keys are fully secure.
Proposed method of Encryption
 using any symmetric algo and RSA algo
Encryption Steps using Hybrid Crypto System at the
Source
 source has destination public key(PUK)
 Inputs: Plain Data Block (PDB) Symmetric Key (SK)
 Outputs: Encrypted Data Block (EDB)
 Note: EDB contains both the encrypted PDB (denoted by ED)
concatenated with encrypted SK (denoted by ESK)
Encryption Steps:
1) Encrypt PDB using SK to get ED.
(Note: This can be done using any symmetric-key crypto algorithm
like DES and AES)
2) Encrypt SK using destination’s PUK to get ESK. (Note: This can be
done using any public key algorithm like RSA) 3) Concatenate ED with
its corresponding ESK to get EDB which is sent to the destination.
EDB = { ESK , ED }
Decryption Steps using Hybrid Crypto System at the Destination
Prerequisite: Destination has its Private Key (PRK)
Inputs: Encrypted Data Block (EDB)
Note: EDB contains both the encrypted PDB (denoted by ED) concatenated
with encrypted SK (denoted by ESK)
Outputs: Plain Data Block (PDB)
Decryption Steps:
1) Decrypt ESK using PRK to retrieve SK.
(Note: This should be done using the same public key algorithm which is used
at source)
2) Use the retrieved SK as decryption key to decrypt ED to get PDB.
Figure. Block Diagram of hybrid crypto system
Although there is no explicit key transfer in the hybrid crypto system
our proposed key exchange works in the manner shown in Fig
Figure. Key transfer using hybrid crypto system
HYBRID CRYPTO SYSTEM USING RSA AND D-H
Steps of this algorithm are as
1. Choose two large prime numbers P and Q.
a. Calculate N = P x Q.
b. Select public key (i.e. encryption key) E such that it is not a factor of
(p-1) and (q-1)
c. Select the private key (i.e. the decryption key) D such that the
following equation is true (D x E) mod (P – 1) x (Q – 1) = 1
Suppose R, S and G is automatic generated prime constants
And put A=E and B=D
2. Now calculate following as public number
X= GA mod R Y= GB mod R
3. Calculate session key with formula
KA = YA mod R KB = XB mod R
Such that KA = KB = K.
Figure 2: A Hybrid RSA & Diffie-Hellman
RSA
D-H
Hybrid Encryption in Electronic Document
conclusion
Hybrid crypto system is presented that utilizes both
symmetric-key and public-key cryptographic algorithms.
The symmetric key algorithms DES are used for data
encryption/decryption. The public key algorithm RSA is
used for encrypting the secret key before performing key
distribution. RSA and DES is more secure than RSA D-H
Hybrid encryption

More Related Content

PPT
block ciphers
PPTX
RSA Algorithm
PPTX
kerberos
PDF
Network security & cryptography full notes
PPTX
3 public key cryptography
PPTX
Blow fish final ppt
PPTX
Principles of public key cryptography and its Uses
PDF
BAIT1103 Chapter 6
block ciphers
RSA Algorithm
kerberos
Network security & cryptography full notes
3 public key cryptography
Blow fish final ppt
Principles of public key cryptography and its Uses
BAIT1103 Chapter 6

What's hot (20)

PPTX
Hybrid encryption ppt
PPT
Secure Socket Layer
PPT
Access control matrix
PPTX
Authentication in cloud computing
PPTX
Public Key Cryptosystem
PDF
MD-5 : Algorithm
PPTX
Strength of des & block cipher principle
PDF
RSA ALGORITHM
PPTX
Mathematics of Asymmetric cryptography
PPTX
x.509-Directory Authentication Service
PPTX
Cryptography
PPT
Diffiehellman
PPTX
Message digest 5
PPT
Cryptography and Network Security William Stallings Lawrie Brown
PPT
Network security cryptographic hash function
PPTX
Steganography
PPT
Digital Signature Standard
DOCX
What is AES? Advanced Encryption Standards
PDF
Introduction to Cryptography
PPT
Fundamentals of cryptography
Hybrid encryption ppt
Secure Socket Layer
Access control matrix
Authentication in cloud computing
Public Key Cryptosystem
MD-5 : Algorithm
Strength of des & block cipher principle
RSA ALGORITHM
Mathematics of Asymmetric cryptography
x.509-Directory Authentication Service
Cryptography
Diffiehellman
Message digest 5
Cryptography and Network Security William Stallings Lawrie Brown
Network security cryptographic hash function
Steganography
Digital Signature Standard
What is AES? Advanced Encryption Standards
Introduction to Cryptography
Fundamentals of cryptography
Ad

Similar to Hybrid encryption (20)

PPTX
Hybrid cryptosystem
PDF
Survey of Hybrid Encryption Algorithm for Mobile Communication
PDF
Presentation on Cryptography_Based on IEEE_Paper
PDF
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
PPTX
Securing Text Messages Application Using MED
PPTX
Secure_File_Storage_Hybrid_Cryptography.pptx..
PDF
Hybrid Encryption for Database Security
PDF
Design of Hybrid Cryptography Algorithm for Secure Communication
PPT
Cryptography
PDF
International Journal of Engineering Research and Development (IJERD)
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
PPTX
CS_Chapter_2Security concerns of different types of devices.pptx
PDF
Enhanced Hybrid Encryption Algorithm
PDF
Hybrid Cryptography with examples in Ruby and Go
PDF
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
PDF
A new hybrid text encryption approach over mobile ad hoc network
PDF
Email Encryption using Tri-Cryptosystem Based on Android
PDF
2. public key cryptography and RSA
PDF
Public private key
Hybrid cryptosystem
Survey of Hybrid Encryption Algorithm for Mobile Communication
Presentation on Cryptography_Based on IEEE_Paper
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
Securing Text Messages Application Using MED
Secure_File_Storage_Hybrid_Cryptography.pptx..
Hybrid Encryption for Database Security
Design of Hybrid Cryptography Algorithm for Secure Communication
Cryptography
International Journal of Engineering Research and Development (IJERD)
CS_Chapter_2Security concerns of different types of devices.pptx
CS_Chapter_2Security concerns of different types of devices.pptx
Enhanced Hybrid Encryption Algorithm
Hybrid Cryptography with examples in Ruby and Go
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
A new hybrid text encryption approach over mobile ad hoc network
Email Encryption using Tri-Cryptosystem Based on Android
2. public key cryptography and RSA
Public private key
Ad

