0% found this document useful (0 votes)
52 views5 pages

Implementation and Comparison of Hybrid Encryption Model For Secure Network Using AES and Elgamal

hybrid encryption
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views5 pages

Implementation and Comparison of Hybrid Encryption Model For Secure Network Using AES and Elgamal

hybrid encryption
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

ISSN No.

0976-5697
Volume 8, No. 3, March – April 2017
International Journal of Advanced Research in Computer Science
RESEARCH PAPER
Available Online at www.ijarcs.info
Implementation and comparison of hybrid encryption model for secure network using
AES and Elgamal

Sonia Rani Harpreet Kaur


M.Phil Scholar, Department of Computer Science Assistant Professor, Department of Computer Science
Applications, SBBS University, Applications, SBBS University,
Jalandhar Punjab, INDIA Jalandhar Punjab, INDIA

Abstract: Cryptography is a concept to protect network and data transmission over network. Data Security is the main aspect of securing data
transmission over unreliable network. Cryptography is a method of storing and transmitting data in a secret form so that only those for whom it
is intended can read and process it. There are two types of cryptography algorithms such as symmetric key cryptography and asymmetric key
cryptography. At present there are various types of cryptographic algorithms provide high security to information on networks, but they also
have some drawbacks. To overcome the drawbacks of these algorithms, we propose a new hybrid cryptographic algorithm in this paper. The
algorithm is designed using combination of two cryptographic algorithms AES and Elgamal. Analyse and compare the performance of existing
and proposed algorithm on parameters security, encryption time, decryption time and throughput. This new hybrid cryptographic technique has
been designed to decrease encryption and decryption time and increase throughput. In this work core java + swing in NetBeans IDE 7.0.1 jdk
8.0. is used. Implementation and performance analysis of proposed model done by JAVA. Results shows the Hybrid model perform better than
AES and Elgamal individually.

Keywords: Cryptography, AES, Elgamal and Hybrid AES and Elgamal

I. INTRODUCTION i. AES (Advanced Encryption Standard):

Cryptography is an art of writing and reading the secret AES was developed in 1999. AES was announced by
information. It uses mathematics in science to protect the National Institute of Standards and Technology (NIST).
information. It is a method of encrypting the original AES is a block cipher symmetric algorithm with block
information into a form that is not easily interpreted by length 128 bits and key lengths of 128, 192 or 256. The key
anyone. Original message can be revealed only after size of the algorithm depends on the number of rounds in
decrypting the encrypted message. Public and private keys algorithm [10]. The algorithm is as shown in Figure
are used for this purpose. Generally, the cryptographic
systems can be classified into symmetric and asymmetric. In
symmetric cryptography, same key is used for the
encryption and decryption whereas in asymmetric
cryptography separate keys are used for the encryption and
decryption process [11].

There are two types of cryptography algorithm that are


given below:
 Symmetric key cryptography algorithm
 Asymmetric key cryptography algorithm

Fig 1: Cryptography Algorithms.


Fig 2: AES Algorithm
© 2015-19, IJARCS All Rights Reserved 254
Sonia Rani et al , International Journal of Advanced Research in Computer Science, 8 (3), March-April 2017, 254-258

