Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm

I

Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and Twofish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust over the technology.

International Journal of Electrical and Computer Engineering (IJECE)
Vol. 9, No. 4, August 2019, pp. 2578~2584
ISSN: 2088-8708, DOI: 10.11591/ijece.v9i4.pp2578-2584  2578
Journal homepage: http://iaescore.com/journals/index.php/IJECE
Hybrid cryptography security in public cloud using TwoFish
and ECC algorithm
Siva Sankaran P, Kirubanand V B
Department of Computer Science, Christ (Deemed to be University), India
Article Info ABSTRACT
Article history:
Received Dec 2, 2018
Revised Jan 1, 2019
Accepted Mar 10, 2019
Cloud computing is a structure for rendering service to the user for free or
paid basis through internet facility where we can access to a bulk of shared
resources which results in saving managing cost and time for large
companies, The data which are stored in the data center may incur various
security, damage and threat issues which may result in data leakage, insecure
interface and inside attacks. This paper will demonstrate the implementation
of hybrid cryptography security in public cloud by a combination of
Elliptical Curve Cryptography and TwoFish algorithm, which provides an
innovative solution to enhance the security features of the cloud so that we
can improve the service thus results in increasing the trust overthe
technology.
Keywords:
Cloud computing
Cryptography
Elliptic curve Cryptography
Private key
Public key
TwoFish
Copyright © 2019 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Siva Sankaran P,
Department of Computer Science,
Christ (Deemed to be University),
Bangalore, 560029-India.
Email: sivasankarangp@gmail.com
1. INTRODUCTION
a. Cloud Computing
Cloud Computing is a distributed architecture and provides a centralized server storage platform to
deliver on-demand computing data and services. Cloud Service Provider which offer cloud platform to
provide the client to access and use, create their web services, same as like ISP which provides offers to
customers and internet facility. Cloud computing is the practice of using remote servers network connected to
the internet to store, manage and process data with minimal management effort. The basic mechanism of
cloud storage contains four layers: Storage layer, Basic Management layer, Application interface layer and
Access layer.
The Storage layer which is responsible for storage of the data, Management layer which ensures
security and stability, application interface layer provides an application service platform and the access layer
provides the access platform. Cloud providers offer 3 types of services they are Software as a Service,
Platform as a Service and Infrastructure as a Service [1].
b. Symmetric cryptography
The algorithm which use the unique cryptic key for encryption and decryption is asymmetric
cryptography. The key is the shared secret between the parties to maintain the secret information. In order to
access the information, both the parties will require the secret key which is one of the drawbacks of the
private encryption method.
Int J Elec & Comp Eng ISSN: 2088-8708 
Hybrid cryptography security in public cloud using TwoFish and ECC algorithm (Siva Sankaran P)
2579
c. Asymmetric cryptography
The algorithm where key comes in a pair is a form of Asymmetric encryption, where one is used to
encrypt and other to decrypt, It is known as public key cryptography since users create a matching key pair
and make one key secret and keeping the other key public. The sender will be able to send the message by
encrypting with the help of receiver public key, so only the authorized receiver will be able to decrypt the
message because only that user has authorization to access the required secret key.
2. LITERATURE REVIEW
Cloud Computing security is a major aspect of the information system, various researches had been
made around the world to improve the security in the cloud infrastructure and environment. Rong et al. [2]
had mentioned that though several technological methods devote to better security performances in the cloud
system, still there are no perfect solutions, and several problems exist. Subasree [3] mentions there are
several security threats in the network were network is an interconnected node. In order to maintain the level
of security in the network there is three major security principle to be taken into consideration they are 1)
Confidentiality 2) Authentication 3) Integrity which requires certain security algorithm such as ECC and
RSA. They are designed for providing improved security by the integrity of both symmetric and asymmetric
cryptographic techniques. Wang Tianfu [4] explains that the most unsafe method of communication is the
internet due to the public network.
Currently, various algorithm techniques are been used to provide protection to information, so in
order to improve the security hybrid model is introduced a combination of AES and DES was a significant
result has been observed from the proposed solution. Maitri [5] explore that implementation of a single
algorithm for security is not efficient for today’s world. The proposed system uses AES, Blowfish RC6
algorithm to give block-wise security to the data file. The different algorithm is used to encrypt each and
every part of the data. The concept of multithreading technique is used to encrypt all part of the file. Cloud
owner upload the files to the cloud server. The file is separated into 8 parts and each part is encrypted
simultaneously and the data is stored on the cloud server. When cloud user requests a file they get a stego
image using an ID which contains the key information, the process is reversed to decode the file. In hybrid
algorithm three keys are used one for data upload on the cloud, the mandatory keys are RSA and AES. They
are necessary to download the file from the cloud server.
Bhandari et al. [6] have proposed the important issues in data security and privacy of data. Hybrid
encryption is implemented by RSA with AES to improve the efficiency of the security. The RSA algorithm
complexity is dependent on how large exponent, symmetric cipher has complexity O(1), it consumes less
time when compared to RSA because it needs to store the computations. So the proposed algorithm works
better.
3. OVERVIEW OF ALGORITHM
The cryptographic algorithm is analyzed to observe the performance evaluation. An algorithm is a
step of procedures to solve the problems which obtain the desired output for a given input in a finite amount
of time. In this paper we are taking four encryption algorithm and making a comparative study to find which
is best to provide security to the cloud, the encryption algorithm includes TWOFISH, DES, RSA,
and ECC [7].
3.1. Data encryption standard
DES - data encryption standard was first developed by the IBM labs. It contains 56 bits key for the
process of encryption and decryption of data, The 16 round of encryption on every 64 bits block of data is
required to encrypt the data. It was accepted by the NIST in 1978. It follows a symmetric encryption system
which uses a 64-bits block. It has 56 bits key length which makes the algorithm more effective. DES is
completely based on the Feistel Cipher. Round function, Key schedule, Initial, and final permutation are
required to specify DES.
3.2. RSA (rivest-shamir-adleman)
RSA is an asymmetric algorithm where keys typically 1024 or 2048 bits long, the basic concept of
RSA is on the fact that it is tough and challenging to factorize a large integer. The algorithm is designed in
the way that it consists of two number where one of the numbers is a product of two big prime numbers and
from this two prime number the private key is also derived, so in case if anyone can factorize the number, the
private key will be compromised. The strength of encryption lies on the key length, if we increase the length
or size of the key then the level of encryption will also gradually increase [8].
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2578 – 2584
2580
3.3. TwoFish
An efficient symmetric algorithm for data encryption is TwoFish and it is recommended as AES.
The design criteria as shown in Figure 1 by NIST requirement standard of AES as follows:
Step 1: Symmetric cipher block of 128-bit
Step 2: Contains no weak keys
Step 3: Simpler design to facilitate the process of implementation and analysis of the algorithm.
Step 4: Flexible design
Step 5: Ability to take key length up to 256 bit.
Figure 1. TwoFish algorithm block diagram
3.4. Elliptic curve cryptography (ECC)
