Complex Hybrid System - Assignment
Complex Hybrid System
Cryptography is the method of ensuring protection to data and information by means of converting plain text into unintelligible ciphertext. Various methods of cryptography are used by organization and enterprises to ensure the protection of their data and information. There are simple, complex and hybrid modes of encryption basically used for the purpose and many times more than one mode of encryption are synchronized and combined with another mode for better security of IT Resources which is termed to be the complex hybrid mode of encryption.
Data and information are the most valued asset for an organization which not only assures better functional efficiency of the organization but also helps them to know the market and their performance in a better way. Data and information should be protected with an end-to-end encryption method for assurance of the fact that it cannot be accessed by anyone else other than the sender and the receiver, especially when the involvement of any third party arises in the transmission function (Palker, T. D., 2012). This statement focuses upon the importance of encryption in the security of data and information for organizations and enterprises which completely relies upon their data banks for the functionality of their business activities. It also lays emphasis upon the points that data security holds importance in all modes of data and information transfer be it shared over the internal network of an organization or to some external network using the Internet by means of email or other systems of correspondence.
Purpose and Function of Complex Hybrid Encryption
With the advancement of Information technology, developments in the field of cryptography are also noteworthy. Hybrid encryption is the output of such advanced idea and methodology. It is that mode of encryption in which two or more systems of encryption are combined together which may be symmetric or asymmetric in nature with the purpose of utilizing the beneficial characteristics of both the modes of encryption. Hybrid encryption mode is one of the most secure and preferred modes of encryption which keeps both the public and private keys safe and secure.
The main purpose of the complex hybrid encryption mode of cryptography is to get the maximum security and speed by the synchronized effect of convenient asymmetric encryption pattern to the effective symmetric scheme of encryption.
Complex Hybrid encryption mode is obtained by using unique and identifiable session keys coordinated with symmetrical encryption scheme through data transfer which helps in public key encryption. The public key is used by the recipient to decrypt the symmetric key. After recovering the symmetric key, the message consisting of the data and information is decrypted. The blending of the two modes of encryption is useful as it enables communication between the users. Asymmetric encryption scheme ensures better security parameters but is having the tendency to slow down the process. This demerit is shadowed by the symmetric form of encryption which is fast in nature and hence, an enhanced security feature to fast transmittal scheme and an added speed feature for a secured encryption mode is achieved by this synchronized and blended form of the complex hybrid encryption process.
Dual benefit of Complex Hybrid System
The cryptosystem adopted by any organization must have the feature of fast transmittal and secured protocol as both of these are necessary for the relevance of the purpose the system of cryptography is meant for and should be used by any organization or enterprise whose activities are directly linked with acquiring and transmission or sharing of data and information over the network (Dellman, H., Swenegar, P., G., 2013).
The complex hybrid model of cryptography can also be defined as a combination of a public key scheme with the efficiency of a symmetric key scheme of cryptography. The public key scheme of cryptography is useful as there lies no requirement of sharing anything common or highly secure content between two end-to-end users by any means of communication. But the demerit lies in their dependency over complicated mathematical algorithms and computations which makes them relatively less efficient than symmetric schemes of cryptography. Hence, to overcome this limiting feature, the complex hybrid mode of encryption is used.
A complex hybrid scheme of cryptography is formulated using two categories of encryption modes of which one is a public key encapsulation scheme and the other is a data or symmetric key encapsulation scheme. This mode is a public key system in nature with similar public and private keys in the key encapsulation format in which, the bulk decryption is done by the fast and efficient symmetric scheme, whereas the short and simple decryption is done by the public key.
Demonstration of Complex Hybrid System
To demonstrate the encryption and decryption process of the complex hybrid system of cryptography, let's assume the encrypted transmittal or exchange of secure data and information between Bob and Alice over email.
For the purpose of encryption of the message, Bob requests for and obtains the public key from Alice. Then using the data encapsulation scheme, Bob generates a fresh symmetric key, using which he encrypts the message. This completes the data encapsulation segment of encryption. Now he uses the public key of Alice to encrypt the symmetric key generated in the data encapsulation stage. This completes the key encapsulation phase. Now Bob transfers the encrypted message to Alice. The simple plaintext message of Bob is now encrypted and is in the form of ciphertext.
To decrypt the message from its ciphertext form to plaintext Alice uses her private key. It is used for decryption of the symmetric key of the key encapsulation module of the encrypted message. Once the symmetric key is decrypted, it is used by Alice to decrypt the message sent by Bob from its ciphertext format to the readable plaintext form.
It is the ciphertext which gets vulnerable to threats and attacks. Both the encapsulation schemes, that is, the key encapsulation and the data encapsulation must be secure enough to prevent ciphertext attacks. If both the encapsulation schemes are secure then the entire complex hybrid system also attains the same safe and secure feature. Stress is given over higher levels of security for the data encapsulation segment as even if the key encapsulation is not having a high level of security, yet, the ciphertext stays protected.
Cramer, Ronald; Shoup, Victor (2004). "Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack" (PDF). SIAM Journal on Computing. 33 (1): 167–226. doi:10.1137/S0097539702403773.
Hofheinz, Dennis; Kiltz, Eike (2007). "Secure Hybrid Encryption from Weakened Key Encapsulation" (PDF). Advances in Cryptology -- CRYPTO 2007. Springer. pp. 553–571.