Abstract
Being into the world of data, it is essential to provide a solution to secure the data. The Internet of things (IoT) and the cloud are disruptive technologies that have made the embedded engineers to make things go smarter. As both the technologies are considered, there are so many security issues faced. Thus in this work, a hybridised algorithm has been designed to provide better security. It incorporates the advantages of both the symmetric algorithm (Advanced Encryption Standard (AES)) and the public key cryptographic algorithm (Rivest–Shamir–Adleman (RSA)) to bring out a hybridised algorithm. The 4086 bits of paired keys are generated through RSA in order to provide better security as it is hard to attack and also it provides good key management. On the other hand, the AES withstands the linear and differential attacks. Comparing to the standard implementation of RSA and AES, this hybrid algorithm has less computation time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Saarikko T, Westergren UH, Blomquist T (2020) The internet of things: Are you ready for what’s coming?
Mankar C (2016) Internet of things (IoT) an evolution. 5:772–775
Comput JPD, Wu L, Chen B, Choo KR, He D (2018) Efficient and secure searchable encryption protocol for cloud-based internet of things. 111:152–161
Bandyopadhyay D, Sen J (2011) Internet of things: applications and challenges in technology and standardization. 49–69
Stergiou C, Psannis KE (2018) Sustainable computing: Informatics and systems security, privacy and efficiency of sustainable cloud computing for big data and IoT. 19:174–184
Zhou J, Leppänen T, Harjula E, Yu C, Jin H, Yang LT (2013) Cloud things: a common architecture for integrating the internet of things with cloud computing. 651–657
Catteddu D (2010) Cloud computing: benefits, risks and recommendations for information security. In: Serrão C, Aguilera DÃaz V, Cerullo F (eds) Web application security. Springer Berlin Heidelberg, Berlin, p 17
Patidar S (2012) A survey paper on cloud computing. 2012 Second Int. Conf. Adv. Comput. Commun. Technol. 394–398
Botta A, De Donato W, Persico V, Pescapé A (2016) Integration of cloud computing and internet of things: a survey. 56:684–700
Bittencourt L, Immich R, Sakellariou R, Fonseca N, Madeira E, Curado M, Villas L, Dasilva L, Lee C, Rana O (2018) Internet of things the internet of things, fog and cloud continuum: integration and challenges. 4:134–155
Taki AE, Deen E (2016) Design and implementation of hybrid encryption algorithm
Kumar S, Goudar RH (2012) Cloud computing—research issues, challenges, architecture, platforms and applications: a survey. 1
Jadeja Y (2014) Cloud computing—concepts, architecture and challenges
Nisha S, Farik M (2017) RSA public key cryptography algorithm a review. Int J Sci Technol Res 6:7
New Attacks on the RSA Cryptosystem, Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Diee I. Nassr, Hatem M. Bahig. Part of the Lecture Notes in Computer Science book series (LNCS, volume 8469)
Boneh D, Rsa T, Rivest R, Shamir A, Adleman L (1977) Twenty years of attacks on the RSA cryptosystem 1 introduction. 1–16
Student MT (2013) A new design of algorithm for enhancing security in bluetooth communication with triple DES. 2:252–256
Mahdi JA (2009) Design and implementation of proposed BR encryption algorithm. Ijcccse 9:1–17
Akkar M-L, Giraud C (2001) An implementation of DES and AES, secure against some attacks. In: Koç ÇK, Naccache D, Paar C (eds) Cryptographic hardware and embedded systems—CHES 2001. Springer Berlin Heidelberg, Berlin, pp 309–318
Devi A, Sharma A, Rangra A (2015) Performance analysis of symmetric key algorithms: DES, AES and blowfish for image encryption and decryption. 4:12646–12651
Vashishtha J (2012) Evaluating the performance of symmetric key algorithms: AES (Advanced Encryption Standard) and DES (Data Encryption Standard). 15:43–49
Albahar MA, Olawumi O, Haataja K, Toivanen P (2018) Novel hybrid encryption algorithm based on AES, RSA, and Twofish for Bluetooth Encryption. 168–176
Stergiou C, Psannis KE, Kim B, Gupta B (2018) Secure Integ IoT Cloud Comput 78:964–975
Milanov E (2009) The RSA algorithm. 1–11
Zhou X, Tang X (2011) Research and implementation of RSA algorithm for encryption and decryption. Proc 2011 6th Int Forum Strateg Technol 2:1118–1121
NaQi, Wei Wei (2013) Analysis and Research of RSA algorithm. Information Technology Journal 12(9):1818–1824
Saveetha P, Arumugam S (2012) Study on improvement in RSA algorithm and its implementation. Int J Comput Commun Technol 3:975–7449
Abdullah AM (2017) Advanced encryption standard (AES) Algorithm to encrypt and decrypt data
Teja T, Hemalatha V (2017) Encryption and decryption—data security for cloud computing—using AES algorithm. 80–83
Katagi M, Moriai S (2008) Lightweight cryptography for the internet of things. Sony Corp. 7–10
Acknowledgements
The authors are grateful to the Department of Science & Technology, New Delhi, India (SR/FST/ETI-371/2014) for their financial support. They also wish to acknowledge SASTRA Deemed University, Thanjavur, for extending infrastructural support to carry out the work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kanagaraj, P., Doraipandian, M. (2020). Design and Implementation of Hybrid Cryptographic Algorithm for the Improved Security. In: Sengodan, T., Murugappan, M., Misra, S. (eds) Advances in Electrical and Computer Technologies. Lecture Notes in Electrical Engineering, vol 672. Springer, Singapore. https://doi.org/10.1007/978-981-15-5558-9_36
Download citation
DOI: https://doi.org/10.1007/978-981-15-5558-9_36
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-5557-2
Online ISBN: 978-981-15-5558-9
eBook Packages: Computer ScienceComputer Science (R0)