ECC is a Public-key cryptography which depends on the algebraic structure of elliptic curve over a
finite fields as shown in Figure 2. One of the important features of ECC is it requires a small key when
compared to another non-ECC algorithm which provides the same level of security. It can be applicable for
key agreement, digital signature, pseudo-random generators. ECC has some primary benefits like smaller key
size, reduced storage, and transmission requirement, this proves that ECC can provide a similar level of
security which other RSA related system with a big module and correspondingly bigger key. ECC can
provide security with a 256-bit EC public key which can give a comparable security to a 3072-bit RSA public
key [7].
Figure 2. ECC algorithm block diagram
Int J Elec & Comp Eng ISSN: 2088-8708 
Hybrid cryptography security in public cloud using TwoFish and ECC algorithm (Siva Sankaran P)
2581
4. PROPOSED MODEL
Hybrid Cryptography encryption is an integrated approach of two Encryption Algorithm in order to
provide security to data in a public cloud, In this paper Symmetric and Asymmetric type encryption
technique are implemented to get an efficient result. This type of cryptography is safe, but they also contain
certain drawbacks such as slow in encryption and decryption for a large set of data. The proposed
methodology as shown in Figure 3 works in such a way that it integrates the speed of one key encryption and
decryption in company with the security that both Public and Private Key provides, which in turn results in a
favorably secure type of encryption.
Hybrid Cryptography performs by encrypting the data with a Symmetric Key (Public Key) which
will be then encrypted with an Asymmetric Key (Private Key) of the sender. In order to decode the encrypted
data, the receiver should first decrypt the public key with the provided Asymmetric Key and then use the
Public Key to decrypt the data which is been received. This methodology can be well understood with an
example [9].
4.1. Steps involved in encryption
i) The first step to be followed is to obtain the user ‘X’ public key.
ii) Then generate a new symmetric key and encrypt the data using the key.
iii) Now encrypt the symmetric key using user ‘X’ public key.
iv) Send these two encryption files to user ‘X’.
4.2 Steps involved in decryption
In Order to decrypt the hybrid ciphertext, the receiver does the following:
i) The receiver needs the key (Private Key) in order to decrypt the symmetric key.
ii) Then the receiver uses the decrypted symmetric key in order to decrypt the original data.
4.3. Block diagram
Figure 3. Proposed system block diagram
5. RESULT AND DISCUSSION
5.1. ECC
The implementation of ECC undergoes three phases where it is integrated with ECDSA as shown in
Figure 4 they are: i) ECDSA key generation; ii) ECDSA signature; iii) ECDSA signature verification.
The Elliptic curve Digital Signature Algorithm is implemented on EC P-192 in Java language.
5.1.1. Key generation of ECDSA
The EC parameters are (n,P,d,Q,h). The entity A undergoes the following process:
Step 1 : First is to select a EC ‘E’ as defined on F2m. Note that the no of points in E(F2m) has to be
divisible by a greater prime number n.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2578 – 2584
2582
Step 2 : now select a point P (summantion) E(F2m) of order n.
Step 3 : Statistically same and unpredictable integer ‘d’ in the interval [1, n-1]
Step 4 : now compute (Q = dp)
Step 5 : The private and Public key of ‘A’ are d and (E,P,n,Q).
Figure 4. ECDSA key generation block diagram
5.1.2. Signature generation of ECDSA
In order the message A to be signed, X need to do the following:
Step 1 : Initially a statistically same and undeterminable integer y is selected in the interval between [1, n-1].
Step 2 : Then we need to compute yP=(x,y) and r=x mod n. If r=0 then proceed to first step.
Step 3 : y-1 mod n is computed.
Step 4 : s=y-1{h(m)+dr} mod n is computed, where in this equation h is the secure Hash Algorithm
(SHA-1).
Step 5 : Go to step 1 if s=0.
Step 6 : The integers pair (r,s) for the message A is the signature.
5.1.3. Signature verification of ECDSA
In Order to verify X’s signature (r,s) on m. Y does the following as shown in Figure 5:
Step 1 : First step is to get the authentic of X’s public key (E,P,n,Q). Then verify that r and s are integers in
the interval [1, n-1].
Step 2 : Then compute w=s-1 mod n and h(m)
Step 3 : Compute u1= h(m) w mod n and u2= rw mod n and then compute u1p+u2Q= (X0, Y0) and
v=x0mod n.
Step 4 : If v=r then accept the signature.
Figure 5. ECDSA signature verification block diagram
Int J Elec & Comp Eng ISSN: 2088-8708 
Hybrid cryptography security in public cloud using TwoFish and ECC algorithm (Siva Sankaran P)
2583
5.2. TwoFish
There are several things which to be considered when implementing a TwoFish algorithm which is
as follows:
Step 1 : The 128 bits input is divided into four parts, 32 bits each are using little-endian convention. Right
part contains two part and the left part contain the remaining two.
Step 2 : R0,1=P⊕Ki; i=0,.....,3 Bit-XOR input in advance with the four key parts. K is the key, Ki means the
sub key [10].
Step 3 : Feistel network structure is used in the Twofish algorithm and it consists of 16 iterations. Twofish
Function f consists of many stages:
a. The Function g, which contains four s-box and MDS matrix
b. pseudo-Hadamard transform
c. IPM addition of the key result
5.3. Comparative study
A comparative study on different algorithm as shown in Table 1.
Table 1. A comparative study on different algorithm
ALGORITHM DES RSA ECC TWOFISH
ROUNDS 16 1 1 16
BLOCK SIZE (Bits) 64 Variable block size Stream size is variable 128
SECURITY LEVEL Satisfactory Good Highly secure Secure
SPEED Very slow Average Very Fast Fast
KEY LENGTH (Bits) 64 Key length depends on
number of bits
Small but effective 128,192,256
ATTACK ROUND Exclusive key search,
Differential analysis
Brute force, timing
attack
Doubling attack Differential attack,
related key attack
6. IMPLEMENTATION
In order to implement the proposed model we used java language, The Java source code works
effectively and outcome contains no error. Following this screenshots are attached which shows the output of
the java implementation as shown in Figure 6.
Figure 6. Java implementation of algorithm
7. CONCLUSION
This Proposed work concludes that the solution provided by the hybrid encryption using ECC and
Twofish provides a better solution when compared to other encryption algorithms. This solution can be
applied in real time cloud platform to provide a better security to the data. In future, this method of
encryption can be used in local area networks to enhance the security and prevent from any cyber attacks.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2578 – 2584
2584
REFERENCES
[1] S. Choudhury, “Data encryption in public cloud using multi-phase encryption model,” International Journal of
Engineering & Technology, vol/issue: 7(1), pp. 223-227, 2018.
[2] Rong, C., Nguyen, S. T., & Jaatun, M. G. (2013, May). Beyond lightning: A survey on security challenges in cloud
computing. Computers & Electrical Engineering, 39(1), 47–54. doi:10.1016/j.compeleceng.2012.04.015 Ryan M.
D. (2013).
[3] S. Subasree, “Design of A New Security Protocol Using Hybrid Cryptography Algorithms.”
[4] W. Tianfu, “Design of a Hybrid Cryptographic Algorithm,” International Journal of Computer Science &
Communication Networks, vol/issue: 2(2), pp. 277-283.
[5] P. V. Maitri, “File storage in Cloud Computing using Hybrid Cryptography Algorithm,” IEEE, pp. 603-610, 2016.
[6] A. Bhandari, “Secure algorithm for cloud computing and its applications,” IEEE, pp. 188-192, 2016.
[7] K. Singh, “Implementation of Elliptic curve Digital Signature Algorithm,” International Journal of Computer
Application IJDCST@June-July-2015, Issue-V-3, I-5, SW-23.
[8] Dr. K.L. Vasundhara *et.al. Int. Journal of Engineering Research and Application www.ijera.comISSN: 2248-9622,
Vol. 8, Issue 1, (Part -I) January 2018, pp.49-52
[9] A. Puri, “Enhancing Cloud Security by Hybrid Encryption Scheme,” International Journal of Advance Engineering
Technology E-ISSN 0976-3945.
[10] G. K. Kumar, “Comparative study on Blowfish and Twofish Algorithm for Cloud security,” International Journal
of Current Trends in Engineering and Research, e-ISSN 2455–1392 Volume 3 Issue 9, September 2017pp. 1–11.
BIOGRAPHIES OF AUTHORS
Siva Sankaran P, Research Scholar, , Department of Computer Science,, Christ( Deemed to be
University), Bangalore – 29.
Dr. Kirubanand V B., Associate Professor, Department of Computer Science, Christ( Deemed to be
University), Bangalore – 29.

