Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Review of Various Algorithms Used in Hybrid Cryptography  
  Authors : Veerpal Kaur; Aman Singh
  Cite as: ijcsn.org/IJCSN-2013/2-6/IJCSN-2013-2-6-153.pdf

 

Cryptography is a technique used today for hiding any confidential information from the attack of an intruder. The study of hybrid cryptography going to present is based on the study of hybridization. Study has been performed from 1993 to 2013. All the concepts related to hybrid cryptography have been analyzed and reached at the conclusion that the use of RSA is quite expanding. Near about 200 papers have been searched related to the problem and 55 have been considered in this review based on filtering. Tabular survey has been provided for ease of use. Major scope of work has been done using RSA. Diffie-Hellman is a today’s choice for algorithm implementation in any network. Another point of view is that very less use of DES is there due to some of its limitations such as less Avalanche effect. RSA, AES, SHA-1, MD5 are some of the most widely used algorithms for hybrid cryptography. The main aim of this review paper is to provide more and more information to the naïve researchers. Other objectives of this review paper are to emphasize on better performance, maximum speed of an algorithm, checking effectiveness, its efficiency and comparison with other related works.

 

Published In : IJCSN Journal Volume 2, Issue 6

Date of Publication : 01 December 2013

Pages : 157 - 173

Figures : 04

Tables : 04

Publication Link : ijcsn.org/IJCSN-2013/2-6/IJCSN-2013-2-6-153.pdf

 

 

 

Veerpal Kaur : Department of Computer Science Engineering, Lovely Professional University Phagwara, Punjab, India

Aman Singh : Assistant Professor, Department of Computer Science Engineering, Lovely Professional University Phagwara, Punjab, India

 

 

 

 

 

 

 

RSA

ElGamal

hybrid of various algorithms

hybrid cryptography

 

 

 

 

With the results of increased efficiency, speed and throughput of various algorithms by the combination of various algorithms and techniques, hybrid cryptography has a great scope in the near future. Hybrid cryptography has been creating various opportunities for the naïve researchers and allows them to work upon various challenging limitations of algorithms in their original forms. Hybrid cryptography is easy to work upon and a great number of chances for improvement are there. A number of different useful techniques and algorithms have been prescribed in this paper that can be used for providing security in the insecure media. This paper has been providing the study of past 20 years in the search for hybrid cryptographic algorithms that may help researchers to orientate their study areas and to choose various cryptographic algorithms for their studies. The study indicates the maximum use of RSA in the hybridization of various algorithms because of its Integer Factorization Problem. Diffie-Hellman being very secure is the prior choice for eliminating various limitations of cryptographic algorithms. AES and DES have limited scope of use because of the problem of key management. No doubt, the number of cryptographic algorithms presented here is neither complete nor exhaustive but a sample of papers that demonstrates the advantages and limitations of used cryptographic algorithms.

 

 

 

 

 

 

 

 

 

[1] Eltyeb E.Abed Elgabar, Haysam A. Ali Alamin, “Comparison of LSB Steganography in GIF and BMP Images ”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-4, September 2013.

[2] Eltyeb E.Abed Elgabar “Comparison of LSB Steganography in BMP and JPEG Images ”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-5, November 2013.

[3] "Watermarking Application Scenaros and Related Attacks ", IEEE international Conference on Image Processing, Vol. 3, pp. 991 – 993, Oct. 2001.

[4] Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf.

[5] Henk C. A. van Tilborg (Ed.), "Encyclopedia of cryptography and security", pp.159. Springer (2005).

[6] Johnson, N.F. & Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal,February 1998.

[7] Krenn, R., “Steganography and Steganalysis”, http://www.krenn.nl/univ/cry/steg/article.pdf

[8] Pallavi Hemant Dixit, Uttam L. Bombale, " Arm Implementation of LSB Algorithm of Steganography", International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-2, Issue-3, February 2013.

[9] “Reference guide:Graphics Technical Options and Decisions”, http://www.devx.com/ /Article/1997.

