z-logo
open-access-imgOpen Access
Efficient Hybrid Cryptography Algorithm
Author(s) -
Mayes M. Hoobi
Publication year - 2020
Publication title -
xi'nan jiaotong daxue xuebao
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 21
ISSN - 0258-2724
DOI - 10.35741/issn.0258-2724.55.3.5
Subject(s) - encryption , probabilistic encryption , computer science , 40 bit encryption , multiple encryption , key space , 56 bit encryption , key (lock) , algorithm , key size , attribute based encryption , elliptic curve cryptography , cryptography , on the fly encryption , theoretical computer science , computer security , public key cryptography
Cryptography is the operation of transferring a specific message to prevent an attacker from accessing the contents of a message. To increase the level of security in any communication, both parties must have a copy of the encryption key. The Data Encryption Standard algorithm is insufficient due to its weak key generation, so that the key must be reconfigured to make this algorithm more secure, effective, and stronger. The key for encryption enhances securities of the Data Encryption Standard algorithm. This research assumed a combination of two efficient encryption algorithms to achieve the goal of information security by adding a new level of security to the Data Encryption Standard algorithm using the elliptic curve cryptography algorithm. This aim was met by adding two new key functions; the first one is EncK(), and the second one is DecK() for an encryption and decryption key of the Data Encryption Standard algorithm to make this algorithm more secure against attackers. The results obtained from this research also demonstrate good resistance against a brute-force attack, which makes the system more effective by applying the elliptic curve cryptography algorithm to encrypt and decrypt keys using the Data Encryption Standard. In addition, these modifications enhance the degree of complexity, increase key search space, and make the ciphered message more difficult for an attacker to crack.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here