Highly efficient method of data protection based on multilayer hybrid encryption
DOI:
https://doi.org/10.20535/RADAP.2014.56.144-151Keywords:
cryptography, symmetric algorithm, hybrid encryption, AES, RSAAbstract
Introduction. The paper deals with modern encryption algorithms and problems associated with their use. Hybrid encryption method was developed for secure communication over the Internet.Principal part. Symmetric algorithms, which used in method, are AES, Serpent and Twofish, asymmetric algorithm is RSA. For each layer new secure random key is generated and encrypted by RSA. This key is aligned and written in the beginning of the encrypted data. On decryption key is read from the beginning of encrypted data and decrypted by RSA secret key. Then symmetric key is used to decrypt data layer by layer.
Conclusions. Use of multilayer hybrid encryption allows to transmit both keys and data by unsecure channel and ensure that data will be protected and at least one symmectric algorithm is not compromised.
References
Перелік посилань
Мао В. Современная криптография: теория и практика / В. Мао. – М. : Видавни-чий дім «Вільямс». – 2005. – 763 c.
Фергюсон Н. Практическая криптография / Н. Фергюсон, Б. Шнайєр. – М. : Из-дательский дом "Вильямс", 2005. – 424 с.
Ростовцев А.Г. Теоретическая криптография / А.Г. Ростовцев, Е.Б. Маховенко. – М. : НПО «Профессионал». – 2004. – 490 с.
Лєвін М. PGP: Кодирование и шифрование информации с открытым ключом / М. Лєвін. – М. : Бук–пресс. – 2006. – 166 с.
Використання криптографічних алгоритмів у системі «Truecrypt» [Електроний ресурс]. – Режим доступу: http://www.truecrypt.org/docs/cascades#aes–serpent–twofish.
References
Wenbo Mao (2003) Modern Cryptography: Theory and Practice. Prentice Hall Pro-fessional Technical Reference.
Ferguson N. and Schneier B. (2005) Practical Cryptography: Designing and Imple-menting Secure Cryptographic Systems
Rostovcev A.G. and Mahovenko E.B. (2004) Teoreticheskaja kriptografija [Theoretical cryptography]. Moskow, NPO «Professional» Publ., 490 p.
Levіn M. (2006) PGP: Kodirovanie i shifrovanie informacii s otkrytym kljuchom [The encoding and encryption of information with a public key]. Moskow, Buk–press Publ., 166 p.
Vykorystannia kryptohrafichnykh alhorytmiv u systemi «Truecrypt» [The use of cryptographic algorithms in the system «Truecrypt»]. Available at: http://www.truecrypt.org/docs/cascades#aes–serpent–tshhofish.
Downloads
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).