[10] Artz, D., “Digital Steganography: Hiding Data within Data”, IEEE Internet Computing Journal, June 2001.

[11] NXP & Security Innovation Encryption for ARM MCUs ppt.

[12] Owens, M., “A discussion of covert channels and steganography”, SANS Institute, 2002.

[13] “MSDN:About Bitmaps” , 2007,M Corporation.

[14] V. Lokeswara Reddy, Dr. A. Subramanyam and Dr.P. Chenna Reddy, " Implementation of LSB Steganography and its Evaluation for Various File Formats", Int. J. Advanced Networking and Applications, Volume: 02, Issue: 05, Pages: 868-872 (2011).

[15] Neeta Deshpande, Snehal Kamalapur and Jacobs Daisy, “Implementation of LSB steganography and Its Evaluation for Various Bits”, 1st International Conference on Digital Information Management, 6 Dec. 2006 pp. 173-178.

[16] J. E. Boggess III, P. B. Nation, M. E. Harmon, “Compression of Colour Information In Digitized Images Using an Artificial Neural Network”, Proceedings of the IEEE 1994 National Aerospace and Electronics Conference, Issue 23-27 May 1994 Page(s):772 - 778 vol.2.

[17] Atallah M. Al-Shatnawi, "A New Method in Image Steganography with Improved Image Quality", Applied Mathematical Sciences, Vol. 6, 2012, no. 79, 3907 - 391.

[18] Ze-Nian Li and Marks S.Drew, "Fundamentals of Multimedia, School of computing Science Simon Faster University, Pearsoll Education, Inc, 2004.

[19] J. Fridrich, M. Goljan, and R. Du, “Detecting LSB steganography in color, and gray-scale images,” IEEE Multimedia, vol. 8, no. 4, pp. 22–28, Oct. 2001.

[20] Priya Thomas," Literature Survey On Modern Image Steganographic Techniques", International Journal of Engineering Research & Technology (IJERT) Vol. 2 Issue 5, May - 2013 ISSN: 2278-0181.

[21] V. Lokeswara Reddy, Dr. A. Subramanyam, Dr.P. Chenna Reddy ,"Implementation of LSB Steganography and its Evaluation for Various File Formats", Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011).

[22] Roshidi Din and Hanizan Shaker Hussain, “The Capability of Image In Hiding A Secret Message”, Proceedings of the 6th WSEAS International Conference on Signal, Speech and Image Processing, September 2006.

[23] D. Llamas, C. Allison, and A. Miller, \Covert channels in internet protocols: A survey," in Proceedings of the 6th Annual Postgraduate Symposium about the Convergence of Telecommunications, Networking and Broadcasting, 2005.

[24] Neil R. Bennett, JPEG STEGANALYSIS & TCP/IP STEGANOGRAPHY, University of Rhode Island , 2009.

[25] H. Wu, N. Wu, C. Tsai, and M. Hwang, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods,” IEE Proceedings-Vision, Image and Signal Processing, vol. 152, no. 5, pp. 611–615, 2005.

[26] R. Chandramouli and N. Memon, “Analysis of LSB based image steganography techniques,” in Image Processing, 2001. Proceedings. 2001 International Conference on, vol. 3, 2001.

[27] Y. Lee and L. Chen, “High capacity image steganographic model,” IEE Proceedings-Vision, Image and Signal Processing, vol. 147, no. 3, pp. 288–294, 2000.

[28] W. Pennebaker and J. Mitchell, JPEG still image data compression standard. Kluwer Academic Publishers, 1993.

[29] Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, Silman, J., “Steganography and Steganalysis: An Overview”, SANS Institute, 2001 Jamil, T.,“Steganography: The art of hiding information is plain sight”, IEEE Potentials, 18:01, 1999.

[30] Hamid.A.Jalab, A.A Zaidan, B.B Zaidan, “New Design for Information Hiding with in Steganography Using Distortion Techniques”, International Journal of Engineering and Technology (IJET)), Vol 2, No. 1, ISSN: 1793-8236, Feb (2010), Singapore.