Treffer: A Hybrid Encryption Method for Data Security Based on ARB3 Algorithm.
Weitere Informationen
In a world where cloud storing and online correspondence will increase in a faster pace, it will be very important that the cryptographic safeguarding will be such that will be solid and powerful. Even where traditional hybrid techniques of encryption have been found to be effective, it will not be spared of the problem of throughput bottleneck, performance pitfalls, and security vulnerabilities. To ensure synergy we will solve these problems using ARB3, a new algorithm to implement a hybrid cryptography approach to merge the strengths of Rivest-Shamir-Adleman, BLAKE3 hashing, and Advanced Encryption Standard into a new algorithm ARB3. The ARB3 Algorithm will take advantage of the high-performance and symmetric encoding of the AES, the key exchange process of RSA, and, high performance hashing of BLAKE 3 to develop an inclusive security protocol. Using testing, we shall have the advantage of showing that ARB3 will be better in terms of processing speed and provide an innocuous mix of security characteristics and that it will surpass traditional hybrid models in encryption and decryption. The overall increase in throughput in the ARB3 will ensure that it accepts large quantities of data without necessarily compromising their security or their speeds. As the proposed solutions will not only show the effectiveness of the ARB3 in eradicating the security threats, they will also contribute remarkably to the enhancement of the performance metrics that will become imperative in future data security. Since the restrictions of the existing hybrid cryptographic systems will be reconsidered, ARB3 is going to provide a more promising and effective way of converting and processing data in the framework of many applications. This will be the greatest advance in the cryptography field. The paper will also point out the topicality of the new hybrid mechanism of encryption that will be adapted to the shifting needs of the data security. [ABSTRACT FROM AUTHOR]
Copyright of International Journal of Safety & Security Engineering is the property of International Information & Engineering Technology Association (IIETA) and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)