Enhancing Data Security by Using Hybrid Encryption Technique (Advanced Encryption Standard and Rivest Shamir Adleman)

Show simple item record

dc.contributor.advisor Dr. Michael W. Kimwele, (PhD) JKUAT, Kenya Dr. Marcel Ndengo, (PhD) JKUAT, Rwanda
dc.contributor.author Mutabaruka, Eveque
dc.date.accessioned 2017-01-10T08:40:20Z
dc.date.available 2017-01-10T08:40:20Z
dc.date.issued 2017-01-09
dc.identifier.uri http://hdl.handle.net/123456789/2417
dc.description Msc Thesis (Software Engineering) en_US
dc.description.abstract The flow of information and maintenance of data organization services raises security concerns with regards to confidentiality, integrity, authentication and non repudiation. To address the aforementioned concerns satisfactorily symmetric and asymmetric cryptography are being used. Among the most used cryptography algorithms, we have AES and RSA.AES is symmetric key encryption relatively fast with a challenge of sharing the secret key using third party. RSA is asymmetric with the use of different keys to encrypt and decrypt data with key distribution as an advantage but its slowness gives open windows for attackers. The objective of this work is to construct hybrid technique to extremely enhance the security of both data and key. Discuss, compare and analyze main features of AES and RSA leads to construct new hybrid encryption. The analysis is based on processing time, data size and crypto-security requirements. Practically it’s a conjunction of RSA asymmetric, AES symmetric, hashing function and digital signature in one hybrid. The results of the research on hybrid assist to enhance the security concerns of confidentiality, integrity, authentication and non repudiation. Data confidentiality and integrity are achieved using AES-256 for data encryption which is 21.26% and 23.29%encryption and decryption processing time respectively compare to the current RSA processing time. In additional hybrid encryption technique is a public encryption uses multiple keys where there is not distribution of secret key. Data authentication to sender is ensured using digital signature. We use SHA-1 as a stronger hashing function than MD5 on digital signature has to enhance data non repudiation. en_US
dc.language.iso en en_US
dc.publisher COPAS, JKUAT en_US
dc.subject Data Security en_US
dc.subject Hybrid Encryption Technique en_US
dc.subject Advanced Encryption Standard en_US
dc.subject Rivest Shamir Adleman en_US
dc.title Enhancing Data Security by Using Hybrid Encryption Technique (Advanced Encryption Standard and Rivest Shamir Adleman) en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account