Abstract
Achieving better security for the transmission of data over cellular networks has always being a hard nut to crack. Security of long-term evolution (LTE) network is prime concern because of existence of malicious attackers. The security of network can be enhanced by utilizing cryptography. However, each cryptographic algorithm has its own pros and cons. So, hybridization (merging two or more algorithms) is one of the solutions to achieve better security. In this paper, double layer protection is implemented in order to ruggedize the security mechanism of LTE networks. The proposed algorithm utilizes better speed of AES and robust security of Rivest–Shamir–Adleman (RSA) together to achieve a hybrid system with improved performance compared to the traditional algorithm. The cryptanalysis has been intricated by increasing the number of keys to six. Further, the time required for encryption of keys is less when compared to decryption making the network more rugged and secure. In order to further enhance the speed, the concept of parallel processing is utilized. Then, proposed framework is analysed based on various parameters, and it is experimentally concluded that it provides approximately 22.7% increment in acceleration when compared to encryption rate and about 22.3% increment in acceleration when compared to decryption rate. 10% enhancement in percentage of avalanche effect has been achieved thereby increasing confusion in ciphertext and reducing chances of decoding. 5.39% increment in PSNR values of the proposed algorithm has been achieved when compared to existing algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Viswanath G, Krishna PV (2020) Hybrid encryption framework for securing big data storage in multi-cloud environment. Evol Intel. https://doi.org/10.1007/s12065-020-00404-w
Mohanty SN, Ramya KC, Rani SS, Gupta D, Shankar K, Lakshmanaprabu SK, Khanna A (2020) An efficient lightweight integrated blockchain (ELIB) model for IoT security and privacy. Future Gener Comput Syst 12:1027–1037. https://doi.org/10.1016/j.future.2019.09.050
Shankar K, Lakshmanaprabu SK, Gupta D, Khanna A, de Albuquerque VHC (2018) Adaptive optimal multi key based encryption for digital image security. Wiley Online Library. https://doi.org/10.1002/cpe.5122
Tarigan SY, Ginting DS, Gaol ML, Sitompul KL (2017) The combination of RSA and block chiper algorithms to maintain message authentication. In: International conference on information and communication technology (IconICT). https://doi.org/10.1088/1742-6596/930/1/012009
Bhargavi I, Veeraiah D, Maruthi Padmaja T (2017) Securing BIG data: a comparative study across RSA, AES, DES, EC and ECDH. In: Satapathy S, Bhateja V, Raju K, Janakiramaiah B. (eds) Computer communication, networking and internet security, Lecture notes in networks and systems, vol 5. Springer, Singapore. Online ISBN 978-981-10-3226-4, https://doi.org/10.1007/978-981-10-3226-4_36
Suri S, Vijay R (2017) An AES–chaos-based hybrid approach to encrypt multiple images. In: Patnaik S, Popentiu-Vladicescu F (eds) Recent developments in intelligent computing, communication and devices, Advances in intelligent systems and computing, vol 555. Springer, Singapore. Online ISBN 978-981-10-3779-5, https://doi.org/10.1007/978-981-10-3779-5_6
Kumar B, Hussain M, Kumar V (2018) BRRC: a hybrid approach using block cipher and stream cipher. In: Saeed K, Chaki N, Pati B, Bakshi S, Mohapatra D (eds) Progress in advanced computing and intelligent engineering, Advances in intelligent systems and computing, vol 563. Springer, Singapore. Online ISBN 978-981-10-6872-0, https://doi.org/10.1007/978-981-10-6872-0_21
Dash S, Das M, Das M (2018) Implementation of chaotic-based hybrid method to provide double layer protection. In: Pattnaik P, Rautaray S, Das H, Nayak J (eds) Progress in computing, analytics and networking, Advances in intelligent systems and computing, vol 710. Springer, Singapore. Online ISBN 978-981-10-7871-2, https://doi.org/10.1007/978-981-10-7871-2_34
Ghosh Ramkrishna (2016) An efficient and robust modified RSA based security algorithm in modern cryptography. J Comput Sci Eng Inform Technol Res (JCSEITR) 6(2):15–22
Padmaja ChJL, Bhagavan VS, Srinivas B (2016) RSA encryption using three Mersenne primes. Int J Chem Sci 14(4):2273-2278. ISSN 0972-768X
Chourasia S, Singh KN (2016) An efficient hybrid encryption technique based on DES and RSA for textual data. In: Satapathy S, Mandal J, Udgata S, Bhateja V (eds) Information systems design and intelligent applications, Advances in intelligent systems and computing, vol 433. Springer, New Delhi. Online ISBN 978-81-322-2755-7, https://doi.org/10.1007/978-81-322-2755-7_9
Dutta SC, Singh S, Singh DK (2016) Enhancement of mobile ad hoc network security using improved RSA algorithm. In: Pant M, Deep K, Bansal J, Nagar A, Das K (eds) Proceedings of fifth international conference on soft computing for problem solving, Advances in intelligent systems and computing, vol 436. Springer, Singapore, pp 1027-1036. Online ISBN 978-981-10-0448-3, https://doi.org/10.1007/978-981-10-0448-3_86
Talukdar D, Saikia LP (2017) Simulation and analysis of modified RSA cryptographic algorithm using five prime numbers. Int J Recent Innov Trends Comput Commun 5(6):224–228
Sahu J, Singh V, Sahu V, Chopra A (2017) An enhanced version of RSA to increase the security. J Netw Commun Emerg Technol (JNCET) 7(4):1-4
Liu J, Fan C, Tian X, Ding Q (2018) Optimization of AES and RSA algorithm and its mixed encryption system. Adv Intell Inform Hiding Multimedia Sig Process Smart Innov Syst Technol 82:393-403. https://doi.org/10.1007/978-3-319-63859-1-48
ÜnalÇavu S, Kaçar S, Zengin A, Pehlivan I (2018) A novel hybrid encryption algorithm based on chaos and S-AES algorithm. Nonlinear Dyn 92(4):1745-1759. ISSN 1573-269X, https://doi.org/10.1007/s11071-018-4159-4
Ghosh P, Thakor V (2018) Optimization of hybrid encryption algorithm for secure communication system. In: Third international congress on information and communication technology, pp 973-981. Online ISBN 978-981-13-1165-9, https://doi.org/10.1007/978-981-13-1165-9_89
Dixit P, Gupta AK, Trivedi MC, Yadav VK (2018) Traditional and hybrid encryption techniques: a survey. In: Networking communication and data knowledge engineering, pp 239-248. Online ISBN 978-981-10-4600-1, https://doi.org/10.1007/978-981-10-4600-1_22
Farooq S, Prashar D, Jyoti K (2018) Hybrid encryption algorithm in wireless body area networks (WBAN). In: Singh R, Choudhury S, Gehlot A (eds) Intelligent communication, control and devices, Advances in intelligent systems and computing, vol 624. Springer, Singapore. Online ISBN 978-981-10-5903-2, https://doi.org/10.1007/978-981-10-5903-2_41
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ahlawat, A., Nandal, V. (2021). Ruggedizing LTE Security Using Hybridization of AES and RSA to Provide Double Layer Security. In: Khanna, A., Gupta, D., Pólkowski, Z., Bhattacharyya, S., Castillo, O. (eds) Data Analytics and Management. Lecture Notes on Data Engineering and Communications Technologies, vol 54. Springer, Singapore. https://doi.org/10.1007/978-981-15-8335-3_12
Download citation
DOI: https://doi.org/10.1007/978-981-15-8335-3_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-8334-6
Online ISBN: 978-981-15-8335-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)