Hybrid Encryption Techniques

Verified

Added on  2023/04/21

|3
|541
|376
AI Summary
This document discusses hybrid encryption techniques used in equipment information management. It explores the advantages of hybrid encryption in data security and efficiency.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: HYBRID ENCRYPTION TECHNIQUES
HYBRID ENCRYPTION TECHNIQUES
Name of the student:
Name of the university:
Author note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1HYBRID ENCRYPTION TECHNIQUES
Hybrid encryption scheme:
Hybrid encryption scheme is used in equipment information management. There are
different other kinds of protocol such as TCP/IP etc., for transmission of data over a secured
network Gentry, (Groth et al. 2015). However, the differences in these protocols are seen in
the aspects of security, performance and usability compared to the other protocols.
The hybrid encryption schemes that make use of internet of technology. The
information encryption using IOT is extremely vulnerable to attack from the hackers. This is
one of the major challenges of equipment management, since every mobile devices should be
monitored on a real time basis, which needs human interference (Kuppuswamy and Khalidi
2014). The machines as well as sensor nodes that are deployed remain unattended in most
cases thereby leaving them vulnerable to attacks from the hackers.
The hybrid encryption technologies such as hybrid cryptography gives more data
security for information encryption as well as data decryption of data. Hybrid Cryptography
is extremely fast and efficient since it has the ability to encrypt large chunks of data and
solves the issue of key distribution as well (Moghaddam, Alrashdan and Karimi 2013).
Maximum information security is also provided in less amount of time sue to the high-speed
data encryption using hybrid encryption technologies.
One of the major advantages of this technique is that it allows reusability of the keys
by combining the AES and CAST-128 algorithm of encryption (Xu et al. 2016). By the
usability of the keys in different domains, it improves the overall performance as well as
efficiency of the encryption techniques thereby providing better data security. Since the
system is to be used and monitored by humans, it will be able to proactively determine and
data corruption issues in case the network is hacked from the outside world thereby ensuring
optimum information protection.
Document Page
2HYBRID ENCRYPTION TECHNIQUES
References:
Gentry, C., Groth, J., Ishai, Y., Peikert, C., Sahai, A. and Smith, A., 2015. Using fully
homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs. Journal
of Cryptology, 28(4), pp.820-843.
Kuppuswamy, P. and Al-Khalidi, S.Q., 2014. Hybrid encryption/decryption technique using
new public key and symmetric key algorithm. MIS Review: An International Journal, 19(2),
pp.1-13.
Moghaddam, F.F., Alrashdan, M.T. and Karimi, O., 2013. A hybrid encryption algorithm
based on rsa small-e and efficient-rsa for cloud computing environments. Journal of
Advances in Computer Networks, 1(3), pp.238-241.
Xu, J., Wen, Q., Li, W. and Jin, Z., 2016. Circuit ciphertext-policy attribute-based hybrid
encryption with verifiable delegation in cloud computing. IEEE Transactions on Parallel and
Distributed Systems, 27(1), pp.119-129.
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]