Study on a Hybrid Encryption Method for Data Security Based on ARB3 Algorithm

Authors

  • Vijay Vamsi Nadakuditi Dept. of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Guntur, AP, India.
  • Radhika Rani Chintala Dept. of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Guntur, AP, India.

DOI:

https://doi.org/10.54489/ijcim.v4i2.472

Keywords:

Encryption Performance Optimization, Data Integrity, Hybrid Cryptography, ARB3 Algorithm

Abstract

In a world where cloud storing and online correspondence will increase in a faster pace, it will be very important that the cryptographic safeguarding will be such that will be solid and powerful. Even where traditional hybrid techniques of encryption have been found to be effective, it will not be spared of the problem of throughput bottleneck, performance pitfalls, and security vulnerabilities. To ensure synergy we will solve these problems using ARB3, a new algorithm to implement a hybrid cryptography approach to merge the strengths of Rivest-Shamir-Adleman, BLAKE3 hashing, and Advanced Encryption Standard into a new algorithm ARB3. The ARB3 Algorithm will take advantage of the high-performance and symmetric encoding of the AES, the trustworthy key exchange process of RSA, and, high performance hashing of BLAKE 3 to develop an inclusive security protocol. Using testing, we shall have the advantage of showing that ARB3 will be better in terms of processing speed and provide an innocuous mix of security characteristics and that it will surpass traditional hybrid models in encryption and decryption. The general increment in throughput in ARB3 will allow it to receive large amounts of data without affecting its security or speeds. The proposed solutions will not only demonstrate how effective ARB3 will be in eliminating security threats, but they also will play a significant role in upgrading its performance metrics, which will become critical in future data security. Since the restrictions of the existing hybrid cryptographic systems will be reconsidered, ARB3 is going to provide a more promising and effective way of converting and processing data in the framework of many applications. It will be a major breakthrough in the cryptography sphere. The paper will also highlight the relevance of this new hybrid mechanism of encryption that will be fitted to the changing requirements of data security.

References

H. Sharma, R. Kumar and M. Gupta, "A Review Paper on Hybrid Cryptographic Algorithms in Cloud Network," 2023 2nd International Conference for Innovation in Technology (INOCON), Bangalore, India, 2023, pp. 1-5, doi: 10.1109/INOCON57975.2023.10101044. DOI: https://doi.org/10.1109/INOCON57975.2023.10101044

E. Fernando, D. Agustin, M. Irsan, D. F. Murad, H. Rohayani and D. Sujana, "Performance Comparison of Symmetries Encryption Algorithm AES and DES With Raspberry Pi," 2019 International Conference on Sustainable Information Engineering and Technology (SIET), Lombok, Indonesia, 2019, pp. 353-357, doi: 10.1109/SIET48054.2019.8986122. DOI: https://doi.org/10.1109/SIET48054.2019.8986122

Q. Zhang, "An Overview and Analysis of Hybrid Encryption: The Combination of Symmetric Encryption and Asymmetric Encryption," 2021 2nd International Conference on Computing and Data Science (CDS), Stanford, CA, USA, 2021, pp. 616-622, doi: 10.1109/CDS52072.2021.00111. DOI: https://doi.org/10.1109/CDS52072.2021.00111

Z. Meng and Y. Wang, "Asymmetric Encryption Algorithms: Primitives and Applications," 2022 IEEE 2nd International Conference on Electronic Technology, Communication and Information (ICETCI), Changchun, China, 2022, pp. 876-881, doi: 10.1109/ICETCI55101.2022.9832032. DOI: https://doi.org/10.1109/ICETCI55101.2022.9832032

D. P., S. S. Babu, and Y. Vijayalakshmi, “Enhancement of e-commerce security through asymmetric key algorithm,” Comput. Commun., vol. 153, no. January, pp. 125–134, 2020, doi: 10.1016/j.comcom.2020.01.033. DOI: https://doi.org/10.1016/j.comcom.2020.01.033

N Jirwan, A Singh & S Vijay, “Review and Analysis of Cryptography Techniques”, Inter. J.Sci. Engineer. Res. 4(3): 1-6, 2019.

