Hybrid encryption algorithm based on symmetric and asymmetric ciphers
In trusted computing architecture, security is one of crucial aspects to protect the design against hardware or software attacks. The symmetric encryption method works great for fast encryption of large data. Still, it doesn’t provide identity verification. Meanwhile, the asymmetric encryption metho...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2021
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/99497/1/NoorAmiraZurainiMKE2021.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-utm-ep.99497 |
---|---|
record_format |
uketd_dc |
spelling |
my-utm-ep.994972023-02-27T07:52:30Z Hybrid encryption algorithm based on symmetric and asymmetric ciphers 2021 Mohd. Zulkimi, Noor Amira Zuraini TK Electrical engineering. Electronics Nuclear engineering In trusted computing architecture, security is one of crucial aspects to protect the design against hardware or software attacks. The symmetric encryption method works great for fast encryption of large data. Still, it doesn’t provide identity verification. Meanwhile, the asymmetric encryption method makes sure that the data is accessed by authorized recipient with public private key pair. However, this verification makes the encryption process slow when implemented at scale. Work here intends to develop and analyse the hybrid algorithms. In this study, Advanced Encryption Standard (AES) with fixed 16 bytes of block and 128-bit key length is chosen as symmetric cryptography algorithm. Meanwhile, Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) with 1024, 2048 and 3072-bits key length and Elliptic Curve Cryptography (ECC) with 192, 224 and 256-bits key length with two different curves: Brain pool and NIST SECP are chosen as asymmetric algorithms. These two asymmetric algorithms are compared to determine which algorithms can produce a best performance with the combination of symmetric algorithm. Cryptographic algorithms are developed and written using Python3.8. The performance of application is evaluated using computational time for key generation, encryption and decryption phases with different input data set and key lengths. Overall, hybrid ECC has better performance in key generation phase due to its smaller key sizes and hybrid RSA has better performance in encryption and decryption due to its less complexity of algorithm. From findings, it can be summarized that AES-256-GCM + ECC-secp192r1 is the best combination of hybrid algorithm. 2021 Thesis http://eprints.utm.my/id/eprint/99497/ http://eprints.utm.my/id/eprint/99497/1/NoorAmiraZurainiMKE2021.pdf application/pdf en public http://dms.library.utm.my:8080/vital/access/manager/Repository/vital:149817 masters Universiti Teknologi Malaysia Faculty of Engineering - School of Electrical Engineering |
institution |
Universiti Teknologi Malaysia |
collection |
UTM Institutional Repository |
language |
English |
topic |
TK Electrical engineering Electronics Nuclear engineering |
spellingShingle |
TK Electrical engineering Electronics Nuclear engineering Mohd. Zulkimi, Noor Amira Zuraini Hybrid encryption algorithm based on symmetric and asymmetric ciphers |
description |
In trusted computing architecture, security is one of crucial aspects to protect the design against hardware or software attacks. The symmetric encryption method works great for fast encryption of large data. Still, it doesn’t provide identity verification. Meanwhile, the asymmetric encryption method makes sure that the data is accessed by authorized recipient with public private key pair. However, this verification makes the encryption process slow when implemented at scale. Work here intends to develop and analyse the hybrid algorithms. In this study, Advanced Encryption Standard (AES) with fixed 16 bytes of block and 128-bit key length is chosen as symmetric cryptography algorithm. Meanwhile, Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) with 1024, 2048 and 3072-bits key length and Elliptic Curve Cryptography (ECC) with 192, 224 and 256-bits key length with two different curves: Brain pool and NIST SECP are chosen as asymmetric algorithms. These two asymmetric algorithms are compared to determine which algorithms can produce a best performance with the combination of symmetric algorithm. Cryptographic algorithms are developed and written using Python3.8. The performance of application is evaluated using computational time for key generation, encryption and decryption phases with different input data set and key lengths. Overall, hybrid ECC has better performance in key generation phase due to its smaller key sizes and hybrid RSA has better performance in encryption and decryption due to its less complexity of algorithm. From findings, it can be summarized that AES-256-GCM + ECC-secp192r1 is the best combination of hybrid algorithm. |
format |
Thesis |
qualification_level |
Master's degree |
author |
Mohd. Zulkimi, Noor Amira Zuraini |
author_facet |
Mohd. Zulkimi, Noor Amira Zuraini |
author_sort |
Mohd. Zulkimi, Noor Amira Zuraini |
title |
Hybrid encryption algorithm based on symmetric and asymmetric ciphers |
title_short |
Hybrid encryption algorithm based on symmetric and asymmetric ciphers |
title_full |
Hybrid encryption algorithm based on symmetric and asymmetric ciphers |
title_fullStr |
Hybrid encryption algorithm based on symmetric and asymmetric ciphers |
title_full_unstemmed |
Hybrid encryption algorithm based on symmetric and asymmetric ciphers |
title_sort |
hybrid encryption algorithm based on symmetric and asymmetric ciphers |
granting_institution |
Universiti Teknologi Malaysia |
granting_department |
Faculty of Engineering - School of Electrical Engineering |
publishDate |
2021 |
url |
http://eprints.utm.my/id/eprint/99497/1/NoorAmiraZurainiMKE2021.pdf |
_version_ |
1776100605307125760 |