Highly efficient method of data protection based on multilayer hybrid encryption

Authors

  • O. M. Lyashuk National Technical University of Ukraine, Kyiv Politechnic Institute, Kiev

DOI:

https://doi.org/10.20535/RADAP.2014.56.144-151

Keywords:

cryptography, symmetric algorithm, hybrid encryption, AES, RSA

Abstract

Introduction. The paper deals with modern encryption algorithms and problems associated with their use. Hybrid encryption method was developed for secure communication over the Internet.
Principal part. Symmetric algorithms, which used in method, are AES, Serpent and Twofish, asymmetric algorithm is RSA. For each layer new secure random key is generated and encrypted by RSA. This key is aligned and written in the beginning of the encrypted data. On decryption key is read from the beginning of encrypted data and decrypted by RSA secret key. Then symmetric key is used to decrypt data layer by layer.
Conclusions. Use of multilayer hybrid encryption allows to transmit both keys and data by unsecure channel and ensure that data will be protected and at least one symmectric algorithm is not compromised.

Author Biography

O. M. Lyashuk, National Technical University of Ukraine, Kyiv Politechnic Institute, Kiev

B.S.

References

Перелік посилань

Мао В. Современная криптография: теория и практика / В. Мао. – М. : Видавни-чий дім «Вільямс». – 2005. – 763 c.

Фергюсон Н. Практическая криптография / Н. Фергюсон, Б. Шнайєр. – М. : Из-дательский дом "Вильямс", 2005. – 424 с.

Ростовцев А.Г. Теоретическая криптография / А.Г. Ростовцев, Е.Б. Маховенко. – М. : НПО «Профессионал». – 2004. – 490 с.

Лєвін М. PGP: Кодирование и шифрование информации с открытым ключом / М. Лєвін. – М. : Бук–пресс. – 2006. – 166 с.

Використання криптографічних алгоритмів у системі «Truecrypt» [Електроний ресурс]. – Режим доступу: http://www.truecrypt.org/docs/cascades#aes–serpent–twofish.

References

Wenbo Mao (2003) Modern Cryptography: Theory and Practice. Prentice Hall Pro-fessional Technical Reference.

Ferguson N. and Schneier B. (2005) Practical Cryptography: Designing and Imple-menting Secure Cryptographic Systems

Rostovcev A.G. and Mahovenko E.B. (2004) Teoreticheskaja kriptografija [Theoretical cryptography]. Moskow, NPO «Professional» Publ., 490 p.

Levіn M. (2006) PGP: Kodirovanie i shifrovanie informacii s otkrytym kljuchom [The encoding and encryption of information with a public key]. Moskow, Buk–press Publ., 166 p.

Vykorystannia kryptohrafichnykh alhorytmiv u systemi «Truecrypt» [The use of cryptographic algorithms in the system «Truecrypt»]. Available at: http://www.truecrypt.org/docs/cascades#aes–serpent–tshhofish.

How to Cite

Ляшук, О. (2014) “Highly efficient method of data protection based on multilayer hybrid encryption”, Visnyk NTUU KPI Seriia - Radiotekhnika Radioaparatobuduvannia, 0(56), pp. 144-151. doi: 10.20535/RADAP.2014.56.144-151.

Issue

Section

Information Security