z-logo
open-access-imgOpen Access
Minimizing the Effect of Brute Force Attack using Hybridization of Encryption Algorithms
Author(s) -
Lalit Kumar,
Neelendra Badal
Publication year - 2019
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2019919213
Subject(s) - computer science , brute force , encryption , brute force attack , algorithm , computer security
Encryption is a process to hide the data into a secure manner. It helps the people to provide security and protect the data from unauthenticated people. For Encryption process, user uses many algorithms but all algorithm has some pitfalls i.e. a single encryption algorithm is not efficient to provide security to the data. For removing this disadvantages user uses more than one encryption algorithm in sequence to achieve high security encryption method. This process is called Hybrid Encryption Method. Sometimes MD5 hash function identified using Brute Force Attack. So user uses two encryption algorithms i.e. MD5 and Transposition Reverse String Algorithm. Here Transposition Reverse String Algorithm reverse the hash function due to this user cannot easily identify the hash function. This approach has fast Execution time in comparison to another hybrid approaches, so it is an optimize Hybrid Encryption Method. General Terms Hybridization of Encryption Algorithms

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom