Improving the Security of Internetof Things using Encryption Algorithms: Hybrid Encryption Algorithm (HAN)Internetof Things (IOT) involves communication between devices. Any leak of importantinformation can thus be very harmful.

To prevent this a hybrid encryptionalgorithm (HAN) has been proposed. At first a public key has to be generatedwhich will be known by both the sender and the receiver. The key is createdusing the AES algorithm. The receiver has a private key which is not known bythe sender. For encrypting the message HAN uses NTRU asymmetric encryptionwhich encrypts the message given by the sender using the key generated usingthe AES algorithm.

The receiver now has to decrypt the message. For this, inHAN algorithm NTRU algorithm is partially used. The encryption and decryptionhappens as follows:Encryption= (message multinomial, pr) *(public key, h) + message                                                   Decryption = (private key, f) *Encryption                                                                                                  The algorithm also uses digitalsignature which is used security as well as for increasing the speed forvalidating the received message when compared to other algorithms.                                                        Onconcluding the above algorithm, HAN can be considered as a combination of boththe AES encryption algorithm and the NTRU technique of asymmetric decoding. Oncomparison to other algorithms, HAN algorithm has greater speed when consideredthe parameter of key generation as well as for encryption and decryption.           Using Symmetric andAsymmetric Cryptography to Secure Communication Between Devices in IOTThisalgorithm uses both symmetric as well as the asymmetric algorithms to performencryption for data transfer between devices in the internet of things. Theasymmetric cryptography technique uses both the type of keys i.

e. public andprivate. The public key is available to both the sender and the receiverwhereas the private key is available to only the receiver who with the help ofthe obtained key unfolds the messages. In this algorithm, an advancement ofVigenere Cipher technique has been proposed for symmetric cryptographicalgorithm and RSA technique is used for asymmetric cryptographic algorithm. thefollowing steps are followed in the algorithm:Sender’s side:1.

The instant timestamp has to be marked                                                                                                                    2. A random key (K)is only then created with the help of the timestamp3. Get the data (P)from the sender 4.

The sender’s data and the randomkey is collected and using the modified Vigenere Cipher algorithm, it isconverted to cipher text (C)5. Now, the public key (Pk)is collected from the receiver 6. The arbitrary key is currentlyscrambled utilizing the RSA technique to acquire the encrypted key E7. Now the encoded text isgenerated using the encrypted key E as well as the cipher text C and the datais transmitted Receiver’s side:1. Message is received from thesender2. Message is broken into encryptedkey (E) and cipher text (C)3.

The private key is using todecrypt the key (E) using the RSA algorithm to obtain the random key4. Once the random key is obtained,the advanced Vigenere Cipher technique will be used to achieve the sender’sdata.


I'm Erica!

Would you like to get a custom essay? How about receiving a customized one?

Check it out