Implementation and Comparison of Hybrid Encryption Model For Secure Network Using AES and Elgamal
Implementation and Comparison of Hybrid Encryption Model For Secure Network Using AES and Elgamal
0976-5697
Volume 8, No. 3, March – April 2017
International Journal of Advanced Research in Computer Science
RESEARCH PAPER
Available Online at www.ijarcs.info
Implementation and comparison of hybrid encryption model for secure network using
AES and Elgamal
Abstract: Cryptography is a concept to protect network and data transmission over network. Data Security is the main aspect of securing data
transmission over unreliable network. Cryptography is a method of storing and transmitting data in a secret form so that only those for whom it
is intended can read and process it. There are two types of cryptography algorithms such as symmetric key cryptography and asymmetric key
cryptography. At present there are various types of cryptographic algorithms provide high security to information on networks, but they also
have some drawbacks. To overcome the drawbacks of these algorithms, we propose a new hybrid cryptographic algorithm in this paper. The
algorithm is designed using combination of two cryptographic algorithms AES and Elgamal. Analyse and compare the performance of existing
and proposed algorithm on parameters security, encryption time, decryption time and throughput. This new hybrid cryptographic technique has
been designed to decrease encryption and decryption time and increase throughput. In this work core java + swing in NetBeans IDE 7.0.1 jdk
8.0. is used. Implementation and performance analysis of proposed model done by JAVA. Results shows the Hybrid model perform better than
AES and Elgamal individually.
Cryptography is an art of writing and reading the secret AES was developed in 1999. AES was announced by
information. It uses mathematics in science to protect the National Institute of Standards and Technology (NIST).
information. It is a method of encrypting the original AES is a block cipher symmetric algorithm with block
information into a form that is not easily interpreted by length 128 bits and key lengths of 128, 192 or 256. The key
anyone. Original message can be revealed only after size of the algorithm depends on the number of rounds in
decrypting the encrypted message. Public and private keys algorithm [10]. The algorithm is as shown in Figure
are used for this purpose. Generally, the cryptographic
systems can be classified into symmetric and asymmetric. In
symmetric cryptography, same key is used for the
encryption and decryption whereas in asymmetric
cryptography separate keys are used for the encryption and
decryption process [11].
V. CONCLUSION
Fig 5: Decryption time for each algorithm In order to protect the intended data from hacking,
cryptography is performed. In this paper we discussed about
The results as defined in figure shows, the proposed cryptography AES and Elgamal and our proposed hybrid
technique is efficient as compared to AES and Elgamal algorithm using AES and Elgamal algorithms.
algorithm. The results shows proposed Hybrid algorithm Cryptographic algorithms play a very important role in
provides advantage over AES and Elgamal algorithm. Thus Network security. In the review of literature work there are
proposed technique reduces the time consumption as some drawbacks. The hybrid algorithm is better than AES
compared to both AES and Elgamal algorithm. and Elgamal in terms of encryption time and decryption
time and security. Future work can be done on other
iii. Throughput symmetric and asymmetric algorithms by merged them.
Elgamal : Analysis and Comparison " International of Advanced Research in Computer Science and Software
Journal of Computer Applications (0975 – 8887) Volume Engineering, Volume 3, Issue 11, November 2013.
112 – No 13, February 2015. [10] Jitendra Singh Chauhan, S. K. Sharma, “A Comparative Study
[6] Diaa Salama Abd Elminaam, Hatem Mohamed Abdual Kader, of Cryptographic Algorithms” INTERNATIONAL
and Mohiy Mohamed Hadhoud, “Evaluating The Performance JOURNAL FOR INNOVATIVE RESEARCH IN
of Symmetric Encryption Algorithms” International Journal of MULTIDISCIPLINARY FIELD, Volume - 1, Issue - 2, Sept
Network Security, Vol.10, No.3, PP.213-219, May 2010. – 2015.
[7] Shashi Mehrotra Seth, Rajan Mishra, “Comparative Analysis [11] Jitendra Singh Laser, Viny Jain, “A Comparative Survey of
of Encryption Algorithms for Data Communication” IJCST various Cryptographic Techniques” International Research
Vol. 2, Issue 2, June 2011. Journal of Engineering and Technology (IRJET), Volume: 03
[8] Pratap Chandra Mandal, “Evaluation of performance of the Issue: 03 | Mar-2016.
Symmetric Key Algorithms: DES, 3DES, AES and Blowfish” [12] V. Kapoor, Rahul Yadav, “A Hybrid Cryptography Technique
Journal of Global Research in Computer Science Volume 3, for Improving Network Security” International Journal of
No. 8, August 2012. Computer Applications (0975 – 8887) Volume 141 – No.11,
[9] Lalit Singh Dr. R.K. Bharti, “Comparative Performance May 2016.
Analysis of Cryptographic Algorithms” International Journal