Detailed Protocol Design and Analysis: Hybrid Encryption Schemes

Verified

Added on  2023/04/21

|3
|541
|376
Project
AI Summary
This project focuses on hybrid encryption schemes, specifically in the context of equipment information management. The student has identified the vulnerability of IoT-based information encryption to attacks and highlights the need for robust security measures. The assignment involves designing a detailed protocol using a hybrid encryption scheme, considering aspects like security, performance, and usability. The student's analysis compares the designed protocol with non-hybrid encryption protocols, emphasizing the importance of usability in protocol design to prevent breaches. The project leverages existing research, referencing works by Gentry, Groth et al., Kuppuswamy and Al-Khalidi, Moghaddam, Alrashdan, and Karimi, and Xu et al., to support the design and analysis of the hybrid encryption scheme. This project will be published on Desklib, a platform providing AI-based study tools for students to access past papers and solved assignments.
Document Page
Running head: HYBRID ENCRYPTION TECHNIQUES
HYBRID ENCRYPTION TECHNIQUES
Name of the student:
Name of the university:
Author note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1HYBRID ENCRYPTION TECHNIQUES
Hybrid encryption scheme:
Hybrid encryption scheme is used in equipment information management. There are
different other kinds of protocol such as TCP/IP etc., for transmission of data over a secured
network Gentry, (Groth et al. 2015). However, the differences in these protocols are seen in
the aspects of security, performance and usability compared to the other protocols.
The hybrid encryption schemes that make use of internet of technology. The
information encryption using IOT is extremely vulnerable to attack from the hackers. This is
one of the major challenges of equipment management, since every mobile devices should be
monitored on a real time basis, which needs human interference (Kuppuswamy and Khalidi
2014). The machines as well as sensor nodes that are deployed remain unattended in most
cases thereby leaving them vulnerable to attacks from the hackers.
The hybrid encryption technologies such as hybrid cryptography gives more data
security for information encryption as well as data decryption of data. Hybrid Cryptography
is extremely fast and efficient since it has the ability to encrypt large chunks of data and
solves the issue of key distribution as well (Moghaddam, Alrashdan and Karimi 2013).
Maximum information security is also provided in less amount of time sue to the high-speed
data encryption using hybrid encryption technologies.
One of the major advantages of this technique is that it allows reusability of the keys
by combining the AES and CAST-128 algorithm of encryption (Xu et al. 2016). By the
usability of the keys in different domains, it improves the overall performance as well as
efficiency of the encryption techniques thereby providing better data security. Since the
system is to be used and monitored by humans, it will be able to proactively determine and
data corruption issues in case the network is hacked from the outside world thereby ensuring
optimum information protection.
Document Page
2HYBRID ENCRYPTION TECHNIQUES
References:
Gentry, C., Groth, J., Ishai, Y., Peikert, C., Sahai, A. and Smith, A., 2015. Using fully
homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs. Journal
of Cryptology, 28(4), pp.820-843.
Kuppuswamy, P. and Al-Khalidi, S.Q., 2014. Hybrid encryption/decryption technique using
new public key and symmetric key algorithm. MIS Review: An International Journal, 19(2),
pp.1-13.
Moghaddam, F.F., Alrashdan, M.T. and Karimi, O., 2013. A hybrid encryption algorithm
based on rsa small-e and efficient-rsa for cloud computing environments. Journal of
Advances in Computer Networks, 1(3), pp.238-241.
Xu, J., Wen, Q., Li, W. and Jin, Z., 2016. Circuit ciphertext-policy attribute-based hybrid
encryption with verifiable delegation in cloud computing. IEEE Transactions on Parallel and
Distributed Systems, 27(1), pp.119-129.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]