A New Way to Design and Implementation of Hybrid Crypto System for Security of the Information in Public Network
نویسندگان
چکیده
In this paper, a new hybrid concept is proposed by analyzing the principle of the hybrid cryptography based on the combination of symmetric and message digesting. Moreover, the security and performance of the proposed concept will also estimate. In proposed concept we designed a new symmetric encryption algorithm and combine with SHA1 message digesting function to provide hybrid nature. Now the proposed system will try to improve exiting problem. In proposed system symmetric key will use series of logical functions like XOR, Circular Shift (Right, Left), Feastel function [6] and these operations are time efficient operation as compared to mathematical operation for providing confidentiality and authentication. For integrity, proposed system use SHA-1[15] algorithm. Due to this reason proposed system is efficient then existing system. The experimental results based on combination of symmetric and message digesting will approve the effectiveness of the proposed concept, and the combination of symmetric and message digesting will show large variation in key space and provide high-level security. The cipher text generated by this method will be approximately double in size as the plaintext, and will be suitable for practical use in the secure transmission of confidential information over the Internet. The purpose of hybrid cryptosystems is not to provide perfect or risk-free security. Rather, the purpose of cryptography-based security is to protect information resources by making unauthorized collection of the information or tampering with the information costly than the existing potential value that might be gained. Good hybrid cryptography, when properly implemented and used, makes attempts to violate security cost-prohibitive. Keywords-Encryption, Decryption, Security, Image,
منابع مشابه
DESIGN AND IMPLEMENTATION OF FUZZY EXPERT SYSTEM FOR REAL ESTATE RECOMMENDATION
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: justify; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; backgro...
متن کاملDESIGN AND IMPLEMENTATION OF FUZZY EXPERT SYSTEM FOR REAL ESTATE RECOMMENDATION
<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: justify; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; backgro...
متن کاملAn Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation
Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...
متن کاملA New Method for Intrusion Detection Using Genetic Algorithm and Neural network
Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...
متن کاملA hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection
A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...
متن کاملAnomaly Detection Using SVM as Classifier and Decision Tree for Optimizing Feature Vectors
Abstract- With the advancement and development of computer network technologies, the way for intruders has become smoother; therefore, to detect threats and attacks, the importance of intrusion detection systems (IDS) as one of the key elements of security is increasing. One of the challenges of intrusion detection systems is managing of the large amount of network traffic features. Removing un...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013