Hy-Com Cryptographic Technique for Efficient Data Transmission

International Journal of Computer & Organization Trends  (IJCOT)          
© 2015 by IJCOT Journal
Volume - 5 Issue - 4
Year of Publication : 2015
Authors :  Sindhuja S.
DOI : 10.14445/22492593/IJCOT-V22P302


Sindhuja S."Hy-Com Cryptographic Technique for Efficient Data Transmission", International Journal of Computer & organization Trends (IJCOT), V5(4):9-13 Jul -Aug 2015, ISSN:2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract Hy-Com Cryptographic technique is an acronym for Hybrid Compressive Cryptographic technique. This research uses two main cryptographic techniques like Symmetric key cryptography and Asymmetric key cryptography and with a lossless compression algorithm. The Symmetric Key cryptographic technique uses single key for both encryption and decryption. The Asymmetric key cryptographic technique uses two separate keys for encryption and decryption. Advanced Encryption Standards (AES) algorithm is used for imparting Symmetric key cryptographic technique and Rivest-Shamir-Adleman(RSA) algorithm is used for imparting Asymmetric key cryptographic technique. The compression algorithm is used to compress the encrypted text before sending it. This reduces the size of the encrypted file and abets in fast file transmission. Therefore by compression of the encrypted file increases the efficiency of data transmission. Compression technique is of two types, lossy compression and lossless compression. This research deals with the lossless compression. The plain text is first encrypted using Symmetric technique. The symmetric key which is used to encrypt the data is encrypted using Asymmetric technique. The encrypted key and the encrypted text are compressed and sent to the receiver. The integrity of the data that is transmitted can be checked by subjecting the plaintext to the MD5 Hash algorithm. The Message Digest obtained by this process is also encrypted using Asymmetric technique. The public key of the RSA technique is also encrypted before transmitting to the other end. This makes the Hy-Com technique more robust. The key is encrypted using the rail fence technique, in which the plaintext is written down as a sequence of diagonals and then read off as a sequence of rows. This increases the security in the key distribution. Therefore the sender sends the compressed modes of cipher text of the message, cipher text of the key and cipher text of the message digest. The receiver uncompresses the file first and decrypts it. The original file is checked with the digest. If both are equal the message is accepted else rejected.


[1] Willaim Stallings, ?Cryptography and network Security Principles and Practices, Prentice Hall, 2005.
[2] J. Daemen and V. Rijmen, ?AES Proposal: Rijndael, AES Algorithm Submission, September 3, 1999.
[3] Menezes, P. van Oorschot, and S. Vanstone, ?Handbook of Applied Cryptography, CRC Press, New York, 1997.
[4] D. Boneh and G. Durfee, ?Cryptanalysis of RSA with private key d less than N , IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1339–1349, Jul. 2000.
[5] B. den Boer and A. Bosselaers, ?Collisions for the compression function of MD5, Advances in Cryptology, Eurocrypt „07, pages 293-304, Springer- Verlag, 2007.
[6] J. Ziv and A. Lempel, "Compression of Individual Sequences via Variable-Rate Coding", IEEE Transactions on Information Theory, Sept. 1978.
[7] National institute of standards and technology, ?Digital signature standard, FIPS Publication, February 2000.
[8] R. Rivest, A. Shamir, and L. Adleman, ?A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 1978.
[9] T. El Gamal, ?A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms, IEEE Transactions on Information Theory.
[10] Sayood K., ?Introduction to Data Compression, Academic Press, San Diego, 1996.
[11] Ravindra Kumar Chahar, ?Design of a new Security Protocol, IEEE International Conference on Computational Intelligence and Multimedia Applications, pp 132 – 134, 2007.
[12] Kamana Singh, Ankur Goyal, ?Implementation of Modified CRT Algorithm for Packet Routing Evaluation to Improved Energy Saving and Reliability in Wireless Sensor Networks, IJCOT, Volume 12, pp 35, Sept. 2014.

Hycom, Hybrid compressive technique, Secured data transmission, AES, RSA, LZW, MD5, Rail Fence Technique.