Recomendados

IRJET- Secure File Storage on Cloud using Cryptography por
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using CryptographyIRJET Journal
478 vistas4 diapositivas
Secure cloud storage por
Secure cloud storageSecure cloud storage
Secure cloud storageALIN BABU
150 vistas31 diapositivas
Secry poster por
Secry posterSecry poster
Secry posterALIN BABU
239 vistas1 diapositiva
Efficient two-stage cryptography scheme for secure distributed data storage i... por
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
13 vistas12 diapositivas
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE por
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEAM Publications,India
71 vistas4 diapositivas
IRJET- Storage Security in Cloud Computing por
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
26 vistas5 diapositivas

Más contenido relacionado

La actualidad más candente

MIMO Wireless based Cryptosystem using Electronic Key Generation Unit por
MIMO Wireless based Cryptosystem using Electronic Key Generation UnitMIMO Wireless based Cryptosystem using Electronic Key Generation Unit
MIMO Wireless based Cryptosystem using Electronic Key Generation UnitAssociation of Scientists, Developers and Faculties
206 vistas4 diapositivas
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati... por
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
20 vistas4 diapositivas
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag... por
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
9 vistas5 diapositivas
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit... por
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET Journal
9 vistas5 diapositivas
Internet Protocol Security as the Network Cryptography System por
Internet Protocol Security as the Network Cryptography SystemInternet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography SystemUniversitas Pembangunan Panca Budi
88 vistas4 diapositivas
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms por
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
15 vistas9 diapositivas

La actualidad más candente(19)

IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati... por IRJET Journal
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal20 vistas
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag... por IRJET Journal
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal9 vistas
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit... por IRJET Journal
IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...IRJET -  	  Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET - Multi Authority based Integrity Auditing and Proof of Storage wit...
IRJET Journal9 vistas
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms por IRJET Journal
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal15 vistas
Comparison of Various Encryption Algorithms and Techniques for improving secu... por IOSR Journals
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
IOSR Journals365 vistas
IJSRED-V2I3P52 por IJSRED
IJSRED-V2I3P52IJSRED-V2I3P52
IJSRED-V2I3P52
IJSRED14 vistas
ijircee_Template por ijircee
ijircee_Templateijircee_Template
ijircee_Template
ijircee329 vistas
IRJET- Comparison Among RSA, AES and DES por IRJET Journal
IRJET-  	  Comparison Among RSA, AES and DESIRJET-  	  Comparison Among RSA, AES and DES
IRJET- Comparison Among RSA, AES and DES
IRJET Journal34 vistas
Prevention of Cheating Message based on Block Cipher using Digital Envelope por iosrjce
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
iosrjce527 vistas
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and... por IOSR Journals
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
IOSR Journals498 vistas
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY por csandit
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
csandit37 vistas
Cloud Data Security using Elliptic Curve Cryptography por IRJET Journal
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
IRJET Journal101 vistas
Providing Secure Cloud for College Campus por vivatechijri
Providing Secure Cloud for College CampusProviding Secure Cloud for College Campus
Providing Secure Cloud for College Campus
vivatechijri16 vistas
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage por IRJET Journal
Secure Privacy Preserving Using Multilevel Trust For Cloud StorageSecure Privacy Preserving Using Multilevel Trust For Cloud Storage
Secure Privacy Preserving Using Multilevel Trust For Cloud Storage
IRJET Journal30 vistas
File transfer with multiple security mechanism por Shubham Patil
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
Shubham Patil66 vistas

