Skip to main content

Designing a New Hybrid Cryptographic Model

  • Conference paper
  • First Online:
Cyber Security and Computer Science (ICONCS 2020)

Abstract

With the rapid development of technology, one of the most important requirements in today’s systems is the reliable transfer of information and confidentiality. Thus, military, electronics, banking systems and many other places have become the fields of use of cryptography science. Cryptology methods are used to solve these problems and need of secure information transfer resulted in the development of reliable encryption techniques. In this study, a new poly-alphabetic substitution cipher is designed using the coordinate axes. The proposed method of a hybrid encryption method is a mix of the Polybius square cipher and the Vigenère cipher, reinforced with the RSA cryptography algorithm. For each letter in the alphabet, there is more than one point on Cartesian coordinate system and in the calculation of these points random chosen values are used. Values used to calculate alphabet and start index of alphabet are send to receiver using RSA algorithm with cipher text. So, with multiple security stages the proposed method is a strong encryption method that is difficult to decode.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Katz, J., Lindell, Y.: Introduction to Modern Cryptography: Principles and Protocols. Chapman & Hall, London (2008)

    MATH  Google Scholar 

  2. Koç, Ç.: Cryptographic Engineering. Springer, Heidelberg (2009)

    Book  Google Scholar 

  3. Paar, C., Pelzl, J.: Understanding Cryptography: A Textbook for Student and Practitioners. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-04101-3

    Book  MATH  Google Scholar 

  4. Kumar, Y., Munjal, R., Sharma, H.: Comparison of symmetric and asymmetric cryptography with existing vulnerabilities and countermeasures. IJCSMS Int. J. Comput. Sci. Manag. Stud. 11(03), 60–63 (2011)

    Google Scholar 

  5. FIPS 46–3, Data Encryption Standard. National Institute of Standarts and Technology (NIST) (1999)

    Google Scholar 

  6. FIPS 197, Announcing the ADVANCED ENCRYPTION STANDARD (AES). National Institute of Standarts and Technology (NIST) (2001)

    Google Scholar 

  7. Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. CACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  8. Chaudhury, P., et al.: ACAFP: asymmetric key based cryptographic algorithm using four prime numbers to secure message communication. A review on RSA algorithm. In: 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON), Bangkok, pp. 332–337(2017)

    Google Scholar 

  9. Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, Hugh C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986). https://doi.org/10.1007/3-540-39799-X_31

    Chapter  Google Scholar 

  10. Ratna, A. A. P., Purnamasari, P. D., Shaugi, A., Salman, M.: Analysis and comparison of MD5 and SHA-1 algorithm implementation in simple-O authentication based security system. In: 2013 International Conference on QiR, pp. 99–104 (2013)

    Google Scholar 

  11. Rivest, R.: The MD5 Message-Digest Algorithm. Network Working Group, MIT Laboratory for Computer Science and RSA Data Security, Inc., April 1992

    Google Scholar 

  12. Chaves, R., Sousa, L., Sklavos, N., Fournaris, A.P., Kalogeridou, G., Kitsos, P., Sheikh, F.: Secure Hashing: SHA-1, SHA-2, and SHA-3. Taylor & Francis Group, LLC, Milton Park (2016)

    Google Scholar 

  13. Selcuk, B, Tankul, A.N.A., Dundar, A., Akkus, Z., Arslan, M.: Designing a new hybrid cryptographic model using coordinate axes. Anatolian J. Comput. Sci. (accepted)

    Google Scholar 

  14. Highland, H.J.: Data encryption: a non-mathematical approach. Comput. Sec. 16(5), 369–386 (1997)

    Article  Google Scholar 

  15. Paul, A.J., Mythili, P.: Poly-alphabetic substitution mapping for cryptographic transformations. In: Conference: National Conference on Recent Innovations in Technology, March 2009

    Google Scholar 

  16. Kartha, R.S., Paul, V.: An efficient algorithm for polyalphabetic substitution using infinite number of alphabetical tables. Int. J. Appl. Eng. Res. 13(4), 14–20 (2018)

    Google Scholar 

  17. Aung, T.M., Naing, H.H., Hla, N.N.: A complex transformation of monoalphabetic cipher to polyalphabetic cipher: (Vigenère-Affine cipher). Int. J. Mach. Learn. Comput. 9(3), 296–303 (2019)

    Article  Google Scholar 

  18. Saraswat, A., Khatri, C., Thakral, P., Biswas, P.: An extended hybridization of vigenère and caesar cipher techniques for secure communication. Proc. Comput. Sci. 92, 355–360 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Burhan Selçuk .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Selçuk, B., Tankül, A.N.A. (2020). Designing a New Hybrid Cryptographic Model. In: Bhuiyan, T., Rahman, M.M., Ali, M.A. (eds) Cyber Security and Computer Science. ICONCS 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 325. Springer, Cham. https://doi.org/10.1007/978-3-030-52856-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-52856-0_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-52855-3

  • Online ISBN: 978-3-030-52856-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics