Abstract: Cryptography is the way through which the data can be secured by encrypting and then decrypting at secured location. Encryption is the process or technique through which data can be transferred in to unreadable form. Decryption is the process or technique through which unreadable form data can be transferred in to readable form by using a key. A key either same or different is used to encrypt or decrypt data by authorized user. Based on these keys there are different types of cryptography techniques such as secret key cryptography, public key cryptography and Hash cryptography. Even now-a-days hybridization is used to merge two or more techniques to develop a new and improved form. So in our proposed paper we will try to use hybrid cryptography with RSA and DES cryptography algorithms and verify the results with other hybrid cryptography algorithms so that the data can be transferred to the destination safely.
Key Words: Cryptography, DES, RSA, 3-DES, Hybridization
[1]. J Markopoulou, A., Iannaccone, G., Bhattacharyya, S., Chuah, C.N., Ganjali, Y. and Diot, C. "Characterization of failures in an operational IP backbone network", IEEE/ACM Transactions on Networking (TON), 16(4), pp.749-762. 2008
[2]. Van Tilborg, H.C. and Jajodia, S. eds." Encyclopedia of cryptography and security", Springer Science & Business Media, 2014
[3]. Armknecht, F., Iwata, T., Nyberg, K. and Preneel, B. "Symmetric Cryptography", [Dagstuhl Seminar 16021] In Dagstuhl Reports (Vol. 6, No. 1). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2016
[4]. Sousa, L., Antao, S., Kelley, K., Jiang, N., Harris, D.M. and Pinckney, N. Public Key Cryptography. In Circuits and Systems for Security and Privacy (pp. 133-206). CRC Pres, 2016.
[5]. Emmett, J., Eisen, P.A., Muir, J. and Murdock, D., Irdeto BV, 2016." Method and system for protecting execution of cryptographic hash functions", U.S. Patent 9,443,091.