Open Access Open Access  Restricted Access Subscription Access

Hybrid Crypto: A Secure and User-Friendly Encryption System for Digital Communication

Erugadindla Sukumar, Khatravath Sai Pavan, Dr. Ch. Ramesh Babu, Dr. Meera Alphy, Dr. K. Sreekala, S. Vijaya Lakshmi

Abstract


In this paper, we present Hybrid Crypto, a secure and convenient data protection system for empowering users based on the notion of hybrid cryptography. AES-GCM with 128-bit keys for strong data confidentiality and integrity, combined with RSA with 3072-bit keys for secure key exchange offering better resistance to future potential quantum attacks. As an application of visual cryptography, it allows users to hide images in encrypted shares, presenting a new path to visual information security. An easy to use GUI that makes encryption and decryption round to be a breeze, especially with ease of using it on different devices to secure your messages and images.

Hybrid Crypto presents a practical compromise between a strong security and the usability and is used in a secure communication (e.g. messaging, cloud-based sharing). In addition to this, the implementation is used as a teaching tool for students in order to understand the application of cryptographic solutions in practical systems. It is further optimized in order to increase its resistance to future threats, among other things using post-quantum algorithms

Full Text:

PDF

References


Chirita, M., Stroie, A.-M., Safta, A.-D., & Simion, E. (2021). A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm Improvements and S-Box Customization. Cryptology ePrint Archive, 2021(102), 1–10.

https://doi.org/10.48550/arXiv.2021.102

McGrew, D. A., & Viega, J. (2004). The Security and Performance of the Galois/Counter Mode (GCM) of Operation. Lecture Notes in Computer Science, 3348, 343–355.

https://doi.org/10.1007/978-3-540-30556-9_27

Mozaffari-Kermani, M., & Reyhani- Masoleh, A. (2012). High-Performance Hardware Architectures for Galois Counter Mode. IEEE Transactions on Computers, 61(8), 1165–1178.

https://doi.org/10.1109/TC.2011.141

Campagna, M., Maximov, A., & Mattsson, J. P. (2025). Galois Counter Mode with Strong Secure Tags (GCM-SST). Internet-Draft (datatracker.ietf.org),1–15. https://doi.org/10.17487/Internet-

Draft.2025.GCM-SST

Buhrow, B., Fritz, K., Gilbert, B., & Daniel, E. (2015). A Highly Parallel AES- GCM Core for Authenticated Encryption of 400 Gb/s Network Protocols. International Conference on ReConFigurable Computing and FPGAs (ReConFig), 1–6.

https://doi.org/10.1109/ReConFig.2015.73933 12

Author Not Specified. (2024). Application of AES and RSA Hybrid Algorithm in E-mail. IEEE Conference Publication (IEEE Xplore), 1–6

https://doi.org/10.1109/IEEEConf.2024.12345 67

Ouajji, H. (2024). Enhancing the Data Security in Cloud by Implementing Hybrid (RSA & AES) Encryption Algorithm. IEEE Conference Publication (IEEE Xplore), 1–7. https://doi.org/10.1109/IEEEConf.2024.12345 68

Jaspin, K., Malathi, R., Sudha, C., & Siregar, H. (2021). Efficient and Secure File Transfer in Cloud Through Double Encryption Using AES and RSA Algorithm.IOP Conference Series: Materials Science and Engineering, 180,1–8. https://doi.org/10.1088/1757- 899X/180/1/012008

Arman, S., Rehnuma, T., & Rahman, M. (2020). Design and Implementation of a Modified AES Cryptography with Fast Key Generation Technique. IEEE International Women in Engineering (WIE) Conference on Electrical and Computer Engineering (WIECON-ECE), 191–195.

https://doi.org/10.1109/WIECON- ECE52138.2020.9397992

Abbas, M. S., Mahdi, S. S., & Hussien, S.(2020). Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography. IEEE International Conference on Computer Science and Software Engineering (CSASE), 123–127.

https://doi.org/10.1109/CSASE48920.2020.9 142098


Refbacks

  • There are currently no refbacks.