Similar a Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm

Ijcnc050208 por
Ijcnc050208Ijcnc050208
Ijcnc050208IJCNCJournal
283 vistas9 diapositivas
Cloud security: literature survey por
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature surveyIJECEIAES
6 vistas9 diapositivas
Implement a novel symmetric block por
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric blockijcisjournal
235 vistas11 diapositivas
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM por
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
2 vistas11 diapositivas
IJARCCE 20 por
IJARCCE 20IJARCCE 20
IJARCCE 20Nahan Rahman
211 vistas4 diapositivas
IRJET- Cryptography Encryption and Decryption File Protection based on Mo... por
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
27 vistas3 diapositivas

Similar a Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm(20)

Cloud security: literature survey por IJECEIAES
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
IJECEIAES6 vistas
Implement a novel symmetric block por ijcisjournal
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
ijcisjournal235 vistas
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM por ijcisjournal
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal2 vistas
IRJET- Cryptography Encryption and Decryption File Protection based on Mo... por IRJET Journal
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal27 vistas
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf por HimaBinduKrovvidi
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdfSecure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
Secure_Data_Distribution_Algorithm_for_Fog_Computing.pdf
HimaBinduKrovvidi12 vistas
A new hybrid text encryption approach over mobile ad hoc network por IJECEIAES
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
IJECEIAES13 vistas
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M... por IRJET Journal
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal298 vistas
The Time-Consuming Task Of Preparing A Data Set For... por Kimberly Thomas
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
Kimberly Thomas2 vistas
IRJET- Data Security in Cloud Computing through AES under Drivehq por IRJET Journal
IRJET- Data Security in Cloud Computing through AES under DrivehqIRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET- Data Security in Cloud Computing through AES under Drivehq
IRJET Journal18 vistas
Secure Data Storage on Cloud System for Privacy Preserving por IRJET Journal
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal44 vistas
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)... por dbpublications
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
dbpublications57 vistas
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -... por IJCI JOURNAL
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
IJCI JOURNAL264 vistas
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto... por IRJET Journal
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET Journal69 vistas
Improving Data Storage Security in Cloud using Hadoop por IJERA Editor
Improving Data Storage Security in Cloud using HadoopImproving Data Storage Security in Cloud using Hadoop
Improving Data Storage Security in Cloud using Hadoop
IJERA Editor285 vistas
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ... por IJSRD
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
A Survey Paper On Data Confidentiatity And Security in Cloud Computing Using ...
IJSRD 246 vistas
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry... por IRJET Journal
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
Privacy Preserving and Ownership in Cloud Computing using Symmetric Key Encry...
IRJET Journal34 vistas

Más de IJECEIAES

Predictive fertilization models for potato crops using machine learning techn... por
Predictive fertilization models for potato crops using machine learning techn...Predictive fertilization models for potato crops using machine learning techn...
Predictive fertilization models for potato crops using machine learning techn...IJECEIAES
3 vistas9 diapositivas
Computer-aided automated detection of kidney disease using supervised learnin... por
Computer-aided automated detection of kidney disease using supervised learnin...Computer-aided automated detection of kidney disease using supervised learnin...
Computer-aided automated detection of kidney disease using supervised learnin...IJECEIAES
2 vistas10 diapositivas
Reliable and efficient webserver management for task scheduling in edge-cloud... por
Reliable and efficient webserver management for task scheduling in edge-cloud...Reliable and efficient webserver management for task scheduling in edge-cloud...
Reliable and efficient webserver management for task scheduling in edge-cloud...IJECEIAES
2 vistas10 diapositivas
Reinforcement learning-based security schema mitigating manin-the-middle atta... por
Reinforcement learning-based security schema mitigating manin-the-middle atta...Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...IJECEIAES
2 vistas14 diapositivas
Resource-efficient workload task scheduling for cloud-assisted internet of th... por
Resource-efficient workload task scheduling for cloud-assisted internet of th...Resource-efficient workload task scheduling for cloud-assisted internet of th...
Resource-efficient workload task scheduling for cloud-assisted internet of th...IJECEIAES
2 vistas10 diapositivas
Breast cancer classification with histopathological image based on machine le... por
Breast cancer classification with histopathological image based on machine le...Breast cancer classification with histopathological image based on machine le...
Breast cancer classification with histopathological image based on machine le...IJECEIAES
4 vistas13 diapositivas

Más de IJECEIAES(20)