D. P. Timothy and A. K. Santra, "A hybrid cryptography algorithm for cloud computing security," 2017 International conference on Microelectronic Devices, Circuits and Systems (ICMDCS), Vellore, India, 2017, pp. 1-5, doi: 10.1109/ICMDCS.2017.8211728. DOI: https://doi.org/10.1109/ICMDCS.2017.8211728

A. Kumar, V. Jain and A. Yadav, "A New Approach for Security in Cloud Data Storage for IOT Applications Using Hybrid Cryptography Technique," 2020 International Conference on Power Electronics & IoT Applications in Renewable Energy and its Control (PARC), Mathura, Uttar Pradesh, India, 2020, pp. 514-517, doi: 10.1109/PARC49193.2020.236666. DOI: https://doi.org/10.1109/PARC49193.2020.236666

Dhuratë Hyseni, Artan Luma, Besnik Selimi, “The Proposed Model to Increase Security of Sensitive Data in Cloud Computing,” in International Journal of Advance Research in Engineering, Science and Technology, volume 9, No. 2, 2018. DOI: https://doi.org/10.14569/IJACSA.2018.090229

Lu, C. C., & Tseng, S. Y. “Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter. In Application Specific Systems, Architectures and Processors”, 2002. Proceedings. The IEEE International Conference on (pp. 277285).

P. V. Maitri and A. Verma, "Secure file storage in cloud computing using hybrid cryptography algorithm," 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 2016, pp. 1635-1638, doi: 10.1109/WiSPNET.2016.7566416. DOI: https://doi.org/10.1109/WiSPNET.2016.7566416

Kumar, Sanjeev & Karnani, Garima & Gaur, Madhu & Mishra, Anju. (2021). Cloud Security using Hybrid Cryptography Algorithms. 599-604. 10.1109/ICIEM51511.2021.9445377. DOI: https://doi.org/10.1109/ICIEM51511.2021.9445377

F. J. Aufa, Endroyono, and A. Affandi, “Security System Analysis in Combination Method: RSA Encryption and Digital Signature Algorithm,” Proc. - 2018 4th Int. Conf. Sci. Technol. ICST 2018, vol. 1, pp. 1–5, 2018, doi: 10.1109/ICSTC.2018.8528584. DOI: https://doi.org/10.1109/ICSTC.2018.8528584

I. T. Ciocan, E. A. Kelesidis, D. Maimuţ and L. Morogan, "A Modified Argon2i Using a Tweaked Variant of Blake3," 2021 26th IEEE Asia-Pacific Conference on Communications (APCC), Kuala Lumpur, Malaysia, 2021, pp. 271-274, doi: 10.1109/APCC49754.2021.9609933. DOI: https://doi.org/10.1109/APCC49754.2021.9609933

F. Kahri, B. Bouallegue, M. Machhout and R. Tourki, "An FPGA implementation of the SHA-3: The BLAKE hash function," 10th International Multi-Conferences on Systems, Signals & Devices 2013 (SSD13), Hammamet, Tunisia, 2013, pp. 1-5, doi: 10.1109/SSD.2013.6564030. DOI: https://doi.org/10.1109/SSD.2013.6564030

Baqtian, H & Ali Al-Aidroos, Naziha. (2023). Three Hash Functions Comparison on Digital Holy Quran Integrity Verification. 11. 1-7.

V. Verma, P. Kumar, R. K. Verma and S. Priya, "A Novel Approach for Security in Cloud Data Storage Using AES-DES-RSA Hybrid Cryptography," 2021 Emerging Trends in Industry 4.0 (ETI 4.0), Raigarh, India, 2021, pp. 1-6, doi: 10.1109/ETI4.051663.2021.9619274. DOI: https://doi.org/10.1109/ETI4.051663.2021.9619274

P. Chinnasamy and P. Deepalakshmi, "Design of Secure Storage for Health-care Cloud using Hybrid Cryptography," 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore, India, 2018, pp. 1717-1720, doi: 10.1109/ICICCT.2018.8473107. DOI: https://doi.org/10.1109/ICICCT.2018.8473107

B. P. Gajendra, V. K. Singh and M. Sujeet, "Achieving cloud security using third party auditor, MD5 and identity-based encryption," 2016 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, India, 2016, pp. 1304-1309, doi: 10.1109/CCAA.2016.7813920. DOI: https://doi.org/10.1109/CCAA.2016.7813920

Kr, Sajay & Sasidhar Babu, Dr & Vijayalakshmi, Yellepeddi. (2019). Enhancing the security of cloud data using hybrid encryption algorithm. Journal of Ambient Intelligence and Humanized Computing. 10.1007/s12652-019-01403-1. DOI: https://doi.org/10.1007/s12652-019-01403-1

S. Matte, A. Dubey, N. Shirsat, A. Kale, Hybrid model for securing E-commerce transaction, Int. J. Sci. Eng. Res. 9 (4) (2018) 25–26.

