Hybrid encryption algorithm based on symmetric and asymmetric ciphers

In trusted computing architecture, security is one of crucial aspects to protect the design against hardware or software attacks. The symmetric encryption method works great for fast encryption of large data. Still, it doesn’t provide identity verification. Meanwhile, the asymmetric encryption metho...

Full description

Saved in:
Bibliographic Details
Main Author: Mohd. Zulkimi, Noor Amira Zuraini
Format: Thesis
Language:English
Published: 2021
Subjects:
Online Access:http://eprints.utm.my/id/eprint/99497/1/NoorAmiraZurainiMKE2021.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utm-ep.99497
record_format uketd_dc
spelling my-utm-ep.994972023-02-27T07:52:30Z Hybrid encryption algorithm based on symmetric and asymmetric ciphers 2021 Mohd. Zulkimi, Noor Amira Zuraini TK Electrical engineering. Electronics Nuclear engineering In trusted computing architecture, security is one of crucial aspects to protect the design against hardware or software attacks. The symmetric encryption method works great for fast encryption of large data. Still, it doesn’t provide identity verification. Meanwhile, the asymmetric encryption method makes sure that the data is accessed by authorized recipient with public private key pair. However, this verification makes the encryption process slow when implemented at scale. Work here intends to develop and analyse the hybrid algorithms. In this study, Advanced Encryption Standard (AES) with fixed 16 bytes of block and 128-bit key length is chosen as symmetric cryptography algorithm. Meanwhile, Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) with 1024, 2048 and 3072-bits key length and Elliptic Curve Cryptography (ECC) with 192, 224 and 256-bits key length with two different curves: Brain pool and NIST SECP are chosen as asymmetric algorithms. These two asymmetric algorithms are compared to determine which algorithms can produce a best performance with the combination of symmetric algorithm. Cryptographic algorithms are developed and written using Python3.8. The performance of application is evaluated using computational time for key generation, encryption and decryption phases with different input data set and key lengths. Overall, hybrid ECC has better performance in key generation phase due to its smaller key sizes and hybrid RSA has better performance in encryption and decryption due to its less complexity of algorithm. From findings, it can be summarized that AES-256-GCM + ECC-secp192r1 is the best combination of hybrid algorithm. 2021 Thesis http://eprints.utm.my/id/eprint/99497/ http://eprints.utm.my/id/eprint/99497/1/NoorAmiraZurainiMKE2021.pdf application/pdf en public http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:149817 masters Universiti Teknologi Malaysia Faculty of Engineering - School of Electrical Engineering
institution Universiti Teknologi Malaysia
collection UTM Institutional Repository
language English
topic TK Electrical engineering
Electronics Nuclear engineering
spellingShingle TK Electrical engineering
Electronics Nuclear engineering
Mohd. Zulkimi, Noor Amira Zuraini
Hybrid encryption algorithm based on symmetric and asymmetric ciphers
description In trusted computing architecture, security is one of crucial aspects to protect the design against hardware or software attacks. The symmetric encryption method works great for fast encryption of large data. Still, it doesn’t provide identity verification. Meanwhile, the asymmetric encryption method makes sure that the data is accessed by authorized recipient with public private key pair. However, this verification makes the encryption process slow when implemented at scale. Work here intends to develop and analyse the hybrid algorithms. In this study, Advanced Encryption Standard (AES) with fixed 16 bytes of block and 128-bit key length is chosen as symmetric cryptography algorithm. Meanwhile, Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) with 1024, 2048 and 3072-bits key length and Elliptic Curve Cryptography (ECC) with 192, 224 and 256-bits key length with two different curves: Brain pool and NIST SECP are chosen as asymmetric algorithms. These two asymmetric algorithms are compared to determine which algorithms can produce a best performance with the combination of symmetric algorithm. Cryptographic algorithms are developed and written using Python3.8. The performance of application is evaluated using computational time for key generation, encryption and decryption phases with different input data set and key lengths. Overall, hybrid ECC has better performance in key generation phase due to its smaller key sizes and hybrid RSA has better performance in encryption and decryption due to its less complexity of algorithm. From findings, it can be summarized that AES-256-GCM + ECC-secp192r1 is the best combination of hybrid algorithm.
format Thesis
qualification_level Master's degree
author Mohd. Zulkimi, Noor Amira Zuraini
author_facet Mohd. Zulkimi, Noor Amira Zuraini
author_sort Mohd. Zulkimi, Noor Amira Zuraini
title Hybrid encryption algorithm based on symmetric and asymmetric ciphers
title_short Hybrid encryption algorithm based on symmetric and asymmetric ciphers
title_full Hybrid encryption algorithm based on symmetric and asymmetric ciphers
title_fullStr Hybrid encryption algorithm based on symmetric and asymmetric ciphers
title_full_unstemmed Hybrid encryption algorithm based on symmetric and asymmetric ciphers
title_sort hybrid encryption algorithm based on symmetric and asymmetric ciphers
granting_institution Universiti Teknologi Malaysia
granting_department Faculty of Engineering - School of Electrical Engineering
publishDate 2021
url http://eprints.utm.my/id/eprint/99497/1/NoorAmiraZurainiMKE2021.pdf
_version_ 1776100605307125760