different data loads are used. The comparison is made on the


In AES, there are four transformations for one round basis of these parameters: speed, block size, and key size.
1) Sub Bytes - It's a nonlinear substitution, here each byte is [2]
replaced by another fix bytes. Shashi Mehrotra Seth et al. [2011], performs comparative
analysis of three algorithm; DES, AES an RSA considering
2) Shift Rows - each row is rotating according to row
certain parameters such as computation time, memory
position from right to left. Like 0th row rotate for 0times, 1st
usages and output byte. A cryptographic tool is used for
row rotates for 1 time, 2nd row rotates for 2 times and 3rd
conducting experiments. Experiments results are given to
row rotates for 3 times.
analyses the effectiveness of each algorithm. [7]
3) Mix Columns - performs mixing operation on columns Jignesh R Patel et al. [2012], present an improved Hybrid
with constant and data. AES-DES algorithm as means of strengthening the current
AES architecture. The hybrid model gives a better non
4) Add Round Key - combining data's bytes column with a
linearity to the plain AES and as it is merged with DES
key's byte column. [10]
there is better diffusion hence the possibility of an algebraic
attack on the hybrid model is reduced [4].
ii. ElGamal
Pratap Chandra Mandal et al. [2012], provides a fair
Elgamal is an asymmetric key algorithm developed by comparison between four most common and used symmetric
Taher Elgamal in the year 1984. It is based on Diffie- key algorithms: DES, 3DES, AES and Blowfish. A
Hellman key exchange algorithm [5] and works over finite comparison has been made on the basis of these parameters:
fields [6]. The security of this algorithm is based on Discrete rounds block size, key size, encryption/decryption time,
Logarithm Problem (DLP). CPU process time in the form of throughput and power
The steps involved in the Elgamal algorithm are as follows:
consumption. These results show that blowfish is more
A. Initialization
Before the encryption and decryption process can start, the suitable than AES. [8]
following initialization is done: Lalit Singh et al. [2013], provides a fair comparison
• Choose a random prime p and a primitive root between five most common and used symmetric and
element ‘a’ ԑ F a . asymmetric key algorithms: Two fish & Blowfish,
• Private key ‘x’ is chosen as a random number such IB_mRSA, RSA, RC. A comparison has been made on the
that ‘x’ ԑ ᴜ F a-1 . basis of these parameters: rounds block size, key size, and
• Public key ‘y’ is computed using the private key encryption/decryption time, CPU process time in the form of
‘x’. Therefore, yk = ak mod p.
throughput. These results show that IB_mRSA is more
B. Encryption Scheme
suitable than other algorithms. [9]
The sender chooses a random integer k ԑ ᴜ F a-1 and
computes one time key K = yk mod p. The message M is Jitendra Singh Chauhan et al. [2105], focuses on the
encrypted into two parts (C1 and C2) as ak mod p and K*M comparative study of various cryptographic algorithms like
mod p respectively. AES, DES, RSA, Blow Fish, Elliptic Curve, SHA and MD5
C. Decryption and give a proper direction to the users for use of proper
The cipher text is decrypted as M = C2 K-1 mod p using one algorithm for securing of data. MD5 algorithm takes least
time key K = C1x mod p. encryption time whereas, RSA takes largest encryption time.
[10]
II. RELATED WORK Jitendra Singh Laser et al. [2016], surveyed the
conventional algorithms, based on their benefits and
This section gives the overview of related work by various drawbacks. We additionally have in comparison the
authors in network security algorithms significance of each these cryptographic techniques. This
Diaa Salama Abd Elminaam et al. [2010], presents
paper also offer an appropriate future opportunity related to
evaluation of six of the most common encryption algorithms
these cryptographic techniques. [11]
namely: AES (Rijindeal), DES, 3DES, RC2, Blowfish, and
Md. Alam Hossain et al. [2016], describes the basic
RC6. A comparison has been conducted for those encryption characteristics (Key Length, Block size) of symmetric (AES,
algorithms at different settings for each algorithm such as DES, 3DES, BLOWFISH, RC4), Asymmetric (RSA, DSA,
different sizes of data blocks, different data types, battery Diffie-Hellman, EI-Gamal, Paillier), Hashing (MD5, MD6,
power consumption, different key size and finally SHA, SHA256) algorithms. Also we implemented five well-
encryption/decryption speed. [6] known and widely used encrypt techniques like AES, DES,
BLOWFISH, DES, RC4, RSA algorithms and compared
Jawahar Thakur et al. [2011], provides a fair comparison
their performance based on the analysis of their encryption
between three most common symmetric key cryptography and decryption time for different file sizes in the local
algorithms: DES, AES, and Blowfish. Since main concern system. [1]
here is the performance of algorithms under different V. Kapoor et al. [2016], a hybrid cryptographic technique
settings, the presented comparison takes into consideration for improving data security during network transmission is
the behavior and the performance of the algorithm when
© 2015-19, IJARCS All Rights Reserved 255
Sonia Rani et al , International Journal of Advanced Research in Computer Science, 8 (3), March-April 2017, 254-258

proposed and their implementation and results are reported.


