Minimizing the Effect of Brute Force Attack using Hybridization of Encryption Algorithms

Encryption is a process to hide the data into a secure manner. It helps the people to provide security and protect the data from unauthenticated people. For Encryption process, user uses many algorithms but all algorithm has some pitfalls i.e. a single encryption algorithm is not efficient to provide security to the data. For removing this disadvantages user uses more than one encryption algorithm in sequence to achieve high security encryption method. This process is called Hybrid Encryption Method. Sometimes MD5 hash function identified using Brute Force Attack. So user uses two encryption algorithms i.e. MD5 and Transposition Reverse String Algorithm. Here Transposition Reverse String Algorithm reverse the hash function due to this user cannot easily identify the hash function. This approach has fast Execution time in comparison to another hybrid approaches, so it is an optimize Hybrid Encryption Method. General Terms Hybridization of Encryption Algorithms

[1]  Sanjay Kumar,et al.  Ensuring data storage security in cloud computing based on hybrid encryption schemes , 2016, 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC).

[2]  M. Hemalatha,et al.  A design of security protocol using hybrid encryption technique (AES-Rijndael and RSA) , 2009 .

[3]  Khushdeep Kaur,et al.  Hybrid Algorithm with DSA , RSA and MD 5 Encryption Algorithm for wireless devices , 2012 .

[4]  Prakash Kuppuswamy,et al.  Hybrid encryption/decryption technique using new public key and symmetric key algorithm , 2014, Int. J. Inf. Comput. Secur..

[5]  Neha,et al.  Enhanced Security using Hybrid Encryption Algorithm , 2016 .

[6]  Jidong Jin,et al.  Research for the application and safety of MD5 algorithm in password authentication , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.

[7]  nbspGaurav R. Patel,et al.  Hybrid Encryption Algorithm , 2014 .

[8]  Hybrid Encryption System , 2014 .

[9]  Muhammad Sharif,et al.  A Survey of Password Attacks and Comparative Analysis on Methods for Secure Authentication , 2012 .

[10]  Priya Pise,et al.  Hybrid Encryption Techniques for Secure Sharing of a Sensitive Data for Banking Systems Over Cloud , 2018, 2018 International Conference On Advances in Communication and Computing Technology (ICACCT).

[11]  M. Shaar,et al.  A hybrid hiding encryption algorithm (HHEA) for data communication security , 2003, 2003 46th Midwest Symposium on Circuits and Systems.

[12]  Young Lee,et al.  Hybrid Encryption for Securing SharedPreferences of Android Applications , 2018, 2018 1st International Conference on Data Intelligence and Security (ICDIS).

[13]  P. Deepalakshmi,et al.  Design of Secure Storage for Health-care Cloud using Hybrid Cryptography , 2018, 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT).

[14]  Tai-hoon Kim,et al.  Secure E-Commerce Model using Hybrid Encryption for Financial Transactions , 2017 .

[15]  Parvinder Singh,et al.  A New Way to Design and Implementation of Hybrid Crypto System for Security of the Information in Public Network , 2013 .

[16]  Abeer Alsadoon,et al.  A hybrid encryption model for secure cloud computing , 2015, 2015 13th International Conference on ICT and Knowledge Engineering (ICT & Knowledge Engineering 2015).

[17]  Anurag Jain,et al.  Analysis of brute force attack using TG — Dataset , 2015, 2015 SAI Intelligent Systems Conference (IntelliSys).