Generic placeholder image

Micro and Nanosystems

Editor-in-Chief

ISSN (Print): 1876-4029
ISSN (Online): 1876-4037

Review Article

Chi-Squared Test Analysis on Hybrid Cryptosystem

Author(s): Najmul Hoque Munshi*, Proteeti Das and Subhasis Maitra

Volume 14, Issue 1, 2022

Published on: 08 May, 2021

Page: [34 - 40] Pages: 7

DOI: 10.2174/1876402913666210508235706

Price: $65

Abstract

Nowadays, the internet has reached every aspect of our day-to-day life. The idea of cryptography is to provide security. It is an encryption technique used for network security when different networks are interconnected and become vulnerable to attacks and intrusions. Different algorithms, like DES, 3-DES, Modified DES, RSA, and Modified RSA algorithms for encryption, have been reported. In this paper, a hybrid cryptosystem which is the combination of the traditional DES and RSA has been discussed. The performance analysis, such as the chi-squared test and then frequency analysis of the hybrid algorithm have been discussed in this article to show the novelty of the combined DES and RSA work, and a comparative study has been performed with the traditional DES and RSA techniques. The chi-squared methodology is a statistical way of evaluating the quality of ciphertext. If the ciphertext needs to be strong then a high value of chi-squared is desired.

Keywords: Data security, cryptographic security, hybrid cryptography, DES, RSA, AES, chi-squared test.

Graphical Abstract

[1]
Stallings, W. Cryptography and Network Security Principles and Practices, Fourth Edition; Pearson Education: Prentice Hall, 2009.
[2]
Kahate, A. Cryptography and Network Security, 2nd ed; McGraw Hill: Tata, 2009.
[3]
Hu, Z. Network and Information Security; Tsinghua University Press: Peking, 2006.
[4]
Soumik, Sen; Subhashis, Maitra. Three levels three dimensional compact coding. ACM SIGARCH Comp Architect News 13 2014, 42(2)
[5]
Ren, W.; Miao, Z. A hybrid encryption algorithm based on DES and RSA in bluetooth communication. 2010Second International Conference on Modeling, Simulation and Visualization Methods, Sanya2010, pp. 221-225.
[http://dx.doi.org/10.1109/WMSVM.2010.48]
[6]
Hussain, M.C. Negi; Pandey, N. A secure IoT-based power plant control using RSA and DES encryption techniques in data link layer. International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions) (ICTUS), Dubai, 2017, pp. 464-470.
[7]
Amalarethinam, G.; Leena, H.M. Enhanced RSA algorithm with varying key sizes for data security in cloud. World Congress on Computing and Communication Technologies (WCCCT), Tiruchirappall 2017, pp. 172-175.
[http://dx.doi.org/10.1109/WCCCT.2016.50]
[8]
Gayathri Devi, P. Overview of RSA and its enhancements. Int. J. Innov. Res. Dev., 2013, 2(11), 306-310.
[9]
Patel Sarthak, R. Khushbu, Shah. Security enhancement and speed monitoring of RSA algorithm. Int. J. Eng. Dev. Res., 2014, 2, 2057-2063.
[10]
George Amalarethinam, D.I.; J Sai, Geetha; Mani, K. Analysis and enhancement of speed in public key cryptography using message encoding algorithm. Indian J. Sci. Technol., 2015, 8, 1-7.
[http://dx.doi.org/10.17485/ijst/2015/v8i16/69809]
[11]
Khanezaei, N. Zurina Mohd, Hanapi. A framework based on RSA and AES encryption algorithms for cloud computing services; IEEE, 2016, pp. 58-62.
[12]
Vishwanath, S. Mahalle; Aniket K., Shahade. Enhancing the data security in Cloud by implementing Hybrid (Rsa & Aes) Encryption Algorithm; IEEE, 2016, pp. 146-149.
[13]
Srinivasan Nagaraj, G.S.V.P.; Raju, V. Srinath. Data encryption and authentication using public key approach. Elsevier Proc. Comput. Sci., 2015, 48, 126-132.
[http://dx.doi.org/10.1016/j.procs.2015.04.161]
[14]
Arun Fera, M.; Manikandaprabhu, C.; Ilakiya Natarajan, K.; Brinda, R. Darathiprincy Enhancing security in cloud using trusted monitoring framework. Elsevier Proc. Comput. Sci., 2015, 48, 198-203.
[http://dx.doi.org/10.1016/j.procs.2015.04.170]
[15]
Thein, N.; Nugroho, H.A.; Adji, T.B.; Mustika, I.W. Comparative performance study on ordinary and chaos image encryption schemes. International Conference on Advanced Computing and Applications (ACOMP), Ho Chi Minh City2017, pp. 122-126.
[http://dx.doi.org/10.1109/ACOMP.2017.25]
[16]
Guo, W.; Li, Z.; Chen, Y.; Zhao, X. Security design for instant messaging system based on RSA and triple DES. International Conference on Image Analysis and Signal Processing, Taizhou2009, pp. 415-418.
[17]
Thakur, J.; Kumar, N. DES AES and Blowfish: Symmetric key cryptography algorithms simulation-based performance analysis. Int. J. Emerg. Technol. Adv. Eng., 2011, 1, 6-12.
[18]
Abood, O.G.; Elsadd, M.A.; Guirguis, S.K. Investigation of cryptography algorithms used for security and privacy protection in smart grid. Nineteenth International Middle East Power Systems Conference (MEPCON), Cairo2017, pp. 644-649.
[http://dx.doi.org/10.1109/MEPCON.2017.8301249]
[19]
Diaa, M. Salama, Abdul; Hatem, Elminaam; Mohamed, Abdul; Kader, Mohie; Mohamed, Hadhoud. Performance evaluation of symmetric encryption algorithms. Int. J. Comput. Sci. Net. Sec., 2008, 8(12), 280-286.
[20]
Swathi, S.V.; Lahari, P.; Bindu, T. Encryption algorithms: a survey. Int. J. Adv. Res. Comput. Sci. Technol., 2016, 4(2), 81-88.
[21]
Gurpreet, S. A study of encryption algorithms (RSA DES 3DES and AES) for information security. Int. J. Comput. Appl., 2013, 67(19)
[22]
Kumar, A.; Mandal, C.; Tiwari, P.A. Performance evaluation of cryptographic algorithms: DES and AES. Conference on Electrical Electronics and Computer Science, , pp. 1-5.2012
[23]
Chueh, J.; Sun, M. Design and implementation of a security system for cloud storage. 19th Asia-Pacific Network Operations and Management Symposium (APNOMS), Seoul2017, pp. 129-134.
[http://dx.doi.org/10.1109/APNOMS.2017.8094191]
[24]
Panda, M. Performance analysis of encryption algorithms for security. International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), Paralakhemundi 2016, pp. 278-284.
[http://dx.doi.org/10.1109/SCOPES.2016.7955835]
[25]
Riman, C.; Hallal, H. DES based educational data encryption system. International Conference on Security and Management SAM 2013 (WORLDCOMP’13), Las Vegas, USA 2013.
[26]
Mota, A.V.; Azam, S.; Shanmugam, B.; Yeo, K.C.; Kannoorpatti, K. Comparative analysis of different techniques of encryption for secured data transmission. IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), Chennai2017, pp. 231-237.
[http://dx.doi.org/10.1109/ICPCSI.2017.8392158]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy