A Novel Hybrid Cryptographic Approach for Secure Communication
Keywords:
Hybrid Cryptographic System, Device-to-Device (D2D) Communication, Huffman Codin, Binary Encryption, Wireless Network Security, Data Transmission Integrity, Public Channel Encryption, Root Mean Square Error (RMSE)Abstract
This paper introduces a novel hybrid cryptographic system designed to enhance the security and integrity of Device-to-Device (D2D) communication in wireless networks. The system combines Huffman coding and binary encryption to secure data transmission over open public channels. Huffman coding provides efficient block encryption, while binary encryption offers robust key management. The proposed algorithm is tested using Java programming, demonstrating its efficiency in maintaining the integrity of various data types with zero Root Mean Square Error (RMSE) in decryption. The research highlights the importance of secure communication in the modern digital age and offers a solution that addresses the key drawbacks of current communication methods, such as complex network design and high power requirements.
Downloads
References
F. C. Cheng and S. Tatesh. “Secure Device-to-Device (D2d) Communication,” U.S. Patent No. 20,150,326,537, 2015.
L. Goratti, et al., “Connectivity and security in a D2D communication protocol for public safety applications,” in Wireless Communications Systems (ISWCS), 2014 11th International Symposium on, pp. 548-552, 2014.
J. L. Massey, “Some applications of source coding in cryptography,” Euopean Transaction on Telecommunication, vol. 5, pp. 421–429, 1994.
J. Knudsen, “Java Cryptography,” O’Reilly and Associates, Inc., 1998.
H. Delfs and H. Knebl, “Introduction to Cryptography,” Springer, 2007.
“Huffman coding and encryptions methods,” International Journal of Computer Science and Information Security, vol/issue: 8(9), pp. 195–199, 2010.
A.Y. E. Nesterenko and A. V. E. Pugachev, “A new hybrid encryption scheme,” Prikladnaya Diskretnaya Matematika, vol. 4, pp. 56-71, 2015.
E. Persichetti, “Secure and anonymous hybrid encryption from coding theory,” in Post-Quantum Cryptography, Springer Berlin Heidelberg, pp. 174-187, 2011.
W. Shen, et al., “Secure key establishment for device-to-device communications,” in Global Communications Conference (GLOBECOM), 2014 IEEE, pp. 336-340, 2014.
E. A. Elrahman, et al., “D2D group communications security,” in Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), 2015 International Conference on, pp. 1-6, 2015.
E. A. Elrahman, et al., “Fast group discovery and non-repudiation in D2D communications using IBE,” in Wireless Communications and Mobile Computing Conference (IWCMC), 2015 International, pp. 616-621, 2015.
K. Rege, et al., “Bluetooth Communication using Hybrid Encryption Algorithm based on AES and RSA,”
International Journal of Computer Applications, vol/issue: 71(22), 2013.
X. Lu, et al., “Related-key security for hybrid encryption. InInformation Security, Springer International Publishing, pp. 19-32, 2014.
H. Kwon, et al., “Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks,” Multimedia Tools and Applications, pp. 1-15, 2016.
R. L. Rivest, et al., “On breaking a huffman code,” in Proc. IEEE Transactions on Information Theory, vol/issue: 42(3), 1996.
N. Lee, et al., “Power control for D2D underlaid cellular networks: Modeling, algorithms, and analysis,” Selected Areas in Communications, IEEE Journal on, vol/issue: 33(1), pp. 1-13, 2015.
Y. Liu, et al., “Secure D2D communication in large-scale cognitive cellular networks with wireless power transfer,” in Communications (ICC), 2015 IEEE International Conference on, pp. 4309-4314, 2015.
H. Kwon, et al., “Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks,” Multimedia Tools and Applications, pp. 1-15, 2016.
S. Nagaraj, et al., “A Bio-Crypto Protocol for Password Protection Using ECC,” Bulletin of Electrical Engineering and Informatics, vol/issue: 4(1), pp. 67-72, 2015.
C. Meshram, “Discrete Logarithm and Integer Factorization using ID-based Encryption,” Bulletin of Electrical Engineering and Informatics, vol/issue: 4(2), pp. 160-168, 2015.
T. N. Babu, et al., “Ortho Linear Feedback Shift Register Cryptographic System,” Journal of Telematics and Informatics, vol/issue: 3(2), 2015.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.