The proposed secure cryptographic technique promises to
provide the highly secure cipher generation technique using
the RSA, DES and SHA1 technique. [12]
Dr. D. Vimal Kumar et al. [2016], some well-known
cryptographic algorithms have been analyzed in this paper
to demonstrate the basic differences between the existing
encryption techniques. Regardless of the mathematical
theory behind an algorithm, the best algorithm are those that
are well-known and well-documented because they are well-
tested and well studied. [3]

III. PROPOSED METHOD: HYBRID AES AND


ELGAMAL

In proposed algorithm (Hybrid AES and Elgamal) the goal


had been achieved by combining two algorithms called AES
and Elgamal.
Encryption Process
ELGAMAL AES
Encryption Encryption
Fig 4: Encryption time for each algorithm.

The diagram contains data of different data size in X axis by


AES ELGAMAL
Decryption Decryption which experiments are conducted. Similarly Y axis contains
amount of time in microseconds. The results show proposed
Decryption Process algorithm consumes less time as compared to AES and
Elgamal algorithm. According to mean performance
Fig 3: Block Diagram of Hybrid AES and Elgamal proposed Hybrid algorithm consumes less amount of time
with respect to AES and Elgamal algorithm.
IV. IMPLEMENTATION
ii. Decryption time
In this system the implementation of AES, Elgamal and
The time to recover original data from cipher is known as
Hybrid AES and Elgamal is done for comparative study so it
decryption time [12]. Figure shows comparative
can be easily understood that time requirement for
performance of AES, Elgamal and proposed Hybrid
encryption of Hybrid AES-Elgamal is less than that of the
algorithm. In this figure X-axis contains data of different
time requirement of individual AES and Elgamal.
size for experiments and Y axis contains time required. The
i. Encryption time decryption time of the proposed algorithm is efficient as
compared to individual AES and Elgamal algorithm.
The time required to encrypt data is termed as encryption
time of the cryptographic system [12]. In the figure X-axis Table 2: Decryption Time for each algorithm
contains data of different size for experiments and Y axis
contains time required. The encryption time of the AES, Data Size AES Elgamal Hybrid AES
Elgamal and proposed hybrid algorithm is given in below (bytes) and Elgamal
table: 100 533 1723 176
500 824 2146 345
Table 1: Encryption time for each algorithm 1000 976 2442 432
Data Size AES Elgamal Hybrid AES 1500 1243 2678 763
(bytes) and Elgamal 2000 1426 2929 865
100 128033 5855 5359
500 126531 21903 12294
1000 126039 29907 21230
1500 126018 38347 31103
2000 123639 45182 40532

© 2015-19, IJARCS All Rights Reserved 256


Sonia Rani et al , International Journal of Advanced Research in Computer Science, 8 (3), March-April 2017, 254-258

Fig 6: Throughput of each algorithm

V. CONCLUSION

Fig 5: Decryption time for each algorithm In order to protect the intended data from hacking,
cryptography is performed. In this paper we discussed about
The results as defined in figure shows, the proposed cryptography AES and Elgamal and our proposed hybrid
technique is efficient as compared to AES and Elgamal algorithm using AES and Elgamal algorithms.
algorithm. The results shows proposed Hybrid algorithm Cryptographic algorithms play a very important role in
provides advantage over AES and Elgamal algorithm. Thus Network security. In the review of literature work there are
proposed technique reduces the time consumption as some drawbacks. The hybrid algorithm is better than AES
compared to both AES and Elgamal algorithm. and Elgamal in terms of encryption time and decryption
time and security. Future work can be done on other
iii. Throughput symmetric and asymmetric algorithms by merged them.

