Open Access Open Access  Restricted Access Subscription or Fee Access

An Efficient Interactive media Encryption using Hybrid Cryptographic Approaches

Dr S Selvi, Dr M Gobi

Abstract


Data Security these days is turning into an essential worry for any correspondence procedure particularly when it is having classified data and needs to go through an uncertain medium of correspondence. There are numerous methods to shield the information from unapproved get to. Techniques like Symmetric Encryption makes utilization of a mystery key which is utilized by the sender and the beneficiary for scrambling and unscrambling the substance separately. Strategies, for example, lopsided encryption makes utilization of two distinctive keys to do a similar undertaking. The previous technique is quicker when contrasted with the last mentioned however needs as far as security. The last technique makes utilization of an open key framework to make the encryption procedure open however decoding private henceforth expanding the general intricacy. The best known symmetric figure AES [11] makes utilization of 256 piece keys to do the encryption. Exceptionally notable awry strategy RSA [12] makes utilization of 1024 piece keys to do a similar occupation, in this manner expanding the time and space intricacy at the cost of expanded security. Another awry partner ECC [13] makes utilization of a totally unique approach by changing over the characters into relative purposes of an elliptic bend. It makes utilization of 160 piece keys and delivers a similar outcome at a greatly improved pace when contrasted with RSA. In this paper a novel proficient model of Hybrid Encryption including AES and ECC is advanced which scrambles any interactive media information i.e. content, picture, sound, video, and so on. The benefits of both AES and ECC are used to make an all the more intense half and half figure to cross over any barrier of speed and security. With the assistance of lesser estimated keys the time figure required to do the encryption is diminished. The outcomes gotten after execution mirrored a 100 % precision and a colossal speed increase over the current symmetric and hilter kilter innovations. The execution is completed in the Java condition by making separate keys and using them to do the encryption.


Keywords


ECC, Hybrid Encryption, Steganography Multimedia Encryption, Cryptography, Symmetric Encryption, Asymmetric Encryption.

Full Text:

PDF

References


Hafid Mammass and Fattehallah Ghadi, “Implementation of Smartcard Personalization Software,” International Journal of Future Generation Communication and Networking 2012; vol 5(4), p.39-54

F. Amounas and E.H. El Kinani, “A Novel Encryption Scheme of Amazigh Alphabet Based Elliptic Curve using Pauli Spin ½ Matrice,”International Journal of Information & Network Security (IJINS) 2013; vol 2(3),p. 190-196

Md.Zaheer Abbas, Dr.JVR Murthy, Authenticated And Policy - Compliant Source Routing. International Journal of Engineering Research and Applications (IJERA) 2012; vol 2(3), p.1347-1352.

Sridhar C. Iyer, R.R. Sedamkar, Shiwani Gupta, “A Novel Idea on Multimedia Encryption Using Hybrid Crypto Approach,” 7th International Conference on Communication, Computing and Virtualization-2016 (ICCCV-2016), Procedia Computer Science; Vol 79, p.293-298, ISSN: 1877-0509.

The Base16, Base32, and Base64 Data Encodings. IETF. October 2006. RFC 4648. Retrieved March 18, 2010

www.csrc.nist.gov/groups/ST/toolkit/documents/dss/NISTReCur.pdf; (1999).

NIST Special Publication 800-57, Recommendation for Key Management – Part 1: General, original version 2005, Table 4.

www.ecc-brainpool.org/download/Domain-parameters.pdf; (2005)

B. Padmavathi, S. Ranjitha Kumari, “A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique,” International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064; Volume 2 Issue 4, April 2013;p.170-174

L.D.Singh and K.M.Singh, “Image Encryption using Elliptic Curve Cryptography,” Eleventh International Multi-Conference on Information Processing-2015 (IMCIP-2015),Procedia Computer Science 54 ( 2015 );p.472 – 481.

Daemen, Joan, Rijmen, Vincent, “AES Proposal: Rijndael,” National Institute of Standards and Technology 2003; p. 1. Retrieved 21 February 2013.

R.L. Rivest, A. Shamir, and L. Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems” Communications of the ACM 1977; p. 120-126

Christof Paar, Jan Pelzl, "Elliptic Curve Cryptosystems", Chapter 9 of "Understanding Cryptography, A Textbook for Students and Practitioners". Springer, 2009.

Luciano, Dennis, Gordon Prichett,"Cryptology: From Caesar Ciphers to Public-Key Cryptosystems". The College Mathematics Journal 18; p.2–17. doi:10.2307/2686311

Jawahar Thakur, Nagesh Kumar, “DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis,” International Journal of Emerging Technology and Advanced Engineering Dec 2011; vol 1(2); p.6-12

S.M.Celestin, V.K.Muneeswaran, “Implementation of Text based Cryptosystem using Elliptic Curve Cryptography,” IEEE International Conference on Advanced Computing Dec 2009; p. 82-85.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.