Predictive fertilization models for potato crops using machine learning techn... por IJECEIAES
Predictive fertilization models for potato crops using machine learning techn...Predictive fertilization models for potato crops using machine learning techn...
Predictive fertilization models for potato crops using machine learning techn...
IJECEIAES3 vistas
Computer-aided automated detection of kidney disease using supervised learnin... por IJECEIAES
Computer-aided automated detection of kidney disease using supervised learnin...Computer-aided automated detection of kidney disease using supervised learnin...
Computer-aided automated detection of kidney disease using supervised learnin...
IJECEIAES2 vistas
Reliable and efficient webserver management for task scheduling in edge-cloud... por IJECEIAES
Reliable and efficient webserver management for task scheduling in edge-cloud...Reliable and efficient webserver management for task scheduling in edge-cloud...
Reliable and efficient webserver management for task scheduling in edge-cloud...
IJECEIAES2 vistas
Reinforcement learning-based security schema mitigating manin-the-middle atta... por IJECEIAES
Reinforcement learning-based security schema mitigating manin-the-middle atta...Reinforcement learning-based security schema mitigating manin-the-middle atta...
Reinforcement learning-based security schema mitigating manin-the-middle atta...
IJECEIAES2 vistas
Resource-efficient workload task scheduling for cloud-assisted internet of th... por IJECEIAES
Resource-efficient workload task scheduling for cloud-assisted internet of th...Resource-efficient workload task scheduling for cloud-assisted internet of th...
Resource-efficient workload task scheduling for cloud-assisted internet of th...
IJECEIAES2 vistas
Breast cancer classification with histopathological image based on machine le... por IJECEIAES
Breast cancer classification with histopathological image based on machine le...Breast cancer classification with histopathological image based on machine le...
Breast cancer classification with histopathological image based on machine le...
IJECEIAES4 vistas
Early detection of dysphoria using electroencephalogram affective modelling por IJECEIAES
Early detection of dysphoria using electroencephalogram affective modelling Early detection of dysphoria using electroencephalogram affective modelling
Early detection of dysphoria using electroencephalogram affective modelling
IJECEIAES4 vistas
A novel defect detection method for software requirements inspections por IJECEIAES
A novel defect detection method for software requirements inspections A novel defect detection method for software requirements inspections
A novel defect detection method for software requirements inspections
IJECEIAES2 vistas
Convolutional auto-encoded extreme learning machine for incremental learning ... por IJECEIAES
Convolutional auto-encoded extreme learning machine for incremental learning ...Convolutional auto-encoded extreme learning machine for incremental learning ...
Convolutional auto-encoded extreme learning machine for incremental learning ...
IJECEIAES2 vistas
Brain cone beam computed tomography image analysis using ResNet50 for collate... por IJECEIAES
Brain cone beam computed tomography image analysis using ResNet50 for collate...Brain cone beam computed tomography image analysis using ResNet50 for collate...
Brain cone beam computed tomography image analysis using ResNet50 for collate...
IJECEIAES2 vistas
Channel and spatial attention mechanism for fashion image captioning por IJECEIAES
Channel and spatial attention mechanism for fashion image captioning Channel and spatial attention mechanism for fashion image captioning
Channel and spatial attention mechanism for fashion image captioning
IJECEIAES2 vistas
Regional feature learning using attribute structural analysis in bipartite at... por IJECEIAES
Regional feature learning using attribute structural analysis in bipartite at...Regional feature learning using attribute structural analysis in bipartite at...
Regional feature learning using attribute structural analysis in bipartite at...
IJECEIAES2 vistas
Adaptive traffic lights based on traffic flow prediction using machine learni... por IJECEIAES
Adaptive traffic lights based on traffic flow prediction using machine learni...Adaptive traffic lights based on traffic flow prediction using machine learni...
Adaptive traffic lights based on traffic flow prediction using machine learni...
IJECEIAES2 vistas
Content-based product image retrieval using squared-hinge loss trained convol... por IJECEIAES
Content-based product image retrieval using squared-hinge loss trained convol...Content-based product image retrieval using squared-hinge loss trained convol...
Content-based product image retrieval using squared-hinge loss trained convol...
IJECEIAES2 vistas
A deep convolutional structure-based approach for accurate recognition of ski... por IJECEIAES
A deep convolutional structure-based approach for accurate recognition of ski...A deep convolutional structure-based approach for accurate recognition of ski...
A deep convolutional structure-based approach for accurate recognition of ski...
IJECEIAES2 vistas
IPv6 flood attack detection based on epsilon greedy optimized Q learning in s... por IJECEIAES
IPv6 flood attack detection based on epsilon greedy optimized Q learning in s...IPv6 flood attack detection based on epsilon greedy optimized Q learning in s...
IPv6 flood attack detection based on epsilon greedy optimized Q learning in s...
IJECEIAES2 vistas
Analysis and prediction of seed quality using machine learning por IJECEIAES
Analysis and prediction of seed quality using machine learning Analysis and prediction of seed quality using machine learning
Analysis and prediction of seed quality using machine learning
IJECEIAES2 vistas
Explainable extreme boosting model for breast cancer diagnosis por IJECEIAES
Explainable extreme boosting model for breast cancer diagnosis Explainable extreme boosting model for breast cancer diagnosis
Explainable extreme boosting model for breast cancer diagnosis
IJECEIAES2 vistas
Predicting active compounds for lung cancer based on quantitative structure-a... por IJECEIAES
Predicting active compounds for lung cancer based on quantitative structure-a...Predicting active compounds for lung cancer based on quantitative structure-a...
Predicting active compounds for lung cancer based on quantitative structure-a...
IJECEIAES4 vistas
U-Net transfer learning backbones for lesions segmentation in breast ultrasou... por IJECEIAES
U-Net transfer learning backbones for lesions segmentation in breast ultrasou...U-Net transfer learning backbones for lesions segmentation in breast ultrasou...
U-Net transfer learning backbones for lesions segmentation in breast ultrasou...
IJECEIAES2 vistas

Último

Different type of computer networks .pptx por
Different  type of computer networks .pptxDifferent  type of computer networks .pptx
Different type of computer networks .pptxnazmul1514788
20 vistas22 diapositivas
IRJET-Productivity Enhancement Using Method Study.pdf por
IRJET-Productivity Enhancement Using Method Study.pdfIRJET-Productivity Enhancement Using Method Study.pdf
IRJET-Productivity Enhancement Using Method Study.pdfSahilBavdhankar
11 vistas4 diapositivas
Design_Discover_Develop_Campaign.pptx por
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptxShivanshSeth6
59 vistas20 diapositivas
AWS Certified Solutions Architect Associate Exam Guide_published .pdf por
AWS Certified Solutions Architect Associate Exam Guide_published .pdfAWS Certified Solutions Architect Associate Exam Guide_published .pdf
AWS Certified Solutions Architect Associate Exam Guide_published .pdfKiran Kumar Malik
6 vistas121 diapositivas
2023-12 Emarei MRI Tool Set E2I0501ST (TQ).pdf por
2023-12 Emarei MRI Tool Set E2I0501ST (TQ).pdf2023-12 Emarei MRI Tool Set E2I0501ST (TQ).pdf
2023-12 Emarei MRI Tool Set E2I0501ST (TQ).pdfPhilipp Daum
6 vistas2 diapositivas
Global airborne satcom market report por
Global airborne satcom market reportGlobal airborne satcom market report
Global airborne satcom market reportdefencereport78
8 vistas13 diapositivas

