Hybrid Encryption Scheme: Application in SSL Protocol and Comparison

Verified

Added on  2022/12/21

|4
|798
|8
Report
AI Summary
This report provides a detailed analysis of hybrid encryption schemes, focusing on their application in securing data transmission. It begins by introducing the hybrid encryption algorithm, which combines symmetric and asymmetric encryption techniques to leverage the strengths of both. The report then explores the practical application of hybrid encryption in the Secure Sockets Layer (SSL) protocol, explaining how it establishes secure connections between web servers and clients. A comparison is made between the SSL protocol, which utilizes hybrid encryption, and the Data Encryption Standard (DES) algorithm, evaluating them based on security, performance, and usability. The analysis highlights the advantages of hybrid encryption in terms of key exchange security and overall protocol efficiency, concluding with a summary of the benefits of the SSL protocol in ensuring secure communication over networks.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: HYBRID ENCRYPTION
Hybrid Encryption
Name of the Student
Name of the University
Author’s Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
HYBRID ENCRYPTION
Hybrid Encryption Scheme application Scenario
The encryption algorithm is used for the improving the security for transmission of data
packets and helps in maintaining authentication, integrity, authentication and non-repudiation.
The hybrid encryption algorithm is a combination of two of more encryption algorithm for
performing different functionality. The combination of symmetric and the asymmetric helps in
utilization of public key framework and improve the encryption and decryption of the data. In
this scheme a random secret key is generated and it is encrypted with the public key of the
recipient (Cheon and Kim 2015). The message or data that is sent is encrypted with the secret
key and the cipher. The secret key that is encrypted and message is sent to the recipient. The
private key of the recipient is used for decryption of the secret key and then uses it for decryption
of the message. This type of cryptography is used in case of the SSL connection, PGP and SSH.
Use of Hybrid encryption scheme
The SSL protocol is used for establishing a secure connection between the web server
and the client in a public insecure network for example, the internet. The secure socket layer
protocol works on the public and private key encryption with the inclusion of cryptographic
function for securing the connection between the remote and the destination machine such as the
mail server and client machine which communicates over internet and TCP/IP network (Oppliger
2016). It creates a mechanism for the encryption and authentication of data that are sent between
the different process run on server and client. It also acts as a media for enabling secure
exchange of the private keys and encryption of a session. A SSL certificate can be issued by the
trust certificate authority for exchanging the private keys and its runs on session, presentation
and application layer for transporting the data between routing the data traffic and process over
Document Page
2
HYBRID ENCRYPTION
the network for client and server. It also works with the physical or data link layer i.e. with the
HTTP and SMTP protocol (Zickau et al. 2016). The part of socket is used for passing data
between the server and the client.
Analysis and comparison of protocol
The SSL protocol based on hybrid encryption scheme is compared with the DES
algorithm and it is compared based on the following criteria.
Security – DES is a symmetric key crypto system and uses a single key for encryption
and decryption of a message and thus the key is needed to be known by the sender and receiver.
Thus the distribution of the key is a difficult process for maintaining the security of the protocol
because an attacker can intercept the key exchange process for getting the access of the key and
compromise the security (Vargas, Rodriguez and Parra 2017). Whereas the SSL protocol uses
the hybrid encryption that is the combination of symmetric and asymmetric encryption for
exchanging the public and the private key pairs and secure the connection.
Performance – The DES algorithm is faster process when compared with the SSL
because it needs the same key for encryption and decryption but the SSL can encapsulate the
HTTP and SMTP for authentication and secure the browsing.
Usability The DES protocol is vulnerable since anyone receiving the key can
impersonate as the client and get the access of the data. In case of SSL a third part certificate
authority is used for verifying the validity of the certificate and increase the security and
usability of the protocol.
Document Page
3
HYBRID ENCRYPTION
References
Cheon, J.H. and Kim, J., 2015. A hybrid scheme of public-key encryption and somewhat
homomorphic encryption. IEEE transactions on information forensics and security, 10(5),
pp.1052-1063.
Oppliger, R., 2016. SSL and TLS: Theory and Practice. Artech House.
Vargas, M.P.P., Rodriguez, R.A.A. and Parra, O.J.S., 2017, November. Algorithm for the
Optimization of RSA Based on Parallelization over GPU SSL/TLS Protocol. In 2017 IEEE
International Conference on Smart Cloud (SmartCloud) (pp. 294-297). IEEE.
Zickau, S., Thatmann, D., Butyrtschik, A., Denisow, I. and Küpper, A., 2016. Applied attribute-
based encryption schemes. In 19th International ICIN Conference-Innovations in Clouds,
Internet and Networks-March (pp. 1-3).
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]