Journal of Information Security

Volume 9, Issue 2 (April 2018)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Novel Hybrid Encryption Algorithm Based on Aes, RSA, and Twofish for Bluetooth Encryption

HTML  XML Download Download as PDF (Size: 845KB)  PP. 168-176  
DOI: 10.4236/jis.2018.92012    1,960 Downloads   6,409 Views  Citations

ABSTRACT

In this paper, we proposed a novel triple algorithm based on RSA (Rivest-Shamir-Adleman), AES (Advanced Encryption Standard), and TwoFish in order to further improve the security of Bluetooth that is currently using only 128-bit AES for encryption in its latest versions (Bluetooth 4.0 - 5.0). Further-more, older Bluetooth 1.0A – 3.0 + HS (High-Speed) devices use E0 stream cipher for encryption that has been shown to be weak by numerous researchers and thus it could be considered insufficient for high security purposes nowadays. In our novel approach, the triple protection of AES, RSA, and TWOFISH would enhance the level of security, which shields the data transmission in the Bluetooth. As the first step of our novel approach, we first encrypted the message by using AES with 128-bit key and then further encrypted it by using Twofish with the same 128-bit key. Finally, the 128-bit key generated in the beginning will be encrypted by using RSA with 1024-bit key to protect its over-the-air transfer. In the receiving end, the decryption process goes in reverse order compared with encryption process. We showed with experimental figures that our novel algorithm improved the security of Bluetooth encryption by eliminating all known weaknesses and thus made data exchange between Bluetooth devices secure.

Share and Cite:

Albahar, M. , Olawumi, O. , Haataja, K. and Toivanen, P. (2018) Novel Hybrid Encryption Algorithm Based on Aes, RSA, and Twofish for Bluetooth Encryption. Journal of Information Security, 9, 168-176. doi: 10.4236/jis.2018.92012.

Cited by

[1] An innovative method for enhancing advanced encryption standard algorithm based on magic square of order 6
Bulletin of Electrical Engineering and …, 2023
[2] Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
Baghdad Science …, 2023
[3] Optimization of AES-128 Encryption Algorithm for Security Layer in ZigBee Networking of Internet of Things
Computational Intelligence and …, 2022
[4] PDF Steganography Using Hybrid Crypto Encryption Technique
IoT Based Control Networks and Intelligent …, 2022
[5] A novel integrated IoT framework with classification approach for medical data analysis
2022 9th International …, 2022
[6] ECG Encryption Enhancement Technique with Multiple Layers of AES and DNA Computing.
Madhloom, MKA Ghani… - Intelligent Automation & …, 2021
[7] Node-Node Data Exchange in IoT Devices Using Twofish and DHE
Aphetsi, L Nana - Advances in Science …, 2021
[8] New method for improving add round key in the advanced encryption standard algorithm
2021
[9] End-to-end encrypted communication security technology for mobile terminals
2021
[10] Performance Analysis of Cascaded Hybrid Symmetric Encryption Models
2021
[11] A comprehensive performance empirical study of the symmetric algorithms: AES, 3DES, Blowfish and Twofish
2021
[12] Network Security Threat Situation Recognition Based on Attack and Defense Game Model
Journal of Physics: Conference Series, 2021
[13] Application of AES and DES Algorithms in File Management
Journal of Physics: Conference Series, 2021
[14] Design and evolution of image encryption algorithm based on DNA computing and S-box of AES
2021
[15] Research on Improvement of Network Information Security Technology Based on Hybrid Encryption Algorithm
한국산학기술학회 논문지, 2021
[16] Design and Validation of CAN Protocol with Double Encryption for Electric Vehicle Applications
2021 International Conference …, 2021
[17] Enhancement to the patient's health care image encryption system, using several layers of DNA computing and AES (MLAESDNA)
… of Engineering and …, 2021
[18] Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure
2020
[19] Design and Implementation of Hybrid Cryptographic Algorithm for the Improved Security
2020
[20] Security Enhancement of IoT Based Smart Home Using Hybrid Technique
2020
[21] An Analysis of Various IoT Security Techniques: A Review
2020
[22] Implementing Location-Based Cryptography on Mobile Application Design to Secure Data in Cloud Storage
2020
[23] Comparing Symmetric and Asymmetric cryptography in message encryption and decryption by using AES and RSA algorithms
2020
[24] Defensive Strategies for the Internet of Things Sensors Using Bluetooth Low Energy
2020
[25] Secure Data Encryption Through Combination of RSA Cryptography Random Key Algorithm and Quadratic Congruential Generator
2019
[26] A Cascaded Toolkit for Secure Data Transmission
2019
[27] Implementation of an Improved Multi-Channel Security in Cloud Computing Using Image Steganography and RSA Algorithm
IOSR Journal of Computer Engineering, 2018
[28] Komparatif Performance Model Keamanan Menggunakan Metode Algoritma AES 256 bit dan RSA
2018
[29] Design and development of a novel symmetric algorithm for enhancing information security

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.