Development of Randomized Hybrid Cryptosystem
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
newlineCryptography is the art and science of protecting information from undesirable
newlineindividuals by converting it into a form non-recognizable by its attackers while stored and
newlinetransmitted. Data cryptography mainly is the scrambling of the content of data, such as
newlinetext, image, audio, video and so forth to make the data unreadable, invisible or
newlineunintelligible during transmission or storage called Encryption. The main goal of
newlinecryptography is keeping data secure from unauthorized attackers. The reverse of data
newlineencryption is data Decryption. Before the modern era, cryptography was concerned solely
newlinewith message confidentiality (i.e., encryption) conversion of messages from a
newlinecomprehensible form into an incomprehensible one and back again at the other end,
newlinerendering it unreadable by interceptors without secret knowledge (namely the key needed
newlinefor decryption of that message). In recent decades, the field has expanded beyond
newlineconfidentiality concerns to include techniques for message integrity checking, sender or
newlinereceiver identity authentication, digital signatures, interactive proofs and secure
newlinecomputation, among others.
newlineThe modern study of symmetric-key ciphers relates mainly to the study of block
newlineciphers and stream ciphers and to their applications. A block ciphers take as input a block
newlineof plaintext and a key, and output a block of cipher text of the same size. The crypto
newlinesystems which are in use are static i.e. only one of the standard algorithms is used at a
newlinetime. If same encryption methods are used throughout the day and for days together
newlinecontinuously, the crypto analyzers may crack the code or find out the encryption method
newlineand may intrude or spy or hack the confidential data. This necessitates a robust encryption
newlinetechnique. This work highlights one of the novel approaches of an implementation of a
newlinehighly secured cryptic algorithm which makes impossible for data theft. Many researchers
newlinehave been made with the multiple algorithms. This work presents a highly secured
newlinerandomized encryption/decryption technique. Implementation presented in this work
newlinechooses a randomly switching model which combines the two or more crypto algorithms
newlineto work together as a single unit and there is switching among the algorithms at random
newlinetimes. This model being implemented on FPGA provides excellent area results and a
newlinehigher level of security is achieved. In the later stage, this prototype can also be imported
newlineto ASIC.