Performance Evaluation of Hybrid Cryptography System

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2017 by IJETT Journal
Volume-54 Number-4
Year of Publication : 2017
Authors : Er. Parvin Shaikh, Dr. Sonali Patil
DOI :  10.14445/22315381/IJETT-V54P235

Citation 

Er. Parvin Shaikh, Dr. Sonali Patil "Performance Evaluation of Hybrid Cryptography System", International Journal of Engineering Trends and Technology (IJETT), V54(4),255-263 December 2017. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
The spectacular growth of the Internet has make an increased awareness of an interest in security issues. Although Security is measure concern over internet, many applications have been developed and designed without considering main objectives of information security that is confidentiality, authentication, and privacy. As our daily activities become more and more reliant upon data networks, the importance of an understanding of Such security issues will alsoincrease. Cryptography plays important role in secure data communication. First Phase of thispaper presents the development of Hybrid Cryptography system which containsChaffing & Winnowing Algorithm, Diffie-Hellman Key Exchange Algorithm and Advanced Encryption Standard (AES)algorithm and second phase of the paper shows the performance evaluation of AES, Chaffing & Winnowing, Diffie Hellman Key Exchange Algorithm and Hybrid Cryptographic Algorithms. Cryptography algorithms provide a secure data communication over the internet and play key role in any security system. In this paper, different experiments have been conducted to compare these algorithms in term of encryption time, decryption time and throughput over variable concurrency for fixed time and BruteForce attack resistance capability among all algorithm.

Reference
[1] https://en.wikipedia.org/wiki/Chaffing_and_winnowing.
[2] Aaron D Schroeder, “Pad and Chaff: Secure Approximate String Matching in Private Record Linkage”.
[3] The People’s Armed Police Force Academy of China , “Research on Diffie-Hellman Key Exchange Protocol”, 2nd International Conference on Computer Engineering and Technology [Volume 4] , 2010.
[4] Abdullah Al Hasib, Abul Ahsan Md. MahmudulHaque , “A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography” Third International Conference on Convergence and Hybrid Information Technology, 2008.
[5] Shahzadi farah, m. Younas javed, Azra shamim, Tabassam nawaz “An experimental study on Performance Evaluation of Asymmetric Encryption Algorithms” WSEAS 3rd European Conference of Computer Science (WSEAS ECCS) December 2012.
[6] DepavathHarinath, M V Ramana Murthy, B Chitra, “Cryptographic Methods and Performance Analysis of Data Encryption Algorithms In Network Security” International Journal Of Advanced Research In Computer Science And Software Engineering, Volume 5, Issue 7, July 2015.
[7] Manju Rani, Dr. Sudesh Kumar, “Analysis on Different Parameters of Encryption Algorithms for Information Security” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 8, August 2015.
[8] O.O. Adekanmbi, O.O. Omitola, T.R. Oyedare, S.O. Olatinwo, “Performance Evaluation of Common Encryption Algorithms for Throughput and Energy Consumption of a Wireless System” Journal of Advancement in Engineering and Technology” Voume3 /Issue1, June 2015.

Keywords
Encryption, Decryption, Hybrid Cryptography, Diffie Hellman Key Exchange, AES, Chaffing and Winnowing.