Último(20)

Different type of computer networks .pptx por nazmul1514788
Different  type of computer networks .pptxDifferent  type of computer networks .pptx
Different type of computer networks .pptx
nazmul151478820 vistas
IRJET-Productivity Enhancement Using Method Study.pdf por SahilBavdhankar
IRJET-Productivity Enhancement Using Method Study.pdfIRJET-Productivity Enhancement Using Method Study.pdf
IRJET-Productivity Enhancement Using Method Study.pdf
SahilBavdhankar11 vistas
Design_Discover_Develop_Campaign.pptx por ShivanshSeth6
Design_Discover_Develop_Campaign.pptxDesign_Discover_Develop_Campaign.pptx
Design_Discover_Develop_Campaign.pptx
ShivanshSeth659 vistas
AWS Certified Solutions Architect Associate Exam Guide_published .pdf por Kiran Kumar Malik
AWS Certified Solutions Architect Associate Exam Guide_published .pdfAWS Certified Solutions Architect Associate Exam Guide_published .pdf
AWS Certified Solutions Architect Associate Exam Guide_published .pdf
2023-12 Emarei MRI Tool Set E2I0501ST (TQ).pdf por Philipp Daum
2023-12 Emarei MRI Tool Set E2I0501ST (TQ).pdf2023-12 Emarei MRI Tool Set E2I0501ST (TQ).pdf
2023-12 Emarei MRI Tool Set E2I0501ST (TQ).pdf
Philipp Daum6 vistas
Solution Challenge Introduction.pptx por GDSCCEC
Solution Challenge Introduction.pptxSolution Challenge Introduction.pptx
Solution Challenge Introduction.pptx
GDSCCEC13 vistas
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc... por csegroupvn
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
Design of Structures and Foundations for Vibrating Machines, Arya-ONeill-Pinc...
csegroupvn17 vistas
DevFest 2023 Daegu Speech_이재규, Implementing easy and simple chat with gol... por JQLEE6
DevFest 2023 Daegu Speech_이재규,  Implementing easy and simple chat with gol...DevFest 2023 Daegu Speech_이재규,  Implementing easy and simple chat with gol...
DevFest 2023 Daegu Speech_이재규, Implementing easy and simple chat with gol...
JQLEE616 vistas
MongoDB.pdf por ArthyR3
MongoDB.pdfMongoDB.pdf
MongoDB.pdf
ArthyR353 vistas
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth por Innomantra
BCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for GrowthBCIC - Manufacturing Conclave -  Technology-Driven Manufacturing for Growth
BCIC - Manufacturing Conclave - Technology-Driven Manufacturing for Growth
Innomantra 28 vistas
Details of Acoustic Liner for selection of material por rafiqalisyed
Details of Acoustic Liner for selection of materialDetails of Acoustic Liner for selection of material
Details of Acoustic Liner for selection of material
rafiqalisyed5 vistas
Field Programmable Gate Arrays : Architecture por Usha Mehta
Field Programmable Gate Arrays : ArchitectureField Programmable Gate Arrays : Architecture
Field Programmable Gate Arrays : Architecture
Usha Mehta33 vistas
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R... por IJCNCJournal
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient R...
IJCNCJournal5 vistas
Programmable Logic Devices : SPLD and CPLD por Usha Mehta
Programmable Logic Devices : SPLD and CPLDProgrammable Logic Devices : SPLD and CPLD
Programmable Logic Devices : SPLD and CPLD
Usha Mehta44 vistas

Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 9, No. 4, August 2019, pp. 2578~2584 ISSN: 2088-8708, DOI: 10.11591/ijece.v9i4.pp2578-2584  2578 Journal homepage: http://iaescore.com/journals/index.php/IJECE Hybrid cryptography security in public cloud using TwoFish and ECC algorithm Siva Sankaran P, Kirubanand V B Department of Computer Science, Christ (Deemed to be University), India Article Info ABSTRACT Article history: Received Dec 2, 2018 Revised Jan 1, 2019 Accepted Mar 10, 2019 Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and TwoFish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust overthe technology. Keywords: Cloud computing Cryptography Elliptic curve Cryptography Private key Public key TwoFish Copyright © 2019 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Siva Sankaran P, Department of Computer Science, Christ (Deemed to be University), Bangalore, 560029-India. Email: sivasankarangp@gmail.com 1. INTRODUCTION a. Cloud Computing Cloud Computing is a distributed architecture and provides a centralized server storage platform to deliver on-demand computing data and services. Cloud Service Provider which offer cloud platform to provide the client to access and use, create their web services, same as like ISP which provides offers to customers and internet facility. Cloud computing is the practice of using remote servers network connected to the internet to store, manage and process data with minimal management effort. The basic mechanism of cloud storage contains four layers: Storage layer, Basic Management layer, Application interface layer and Access layer. The Storage layer which is responsible for storage of the data, Management layer which ensures security and stability, application interface layer provides an application service platform and the access layer provides the access platform. Cloud providers offer 3 types of services they are Software as a Service, Platform as a Service and Infrastructure as a Service [1]. b. Symmetric cryptography The algorithm which use the unique cryptic key for encryption and decryption is asymmetric cryptography. The key is the shared secret between the parties to maintain the secret information. In order to access the information, both the parties will require the secret key which is one of the drawbacks of the private encryption method.
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  Hybrid cryptography security in public cloud using TwoFish and ECC algorithm (Siva Sankaran P) 2579 c. Asymmetric cryptography The algorithm where key comes in a pair is a form of Asymmetric encryption, where one is used to encrypt and other to decrypt, It is known as public key cryptography since users create a matching key pair and make one key secret and keeping the other key public. The sender will be able to send the message by encrypting with the help of receiver public key, so only the authorized receiver will be able to decrypt the message because only that user has authorization to access the required secret key. 2. LITERATURE REVIEW Cloud Computing security is a major aspect of the information system, various researches had been made around the world to improve the security in the cloud infrastructure and environment. Rong et al. [2] had mentioned that though several technological methods devote to better security performances in the cloud system, still there are no perfect solutions, and several problems exist. Subasree [3] mentions there are several security threats in the network were network is an interconnected node. In order to maintain the level of security in the network there is three major security principle to be taken into consideration they are 1) Confidentiality 2) Authentication 3) Integrity which requires certain security algorithm such as ECC and RSA. They are designed for providing improved security by the integrity of both symmetric and asymmetric cryptographic techniques. Wang Tianfu [4] explains that the most unsafe method of communication is the internet due to the public network. Currently, various algorithm techniques are been used to provide protection to information, so in order to improve the security hybrid model is introduced a combination of AES and DES was a significant result has been observed from the proposed solution. Maitri [5] explore that implementation of a single algorithm for security is not efficient for today’s world. The proposed system uses AES, Blowfish RC6 algorithm to give block-wise security to the data file. The different algorithm is used to encrypt each and every part of the data. The concept of multithreading technique is used to encrypt all part of the file. Cloud owner upload the files to the cloud server. The file is separated into 8 parts and each part is encrypted simultaneously and the data is stored on the cloud server. When cloud user requests a file they get a stego image using an ID which contains the key information, the process is reversed to decode the file. In hybrid algorithm three keys are used one for data upload on the cloud, the mandatory keys are RSA and AES. They are necessary to download the file from the cloud server. Bhandari et al. [6] have proposed the important issues in data security and privacy of data. Hybrid encryption is implemented by RSA with AES to improve the efficiency of the security. The RSA algorithm complexity is dependent on how large exponent, symmetric cipher has complexity O(1), it consumes less time when compared to RSA because it needs to store the computations. So the proposed algorithm works better. 3. OVERVIEW OF ALGORITHM The cryptographic algorithm is analyzed to observe the performance evaluation. An algorithm is a step of procedures to solve the problems which obtain the desired output for a given input in a finite amount of time. In this paper we are taking four encryption algorithm and making a comparative study to find which is best to provide security to the cloud, the encryption algorithm includes TWOFISH, DES, RSA, and ECC [7]. 3.1. Data encryption standard DES - data encryption standard was first developed by the IBM labs. It contains 56 bits key for the process of encryption and decryption of data, The 16 round of encryption on every 64 bits block of data is required to encrypt the data. It was accepted by the NIST in 1978. It follows a symmetric encryption system which uses a 64-bits block. It has 56 bits key length which makes the algorithm more effective. DES is completely based on the Feistel Cipher. Round function, Key schedule, Initial, and final permutation are required to specify DES. 3.2. RSA (rivest-shamir-adleman) RSA is an asymmetric algorithm where keys typically 1024 or 2048 bits long, the basic concept of RSA is on the fact that it is tough and challenging to factorize a large integer. The algorithm is designed in the way that it consists of two number where one of the numbers is a product of two big prime numbers and from this two prime number the private key is also derived, so in case if anyone can factorize the number, the private key will be compromised. The strength of encryption lies on the key length, if we increase the length or size of the key then the level of encryption will also gradually increase [8].
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2578 – 2584 2580 3.3. TwoFish An efficient symmetric algorithm for data encryption is TwoFish and it is recommended as AES. The design criteria as shown in Figure 1 by NIST requirement standard of AES as follows: Step 1: Symmetric cipher block of 128-bit Step 2: Contains no weak keys Step 3: Simpler design to facilitate the process of implementation and analysis of the algorithm. Step 4: Flexible design Step 5: Ability to take key length up to 256 bit. Figure 1. TwoFish algorithm block diagram 3.4. Elliptic curve cryptography (ECC) ECC is a Public-key cryptography which depends on the algebraic structure of elliptic curve over a finite fields as shown in Figure 2. One of the important features of ECC is it requires a small key when compared to another non-ECC algorithm which provides the same level of security. It can be applicable for key agreement, digital signature, pseudo-random generators. ECC has some primary benefits like smaller key size, reduced storage, and transmission requirement, this proves that ECC can provide a similar level of security which other RSA related system with a big module and correspondingly bigger key. ECC can provide security with a 256-bit EC public key which can give a comparable security to a 3072-bit RSA public key [7]. Figure 2. ECC algorithm block diagram