B. Swathi, S.D Bhaludra, S. Raveendranadh, “Secure File Storage In Cloud Computing Using Hybrid Cryptography Algorithm”, International Journal of Advance Research in Science and Engineering 6(11), 2017.

K. Tajane, R. Pitale, S. Zambre, H. Huda, A. Utage and V. Dhar, "Efficient Cloud Data Deduplication with Blake3 and Secure Transfer using AES," 2024 4th International Conference on Pervasive Computing and Social Networking (ICPCSN), Salem, India, 2024, pp. 572-579, doi:10.1109/ICPCSN62568.2024.00096. DOI: https://doi.org/10.1109/ICPCSN62568.2024.00096

Z. Li, "Exploration on Accounting Data Encryption Processing System Based on DES Algorithm," 2023 International Conference on Ambient Intelligence, Knowledge Informatics and Industrial Electronics (AIKIIE), Ballari, India, 2023, pp. 1-6, doi: 10.1109/AIKIIE60097.2023.10389923. DOI: https://doi.org/10.1109/AIKIIE60097.2023.10389923

C. Susmitha, S. Srineeharika, K. S. Laasya, S. K. Kannaiah and S. Bulla, "Hybrid Cryptography for Secure File Storage," 2023 7th International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 2023, pp. 1151-1156, doi: 10.1109/ICCMC56507.2023.10084073. DOI: https://doi.org/10.1109/ICCMC56507.2023.10084073

Murad, Sherief & Rahouma, Kamel. (2022). Hybrid Cryptography for Cloud Security: Methodologies and Designs. 10.1007/978-981-16-2275-5_7. DOI: https://doi.org/10.1007/978-981-16-2275-5_7

K. Jaspin, S. Selvan, S. Sahana and G. Thanmai, "Efficient and Secure File Transfer in Cloud Through Double Encryption Using AES and RSA Algorithm," 2021 International Conference on Emerging Smart Computing and Informatics (ESCI), Pune, India, 2021, pp. 791-796, doi: 10.1109/ESCI50559.2021.9397005. DOI: https://doi.org/10.1109/ESCI50559.2021.9397005

V. Sharma, A. Chauhan, H. Saxena, S. Mishra and S. Bansal, "Secure File Storage on Cloud using Hybrid Cryptography," 2021 5th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 2021, pp. 1-6, doi: 10.1109/ISCON52037.2021.9702323. DOI: https://doi.org/10.1109/ISCON52037.2021.9702323

E. Jintcharadze and M. Iavich, "Hybrid Implementation of Twofish, AES, ElGamal and RSA Cryptosystems," 2020 IEEE East-West Design & Test Symposium (EWDTS), Varna, Bulgaria, 2020, pp. 1-5, doi: 10.1109/EWDTS50664.2020.9224901. DOI: https://doi.org/10.1109/EWDTS50664.2020.9224901

S. A. Ahmad and A. B. Garko, "Hybrid Cryptography Algorithms in Cloud Computing: A Review," 2019 15th International Conference on Electronics, Computer and Computation (ICECCO), Abuja, Nigeria, 2019, pp. 1-6, doi: 10.1109/ICECCO48375.2019.9043254. DOI: https://doi.org/10.1109/ICECCO48375.2019.9043254

Y. Sharma, H. Gupta and S. K. Khatri, "A Security Model for the Enhancement of Data Privacy in Cloud Computing," 2019 Amity International Conference on Artificial Intelligence (AICAI), Dubai, United Arab Emirates, 2019, pp. 898-902, doi: 10.1109/AICAI.2019.8701398. DOI: https://doi.org/10.1109/AICAI.2019.8701398

I. J. Mathematical Sciences and Computing, 2020, 4, 35-41 Published Online August 2020 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmsc.2020.04.04 DOI: https://doi.org/10.5815/ijmsc.2020.04.04

Downloads

Published

2024-12-28

How to Cite

Study on a Hybrid Encryption Method for Data Security Based on ARB3 Algorithm. (2024). International Journal of Computations, Information and Manufacturing (IJCIM), 4(2), 15-25. https://doi.org/10.54489/ijcim.v4i2.472

Similar Articles

11-20 of 40

You may also start an advanced similarity search for this article.