Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA

Cryptography is a method used for the protection of information and communication, whereby it ensures a form of security that allows only the sender and recipient to view its content. In Cryptography, there are two different types of encryptions - Symmetric Key Encryption and Asymmetric Key Encrypti...

Full description

Saved in:
Bibliographic Details
Main Author: Yue, Shiqi
Other Authors: Tay Kian Boon
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2022
Subjects:
Online Access:https://hdl.handle.net/10356/156527
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-156527
record_format dspace
spelling sg-ntu-dr.10356-1565272022-04-19T07:18:25Z Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA Yue, Shiqi Tay Kian Boon School of Computer Science and Engineering kianboon.tay@ntu.edu.sg Engineering::Computer science and engineering Cryptography is a method used for the protection of information and communication, whereby it ensures a form of security that allows only the sender and recipient to view its content. In Cryptography, there are two different types of encryptions - Symmetric Key Encryption and Asymmetric Key Encryption. Though each of the encryption categories, it has its advantages of encrypting and decrypting sensitive information, it also has its disadvantages. Therefore, Hybrid Encryption is a cryptosystem that incorporates both symmetric and asymmetric encryption, which benefits from the strength of each encryption category. Despite having such a strong encryption algorithm that ensures robustness and integrity, nothing ensures a hundred percent security. Ironically, for us to understand how to implement strong hybrid cryptography, or to purchase it off the shelves of hybrid cryptography products, we need to understand how hybrid cryptography systems are commonly implemented weakly. In the project, we shall focus on the research, development, and implementation of RSA-AES Weak Hybrid Cryptography. The project aims to raise the awareness of the potential exploitation of systems that use Hybrid Cryptography, by providing information with regards to the detection of such exploitation and its recommendations to prevent users or consumers from being exploited. This report includes the introduction of the project, discussion of hybrid cryptography, the implementation of it, and discussion of common weak hybrid cryptography implementation. Under the Common Weak Hybrid Cryptography Implementation section, a set of common weak implementations developed by malicious or ignorant developers will be discussed. Following that, steps for detection and recommendations will be provided to help customers or consumers from being exploited by attackers. Bachelor of Engineering (Computer Science) 2022-04-19T07:18:25Z 2022-04-19T07:18:25Z 2022 Final Year Project (FYP) Yue, S. (2022). Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/156527 https://hdl.handle.net/10356/156527 en SCSE21-0455 application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering
spellingShingle Engineering::Computer science and engineering
Yue, Shiqi
Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA
description Cryptography is a method used for the protection of information and communication, whereby it ensures a form of security that allows only the sender and recipient to view its content. In Cryptography, there are two different types of encryptions - Symmetric Key Encryption and Asymmetric Key Encryption. Though each of the encryption categories, it has its advantages of encrypting and decrypting sensitive information, it also has its disadvantages. Therefore, Hybrid Encryption is a cryptosystem that incorporates both symmetric and asymmetric encryption, which benefits from the strength of each encryption category. Despite having such a strong encryption algorithm that ensures robustness and integrity, nothing ensures a hundred percent security. Ironically, for us to understand how to implement strong hybrid cryptography, or to purchase it off the shelves of hybrid cryptography products, we need to understand how hybrid cryptography systems are commonly implemented weakly. In the project, we shall focus on the research, development, and implementation of RSA-AES Weak Hybrid Cryptography. The project aims to raise the awareness of the potential exploitation of systems that use Hybrid Cryptography, by providing information with regards to the detection of such exploitation and its recommendations to prevent users or consumers from being exploited. This report includes the introduction of the project, discussion of hybrid cryptography, the implementation of it, and discussion of common weak hybrid cryptography implementation. Under the Common Weak Hybrid Cryptography Implementation section, a set of common weak implementations developed by malicious or ignorant developers will be discussed. Following that, steps for detection and recommendations will be provided to help customers or consumers from being exploited by attackers.
author2 Tay Kian Boon
author_facet Tay Kian Boon
Yue, Shiqi
format Final Year Project
author Yue, Shiqi
author_sort Yue, Shiqi
title Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA
title_short Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA
title_full Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA
title_fullStr Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA
title_full_unstemmed Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA
title_sort vulnerabilities found in an implementation of hybrid cryptography – aes and rsa
publisher Nanyang Technological University
publishDate 2022
url https://hdl.handle.net/10356/156527
_version_ 1731235767680761856