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  Hybrid cryptography security in public cloud using TwoFish and ECC algorithm (Siva Sankaran P) 2581 4. PROPOSED MODEL Hybrid Cryptography encryption is an integrated approach of two Encryption Algorithm in order to provide security to data in a public cloud, In this paper Symmetric and Asymmetric type encryption technique are implemented to get an efficient result. This type of cryptography is safe, but they also contain certain drawbacks such as slow in encryption and decryption for a large set of data. The proposed methodology as shown in Figure 3 works in such a way that it integrates the speed of one key encryption and decryption in company with the security that both Public and Private Key provides, which in turn results in a favorably secure type of encryption. Hybrid Cryptography performs by encrypting the data with a Symmetric Key (Public Key) which will be then encrypted with an Asymmetric Key (Private Key) of the sender. In order to decode the encrypted data, the receiver should first decrypt the public key with the provided Asymmetric Key and then use the Public Key to decrypt the data which is been received. This methodology can be well understood with an example [9]. 4.1. Steps involved in encryption i) The first step to be followed is to obtain the user ‘X’ public key. ii) Then generate a new symmetric key and encrypt the data using the key. iii) Now encrypt the symmetric key using user ‘X’ public key. iv) Send these two encryption files to user ‘X’. 4.2 Steps involved in decryption In Order to decrypt the hybrid ciphertext, the receiver does the following: i) The receiver needs the key (Private Key) in order to decrypt the symmetric key. ii) Then the receiver uses the decrypted symmetric key in order to decrypt the original data. 4.3. Block diagram Figure 3. Proposed system block diagram 5. RESULT AND DISCUSSION 5.1. ECC The implementation of ECC undergoes three phases where it is integrated with ECDSA as shown in Figure 4 they are: i) ECDSA key generation; ii) ECDSA signature; iii) ECDSA signature verification. The Elliptic curve Digital Signature Algorithm is implemented on EC P-192 in Java language. 5.1.1. Key generation of ECDSA The EC parameters are (n,P,d,Q,h). The entity A undergoes the following process: Step 1 : First is to select a EC ‘E’ as defined on F2m. Note that the no of points in E(F2m) has to be divisible by a greater prime number n.
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2578 – 2584 2582 Step 2 : now select a point P (summantion) E(F2m) of order n. Step 3 : Statistically same and unpredictable integer ‘d’ in the interval [1, n-1] Step 4 : now compute (Q = dp) Step 5 : The private and Public key of ‘A’ are d and (E,P,n,Q). Figure 4. ECDSA key generation block diagram 5.1.2. Signature generation of ECDSA In order the message A to be signed, X need to do the following: Step 1 : Initially a statistically same and undeterminable integer y is selected in the interval between [1, n-1]. Step 2 : Then we need to compute yP=(x,y) and r=x mod n. If r=0 then proceed to first step. Step 3 : y-1 mod n is computed. Step 4 : s=y-1{h(m)+dr} mod n is computed, where in this equation h is the secure Hash Algorithm (SHA-1). Step 5 : Go to step 1 if s=0. Step 6 : The integers pair (r,s) for the message A is the signature. 5.1.3. Signature verification of ECDSA In Order to verify X’s signature (r,s) on m. Y does the following as shown in Figure 5: Step 1 : First step is to get the authentic of X’s public key (E,P,n,Q). Then verify that r and s are integers in the interval [1, n-1]. Step 2 : Then compute w=s-1 mod n and h(m) Step 3 : Compute u1= h(m) w mod n and u2= rw mod n and then compute u1p+u2Q= (X0, Y0) and v=x0mod n. Step 4 : If v=r then accept the signature. Figure 5. ECDSA signature verification block diagram
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  Hybrid cryptography security in public cloud using TwoFish and ECC algorithm (Siva Sankaran P) 2583 5.2. TwoFish There are several things which to be considered when implementing a TwoFish algorithm which is as follows: Step 1 : The 128 bits input is divided into four parts, 32 bits each are using little-endian convention. Right part contains two part and the left part contain the remaining two. Step 2 : R0,1=P⊕Ki; i=0,.....,3 Bit-XOR input in advance with the four key parts. K is the key, Ki means the sub key [10]. Step 3 : Feistel network structure is used in the Twofish algorithm and it consists of 16 iterations. Twofish Function f consists of many stages: a. The Function g, which contains four s-box and MDS matrix b. pseudo-Hadamard transform c. IPM addition of the key result 5.3. Comparative study A comparative study on different algorithm as shown in Table 1. Table 1. A comparative study on different algorithm ALGORITHM DES RSA ECC TWOFISH ROUNDS 16 1 1 16 BLOCK SIZE (Bits) 64 Variable block size Stream size is variable 128 SECURITY LEVEL Satisfactory Good Highly secure Secure SPEED Very slow Average Very Fast Fast KEY LENGTH (Bits) 64 Key length depends on number of bits Small but effective 128,192,256 ATTACK ROUND Exclusive key search, Differential analysis Brute force, timing attack Doubling attack Differential attack, related key attack 6. IMPLEMENTATION In order to implement the proposed model we used java language, The Java source code works effectively and outcome contains no error. Following this screenshots are attached which shows the output of the java implementation as shown in Figure 6. Figure 6. Java implementation of algorithm 7. CONCLUSION This Proposed work concludes that the solution provided by the hybrid encryption using ECC and Twofish provides a better solution when compared to other encryption algorithms. This solution can be applied in real time cloud platform to provide a better security to the data. In future, this method of encryption can be used in local area networks to enhance the security and prevent from any cyber attacks.
  • 7.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 9, No. 4, August 2019 : 2578 – 2584 2584 REFERENCES [1] S. Choudhury, “Data encryption in public cloud using multi-phase encryption model,” International Journal of Engineering & Technology, vol/issue: 7(1), pp. 223-227, 2018. [2] Rong, C., Nguyen, S. T., & Jaatun, M. G. (2013, May). Beyond lightning: A survey on security challenges in cloud computing. Computers & Electrical Engineering, 39(1), 47–54. doi:10.1016/j.compeleceng.2012.04.015 Ryan M. D. (2013). [3] S. Subasree, “Design of A New Security Protocol Using Hybrid Cryptography Algorithms.” [4] W. Tianfu, “Design of a Hybrid Cryptographic Algorithm,” International Journal of Computer Science & Communication Networks, vol/issue: 2(2), pp. 277-283. [5] P. V. Maitri, “File storage in Cloud Computing using Hybrid Cryptography Algorithm,” IEEE, pp. 603-610, 2016. [6] A. Bhandari, “Secure algorithm for cloud computing and its applications,” IEEE, pp. 188-192, 2016. [7] K. Singh, “Implementation of Elliptic curve Digital Signature Algorithm,” International Journal of Computer Application IJDCST@June-July-2015, Issue-V-3, I-5, SW-23. [8] Dr. K.L. Vasundhara *et.al. Int. Journal of Engineering Research and Application www.ijera.comISSN: 2248-9622, Vol. 8, Issue 1, (Part -I) January 2018, pp.49-52 [9] A. Puri, “Enhancing Cloud Security by Hybrid Encryption Scheme,” International Journal of Advance Engineering Technology E-ISSN 0976-3945. [10] G. K. Kumar, “Comparative study on Blowfish and Twofish Algorithm for Cloud security,” International Journal of Current Trends in Engineering and Research, e-ISSN 2455–1392 Volume 3 Issue 9, September 2017pp. 1–11. BIOGRAPHIES OF AUTHORS Siva Sankaran P, Research Scholar, , Department of Computer Science,, Christ( Deemed to be University), Bangalore – 29. Dr. Kirubanand V B., Associate Professor, Department of Computer Science, Christ( Deemed to be University), Bangalore – 29.