login
Home / Papers / Enhanced Hybrid Algorithm with DSA and RSA Encryption Algorithm

Enhanced Hybrid Algorithm with DSA and RSA Encryption Algorithm

1 Citationsโ€ข2012โ€ข
S. Parveen, P. Gandhi
journal unavailable

In this research, a combination of both DSA and RSA is proposed as a hybrid link for both protocols as digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory.

Abstract

Abstract - An encryption method is presented in RSA that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: 1. Couriers or other secure means are not needed to transmit keys, since a message can be enciphered using an encryption key publicly revealed by the intended recipient. Only he can decipher the message, since only he knows the corresponding decryption key. 2. A message can be signed using a privately held decryption key. Anyone can verify this signature using the corresponding publicly revealed encryption key. Signatures cannot be forged, and a signer cannot later deny the validity of his signature. This has obvious applications in electronic mail and electronic funds transfer systems. But itโ€™s also a pain to get keys to the recipient. If sender mails them, they might be stolen. If you send them cryptographically, and someone has broken your code, that person will also have the next key. If you have to go to Europe regularly to hand-deliver the next key, that is also expensive. If you hire some courier to deliver the new key, you have to trust the courier. One solution is provided by digital signature as digital signatures are used to detect unauthorized modifications to data and to authenticate the identity of the signatory. Both security algorithms have their flaws and benefits and they both prove to handle in long term with some compromise. In our research we are proposing a combination of both DSA and RSA as a hybrid link for both protocols. We will also considered case study for sensor networks so that we can suggest the applications of proposed algorithm.