Combine and Multilevel Implementation of Cryptographic and Data Hiding Algorithms to Provide a Hybrid Data-Security Scheme

Authors

  • Syed Muhammad Jamil Shah Department of Electrical Engineering, Institute of Space Technology (IST), Islamabad, Pakistan.
  • Prof. Qamar ul Islam Department of Electrical Engineering, Institute of Space Technology (IST), Islamabad, Pakistan.

Keywords:

Cryptography, Steganography, Hybrid approach of AES and ECC, Symmetric Key, Asymmetric Key, Public Key, Private Key, Hybrid Cryptographic Security.

Abstract

It is generally accepted that data encryption is the key role in current and future technologies for information security. Cryptography plays an important task in accomplishing information security. Elliptic Curve Cryptography (ECC) is considered as more suitable for limited resources applications such as RFID, and for Chip based Systems such as modern day Pervasive and ubiquitous Computing Communication Systems, than other public key cryptography algorithms because of its small key size. Generally, a random generator is used to produce. ECC domain parameters. Here in this work, we have proposed “Combine and Multilevel Implementation of AES & ECC along with Steganography to provide a Hybrid Cryptographic Security technic in Data communication Systems. Which will help in development of an algorithm to secure the data of users (both Wired and Wireless/Satellite Communication) in complex manner with more security and accuracy by implementing multilevel and hybrid scheme of AES and ECC encryption algorithms along with Steganography. The design is implemented using the MATLAB R2012a simulations. The data is secured using the resulted public and private keys (generated by ECC in combination with (AES) encryption and decryption process) along with the technic of steganography for hiding this encrypted data in a fake message or Image to provide the strong cryptographic solution for highly secured data communication systems. It is tested over plain text and image with multiple data sizes. Furthermore, in order to elaborate the effectiveness of the proposed scheme, we provided a comprehensive performance analysis (evaluation) of the approach: hybrid implementation of symmetric and asymmetric key cryptographic algorithms w.r.t these parameters: time elapsed, data sizes, key sizes (variance of Key Space) and impact of steganography. 

References

[1] W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, IT-22(6):644–654, Nov 1976.
[2] Forouzan Behrouz “Cryptography & Network Security”,McGraw-Hill Forouzan Networking , 2007.
[3] Neal Koblitz “Elliptic curve cryptosystems”, Mathematics of Computation /American Mathematical Society, 203-209, 1987. V.S. Miller “Use of elliptic curves in cryptography”. In CRYPTO'85: Proceedings of Crypto, 417- 426, Springer, 1985.
[4] M. Alimohammadi, and A. A. Pouyan, “Performance Analysis of Cryptography Methods for Secure Message Exchanging in VANET”, International Journal of Scientific & Engineering Research, Volume 5, Issue 2, February-2014, ISSN 2229-5518
[5] Nadeem, A., Javed, M.Y., 2005 "A Performance Comparison of Data Encryption Algorithms," IEEE, Information and Communication Technologies, ICICT, First International Conference, pp. 84- 89. [6] D. S. Abdul, Elminaam, H. M. Abdul Kader and M. M. Hadhoud, 2009 "Performance Evaluation of Symmetric Encryption Algorithms" Communications of the IBIMA Volume 8, ISSN: 1943-7765.
[7] Practical Evaluation of Hybrid Cryptosystems Ijaz Ali Shoukat1,2, Abdullah Al-Dhelaan1, Mznah AlRodhaan1, Kamalrulnizam Abu Bakar2, Subariah Ibrahim2.
[8] H. Tange and B. Andersen, “Attacks and Countermeasures on AES and ECC,” in IEEE International Symposium onWireless Personal Multimedia Communications (WPMC), pp. 1-5, Jun. 2013.

Downloads

Published

2017-06-12

How to Cite

Shah, S. M. J., & ul Islam, P. Q. (2017). Combine and Multilevel Implementation of Cryptographic and Data Hiding Algorithms to Provide a Hybrid Data-Security Scheme. American Scientific Research Journal for Engineering, Technology, and Sciences, 32(1), 266–281. Retrieved from https://asrjetsjournal.org/index.php/American_Scientific_Journal/article/view/2983

Issue

Section

Articles