A Novel Hybrid Cryptographic Approach for Secure Communication

Authors

  • Gifty Arora Assistant Professor, lovely Professional University, Phagwara,
  • Deepali S. Hirolikar PDEA'S College of Engineering Manjari Bk, Pune
  • Shailesh Shivaji Deore Associate Professor Department of Computer Engineering, SSVPS B S DEORE College of Engineering,Dhule, Maharashtra
  • K. K. Bajaj RNB Global University Place - Bikaner
  • Praveen Kumar Gupta Professor Department of Computer Science & Engineering, Alliance College of Engineering & Design, Alliance University, Central Campus Bengaluru Karnataka, India
  • Uruj Jaleel Associate Professor Department of Computer Science & Engineering, Alliance College of Engineering & Design Alliance University, Central Campus Bengaluru Karnataka, India
  • Vidya R. Former Asst. Professor in ComputerScience Institution name: Gokulam S.N.G.M Arts and Science College, Alappuzha

Keywords:

Hybrid Cryptographic System, Device-to-Device (D2D) Communication, Huffman Codin, Binary Encryption, Wireless Network Security, Data Transmission Integrity, Public Channel Encryption, Root Mean Square Error (RMSE)

Abstract

This paper introduces a novel hybrid cryptographic system designed to enhance the security and integrity of Device-to-Device (D2D) communication in wireless networks. The system combines Huffman coding and binary encryption to secure data transmission over open public channels. Huffman coding provides efficient block encryption, while binary encryption offers robust key management. The proposed algorithm is tested using Java programming, demonstrating its efficiency in maintaining the integrity of various data types with zero Root Mean Square Error (RMSE) in decryption. The research highlights the importance of secure communication in the modern digital age and offers a solution that addresses the key drawbacks of current communication methods, such as complex network design and high power requirements.

Downloads

Download data is not yet available.

References

F. C. Cheng and S. Tatesh. “Secure Device-to-Device (D2d) Communication,” U.S. Patent No. 20,150,326,537, 2015.

L. Goratti, et al., “Connectivity and security in a D2D communication protocol for public safety applications,” in Wireless Communications Systems (ISWCS), 2014 11th International Symposium on, pp. 548-552, 2014.

J. L. Massey, “Some applications of source coding in cryptography,” Euopean Transaction on Telecommunication, vol. 5, pp. 421–429, 1994.

J. Knudsen, “Java Cryptography,” O’Reilly and Associates, Inc., 1998.

H. Delfs and H. Knebl, “Introduction to Cryptography,” Springer, 2007.

“Huffman coding and encryptions methods,” International Journal of Computer Science and Information Security, vol/issue: 8(9), pp. 195–199, 2010.

A.Y. E. Nesterenko and A. V. E. Pugachev, “A new hybrid encryption scheme,” Prikladnaya Diskretnaya Matematika, vol. 4, pp. 56-71, 2015.

E. Persichetti, “Secure and anonymous hybrid encryption from coding theory,” in Post-Quantum Cryptography, Springer Berlin Heidelberg, pp. 174-187, 2011.

W. Shen, et al., “Secure key establishment for device-to-device communications,” in Global Communications Conference (GLOBECOM), 2014 IEEE, pp. 336-340, 2014.

E. A. Elrahman, et al., “D2D group communications security,” in Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), 2015 International Conference on, pp. 1-6, 2015.

E. A. Elrahman, et al., “Fast group discovery and non-repudiation in D2D communications using IBE,” in Wireless Communications and Mobile Computing Conference (IWCMC), 2015 International, pp. 616-621, 2015.

K. Rege, et al., “Bluetooth Communication using Hybrid Encryption Algorithm based on AES and RSA,”

International Journal of Computer Applications, vol/issue: 71(22), 2013.

X. Lu, et al., “Related-key security for hybrid encryption. InInformation Security, Springer International Publishing, pp. 19-32, 2014.

H. Kwon, et al., “Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks,” Multimedia Tools and Applications, pp. 1-15, 2016.

R. L. Rivest, et al., “On breaking a huffman code,” in Proc. IEEE Transactions on Information Theory, vol/issue: 42(3), 1996.

N. Lee, et al., “Power control for D2D underlaid cellular networks: Modeling, algorithms, and analysis,” Selected Areas in Communications, IEEE Journal on, vol/issue: 33(1), pp. 1-13, 2015.

Y. Liu, et al., “Secure D2D communication in large-scale cognitive cellular networks with wireless power transfer,” in Communications (ICC), 2015 IEEE International Conference on, pp. 4309-4314, 2015.

H. Kwon, et al., “Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks,” Multimedia Tools and Applications, pp. 1-15, 2016.

S. Nagaraj, et al., “A Bio-Crypto Protocol for Password Protection Using ECC,” Bulletin of Electrical Engineering and Informatics, vol/issue: 4(1), pp. 67-72, 2015.

C. Meshram, “Discrete Logarithm and Integer Factorization using ID-based Encryption,” Bulletin of Electrical Engineering and Informatics, vol/issue: 4(2), pp. 160-168, 2015.

T. N. Babu, et al., “Ortho Linear Feedback Shift Register Cryptographic System,” Journal of Telematics and Informatics, vol/issue: 3(2), 2015.

Downloads

Published

13.12.2023

How to Cite

Arora, G. ., Hirolikar, D. S. ., Deore, S. S. ., Bajaj, K. K. ., Gupta, P. K. ., Jaleel, U. ., & R., V. . (2023). A Novel Hybrid Cryptographic Approach for Secure Communication. International Journal of Intelligent Systems and Applications in Engineering, 12(8s), 271–280. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4118

Issue

Section

Research Article

Most read articles by the same author(s)

1 2 > >>