More from ranjit banshpal (15)

PPTX
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
PPT
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
PPTX
Secure Image Retrieval based on Hybrid Features and Hashes
PPT
LCT in day2 day life
PPT
Fingerprint recognition
PPT
“Web crawler”
PPT
Data mining technique for classification and feature evaluation using stream ...
PPTX
Parallelization using open mp
PPTX
Face recognition technology
PPT
using big-data methods analyse the Cross platform aviation
PPT
E mail image spam filtering techniques
PPTX
Autocorrelators1
PPT
Static Networks
PPT
Ranjitbanshpal
DOC
Ranjitbanshpal1
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
SECURE IMAGE RETRIEVAL BASED ON HYBRID FEATURES AND HASHES
Secure Image Retrieval based on Hybrid Features and Hashes
LCT in day2 day life
Fingerprint recognition
“Web crawler”
Data mining technique for classification and feature evaluation using stream ...
Parallelization using open mp
Face recognition technology
using big-data methods analyse the Cross platform aviation
E mail image spam filtering techniques
Autocorrelators1
Static Networks
Ranjitbanshpal
Ranjitbanshpal1

Recently uploaded (20)

PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Sports Quiz easy sports quiz sports quiz
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Classroom Observation Tools for Teachers
PDF
Pre independence Education in Inndia.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
Cell Types and Its function , kingdom of life
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPH.pptx obstetrics and gynecology in nursing
102 student loan defaulters named and shamed – Is someone you know on the list?
Abdominal Access Techniques with Prof. Dr. R K Mishra
VCE English Exam - Section C Student Revision Booklet
Sports Quiz easy sports quiz sports quiz
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Anesthesia in Laparoscopic Surgery in India
TR - Agricultural Crops Production NC III.pdf
Classroom Observation Tools for Teachers
Pre independence Education in Inndia.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Cell Types and Its function , kingdom of life
Pharmacology of Heart Failure /Pharmacotherapy of CHF
human mycosis Human fungal infections are called human mycosis..pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Final Presentation General Medicine 03-08-2024.pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx

Hybrid encryption

  • 2. What is hybrid encryption?  combination of more than one cryptographic algorithm  it provides more security.  It incorporates a combination of asymmetric and symmetric encryption  Hybrid encryption is considered a highly secure type of encryption as long as the public and private keys are fully secure.
  • 3. Proposed method of Encryption  using any symmetric algo and RSA algo Encryption Steps using Hybrid Crypto System at the Source  source has destination public key(PUK)  Inputs: Plain Data Block (PDB) Symmetric Key (SK)  Outputs: Encrypted Data Block (EDB)  Note: EDB contains both the encrypted PDB (denoted by ED) concatenated with encrypted SK (denoted by ESK) Encryption Steps: 1) Encrypt PDB using SK to get ED. (Note: This can be done using any symmetric-key crypto algorithm like DES and AES) 2) Encrypt SK using destination’s PUK to get ESK. (Note: This can be done using any public key algorithm like RSA) 3) Concatenate ED with its corresponding ESK to get EDB which is sent to the destination. EDB = { ESK , ED }
  • 4. Decryption Steps using Hybrid Crypto System at the Destination Prerequisite: Destination has its Private Key (PRK) Inputs: Encrypted Data Block (EDB) Note: EDB contains both the encrypted PDB (denoted by ED) concatenated with encrypted SK (denoted by ESK) Outputs: Plain Data Block (PDB) Decryption Steps: 1) Decrypt ESK using PRK to retrieve SK. (Note: This should be done using the same public key algorithm which is used at source) 2) Use the retrieved SK as decryption key to decrypt ED to get PDB.
  • 5. Figure. Block Diagram of hybrid crypto system
  • 6. Although there is no explicit key transfer in the hybrid crypto system our proposed key exchange works in the manner shown in Fig Figure. Key transfer using hybrid crypto system
  • 7. HYBRID CRYPTO SYSTEM USING RSA AND D-H Steps of this algorithm are as 1. Choose two large prime numbers P and Q. a. Calculate N = P x Q. b. Select public key (i.e. encryption key) E such that it is not a factor of (p-1) and (q-1) c. Select the private key (i.e. the decryption key) D such that the following equation is true (D x E) mod (P – 1) x (Q – 1) = 1 Suppose R, S and G is automatic generated prime constants And put A=E and B=D 2. Now calculate following as public number X= GA mod R Y= GB mod R 3. Calculate session key with formula KA = YA mod R KB = XB mod R Such that KA = KB = K.
  • 8. Figure 2: A Hybrid RSA & Diffie-Hellman RSA D-H
  • 9. Hybrid Encryption in Electronic Document
  • 10. conclusion Hybrid crypto system is presented that utilizes both symmetric-key and public-key cryptographic algorithms. The symmetric key algorithms DES are used for data encryption/decryption. The public key algorithm RSA is used for encrypting the secret key before performing key distribution. RSA and DES is more secure than RSA D-H