Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA
Cryptography is a method used for the protection of information and communication, whereby it ensures a form of security that allows only the sender and recipient to view its content. In Cryptography, there are two different types of encryptions - Symmetric Key Encryption and Asymmetric Key Encrypti...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/156527 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-156527 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1565272022-04-19T07:18:25Z Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA Yue, Shiqi Tay Kian Boon School of Computer Science and Engineering kianboon.tay@ntu.edu.sg Engineering::Computer science and engineering Cryptography is a method used for the protection of information and communication, whereby it ensures a form of security that allows only the sender and recipient to view its content. In Cryptography, there are two different types of encryptions - Symmetric Key Encryption and Asymmetric Key Encryption. Though each of the encryption categories, it has its advantages of encrypting and decrypting sensitive information, it also has its disadvantages. Therefore, Hybrid Encryption is a cryptosystem that incorporates both symmetric and asymmetric encryption, which benefits from the strength of each encryption category. Despite having such a strong encryption algorithm that ensures robustness and integrity, nothing ensures a hundred percent security. Ironically, for us to understand how to implement strong hybrid cryptography, or to purchase it off the shelves of hybrid cryptography products, we need to understand how hybrid cryptography systems are commonly implemented weakly. In the project, we shall focus on the research, development, and implementation of RSA-AES Weak Hybrid Cryptography. The project aims to raise the awareness of the potential exploitation of systems that use Hybrid Cryptography, by providing information with regards to the detection of such exploitation and its recommendations to prevent users or consumers from being exploited. This report includes the introduction of the project, discussion of hybrid cryptography, the implementation of it, and discussion of common weak hybrid cryptography implementation. Under the Common Weak Hybrid Cryptography Implementation section, a set of common weak implementations developed by malicious or ignorant developers will be discussed. Following that, steps for detection and recommendations will be provided to help customers or consumers from being exploited by attackers. Bachelor of Engineering (Computer Science) 2022-04-19T07:18:25Z 2022-04-19T07:18:25Z 2022 Final Year Project (FYP) Yue, S. (2022). Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/156527 https://hdl.handle.net/10356/156527 en SCSE21-0455 application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Computer science and engineering |
spellingShingle |
Engineering::Computer science and engineering Yue, Shiqi Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA |
description |
Cryptography is a method used for the protection of information and communication, whereby it ensures a form of security that allows only the sender and recipient to view its content. In Cryptography, there are two different types of encryptions - Symmetric Key Encryption and Asymmetric Key Encryption. Though each of the encryption categories, it has its advantages of encrypting and decrypting sensitive information, it also has its disadvantages. Therefore, Hybrid Encryption is a cryptosystem that incorporates both symmetric and asymmetric encryption, which benefits from the strength of each encryption category. Despite having such a strong encryption algorithm that ensures robustness and integrity, nothing ensures a hundred percent security.
Ironically, for us to understand how to implement strong hybrid cryptography, or to purchase it off the shelves of hybrid cryptography products, we need to understand how hybrid cryptography systems are commonly implemented weakly. In the project, we shall focus on the research, development, and implementation of RSA-AES Weak Hybrid Cryptography. The project aims to raise the awareness of the potential exploitation of systems that use Hybrid Cryptography, by providing information with regards to the detection of such exploitation and its recommendations to prevent users or consumers from being exploited.
This report includes the introduction of the project, discussion of hybrid cryptography, the implementation of it, and discussion of common weak hybrid cryptography implementation.
Under the Common Weak Hybrid Cryptography Implementation section, a set of common weak implementations developed by malicious or ignorant developers will be discussed. Following that, steps for detection and recommendations will be provided to help customers or consumers from being exploited by attackers. |
author2 |
Tay Kian Boon |
author_facet |
Tay Kian Boon Yue, Shiqi |
format |
Final Year Project |
author |
Yue, Shiqi |
author_sort |
Yue, Shiqi |
title |
Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA |
title_short |
Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA |
title_full |
Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA |
title_fullStr |
Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA |
title_full_unstemmed |
Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA |
title_sort |
vulnerabilities found in an implementation of hybrid cryptography – aes and rsa |
publisher |
Nanyang Technological University |
publishDate |
2022 |
url |
https://hdl.handle.net/10356/156527 |
_version_ |
1731235767680761856 |