The throughput of each algorithm is depicted in figure 5.


REFERENCES
The throughput of proposed hybrid model is better than the
throughput of AES.
[1] Md. Alam Hossain, Md. Biddut Hossain, Md. Shafin Uddin,
Shariar Md. Imtiaz, “Performance Analysis of Different
Table 3: Throughput of each algorithm Cryptography Algorithms”, International Journal of Advanced
Research in Computer Science and Software Engineering
Data Size AES Elgamal Hybrid AES and Volume 6, Issue 3, March 2016.
(bytes) Elgamal [2] Swati Kashyap, Er.Neeraj Madan “A Review on: Network
100 5.23 20.67 17.75 Security and Cryptographic Algorithm” International Journal
500 7.56 25.78 20.67 of Advanced Research in Computer Science and Software
1000 5.59 23.89 19.78 Engineering Volume 5, Issue 4, April 2015.
1500 8.9 43.23 23.54 [3] Dr. D. Vimal Kumar, Mrs. J. Divya Jose, “Over View of
2000 6.69 40.42 25.78 Cryptographic Algorithms for Information Security”
International Journal of Advanced Research in Computer and
Communication Engineering Vol. 5, Issue 5, May 2016.
[4] Jignesh R Patel, Rajesh S. Bansode Vikas Kaul, “Hybrid
Security Algorithms for Data Transmission using AES-DES”
International Journal of Applied Information Systems (IJAIS),
Volume 2– No.2, February 2012.
[5] Shaina Arora, Pooja, "Enhancing Cryptographic Security
using Novel Approach based on. Enhanced – RSA and

© 2015-19, IJARCS All Rights Reserved 257


Sonia Rani et al , International Journal of Advanced Research in Computer Science, 8 (3), March-April 2017, 254-258

Elgamal : Analysis and Comparison " International of Advanced Research in Computer Science and Software
Journal of Computer Applications (0975 – 8887) Volume Engineering, Volume 3, Issue 11, November 2013.
112 – No 13, February 2015. [10] Jitendra Singh Chauhan, S. K. Sharma, “A Comparative Study
[6] Diaa Salama Abd Elminaam, Hatem Mohamed Abdual Kader, of Cryptographic Algorithms” INTERNATIONAL
and Mohiy Mohamed Hadhoud, “Evaluating The Performance JOURNAL FOR INNOVATIVE RESEARCH IN
of Symmetric Encryption Algorithms” International Journal of MULTIDISCIPLINARY FIELD, Volume - 1, Issue - 2, Sept
Network Security, Vol.10, No.3, PP.213-219, May 2010. – 2015.
[7] Shashi Mehrotra Seth, Rajan Mishra, “Comparative Analysis [11] Jitendra Singh Laser, Viny Jain, “A Comparative Survey of
of Encryption Algorithms for Data Communication” IJCST various Cryptographic Techniques” International Research
Vol. 2, Issue 2, June 2011. Journal of Engineering and Technology (IRJET), Volume: 03
[8] Pratap Chandra Mandal, “Evaluation of performance of the Issue: 03 | Mar-2016.
Symmetric Key Algorithms: DES, 3DES, AES and Blowfish” [12] V. Kapoor, Rahul Yadav, “A Hybrid Cryptography Technique
Journal of Global Research in Computer Science Volume 3, for Improving Network Security” International Journal of
No. 8, August 2012. Computer Applications (0975 – 8887) Volume 141 – No.11,
[9] Lalit Singh Dr. R.K. Bharti, “Comparative Performance May 2016.
Analysis of Cryptographic Algorithms” International Journal

© 2015-19, IJARCS All Rights Reserved 258

You might also like