Hybrid Cryptography: Performance Analysis of Various Cryptographic Combinations for Secure Communication

Full Text (PDF, 280KB), PP.35-41

Views: 0 Downloads: 0


Zuhi Subedar 1,* Ashwini Araballi 2

1. Gogte Institute of Technology, Belagavi, Karnataka, India

2. Visvesvaraya Technological University, Belagavi, Karnataka, India.

* Corresponding author.

DOI: https://doi.org/10.5815/ijmsc.2020.04.04

Received: 29 May 2020 / Revised: 25 Jun. 2020 / Accepted: 15 Jul. 2020 / Published: 8 Aug. 2020

Index Terms

Symmetric cryptography, Asymmetric cryptography, SHA-256, Hybrid Cryptography, security etc.


The amount of data that is transmitted across the internet is continuously increasing. With the transmission of this huge volume of data, the need of an encryption algorithm that guarantees the data transmission speedily and in a secure manner is a must. Hence, to achieve security in wireless networks, cryptography plays a very important role. In this paper, several hybrid combinations, which combines both symmetric and asymmetric cryptographic techniques to offer high security with minimum key maintenance is presented. This hybrid combination offers several cryptographic primitives such as integrity, confidentiality and authentication, thereby enhancing the security. Various combinations of Advanced Encryption Standard (AES), Elliptical Curve Cryptography (ECC) and Rivest, Shamir and Adleman (RSA) algorithms are used to provide hybrid encryption. Secure Hash Algorithm (SHA-256) is also used to provide authentication and integrity. The experimental results show that the proposed hybrid combinations gives better performance in terms of computation time compared to individual cryptographic schemes.

Cite This Paper

Zuhi Subedar, Ashwini Araballi. " Hybrid Cryptography: Performance Analysis of Various Cryptographic Combinations for Secure Communication ", International Journal of Mathematical Sciences and Computing (IJMSC), Vol.6, No.4, pp.35-41, 2020. DOI: 10.5815/ijMSC.2020.04.04


[1]Dr. Vivek Kapoor, Rahul Yadav,  A Hybrid Cryptography Technique to support Cyber Security Infrastructure, International Journal of Advanced Research in Computer Engineering and Technology,2015; Volume 4,Issue 11.

[2]Singh, G., Supriya, A study of encryption algorithms (RSA, DES, 3DES and AES) for information security, International  Journal on Computer Applications, 2013; Volume 67,Issue 19.

[3]Burr, W., Selecting the advanced encryption standard, IEEE, 2003.

[4]Frunza, M., Asachi, Gh., Improved RSA encryption algorithm for increased security of wireless networks, International Symposium, 2007.

[5]Kodali, R., Sarma, N., Energy efficient ECC encryption using ECD, Emerging Research in Electronics, Computer Science and Technology, Springer, 2013;  pp. 471–478.

[6]Susarla, S. and Borkar, G., Hybrid Encryption System. 

[7]Wang Wei-hong, Lin Yu-bing, Chen Tie-ming, The Study and Application of Elliptic Curve Cryptography Library on Wireless Sensor Network, IEEE, 2008.

[8]Zuhi, S., Satish, D, Hybrid Cryptography Approach for securing MANETs-A Survey, IJIRCCE,2018.

[9]Sharma, A., Bhuriya, D. and Singh, U.,Secure data transmission on MANET by hybrid cryptography technique. In Computer, Communication and Control (IC4), IEEE, 2015; International Conference on (pp. 1-6).  

[10]Rani, S. and Kaur, H., Implementation and comparison of hybrid encryption model for secure network using AES and Elgamal. International Journal, 2017;8(3).

[11]Jailin.S, Kayalvizhi.R, Vaidehi.V, Performance Analysis of Hybrid Cryptography for Secured Data Aggregation in Wireless Sensor Networks, IEEE, 2011.

[12]Harini, M., Gowri, K.P., Pavithra, C. and Selvarani, M.P., A novel security mechanism using hybrid cryptography algorithms. Electrical, Instrumentation and Communication Engineering (ICEICE), IEEE, 2017.

[13]Mykola Karpinskyy, Yaroslav Kinakh, Reliability of RSA Algorithm and its Computational Complexity, Computing, 2003;119-122.

[14]V Gampala, S Inuganti, S Muppidi, Data Security in Cloud Computing with Elliptic Curve Cryptography, International Journal of Soft Computing and Engineering (IJSCE),2012.

[15]Wiliam, S., Cryptography and Network Security, 2000.

[16]Rizk, R. and Alkady, Y., Two-phase hybrid cryptography algorithm for wireless sensor networks. Journal of Electrical Systems and Information Technology, 2015; 2(3), pp.296-313.