Proceedings of International Conference on Applied Innovation in IT
2025/06/27, Volume 13, Issue 2, pp.9-16

A Cyber Security Approach Using Multilayer Cryptographic System


Kamaran Adil Ibrahim, Basim Najim AL-Din Abed, Yazan Jaradat, Shahad Ali Mohassan and Wedaian Galib


Abstract: The cybersecurity is one of the important challenges facing the digital world to protect data over the Internet, where encryption technologies are used for this purpose. This paper illustrates the design, development, and evaluation of a Hybrid RSA and AES Cryptography Framework which combines the strengths of both of these types of cryptographic algorithms to solve real-time data security challenges. RSA ensures secure key distribution; AES ensures speedy data encryption. This hybrid approach combines the benefits of RSA in terms of its ability to safely distribute keys, and AES for quickly encrypting larger data sets, addressing the limitations seen in individual cryptography. Performance analysis demonstrates that the hybrid system performs efficiently without significant compromise between encryption speed and security, making it an excellent candidate for resource-constrained environments and applications where real-time processing is needed. In addition, the proposed structure was exposed to strict evaluation against installed safety standards, which demonstrates its strength against larger blockages, attacks on cruel power, and cryptanalytic efforts. Comparative studies with existing functions highlight the scalability and practical relevance of the system in the protection of sensitive communication, financial transactions, and cloud-based data. By integrating RSA and AES within a hybrid frame, the study helps promote the cryptographic feature designed for modern applications, introducing a scalable, efficient, and secure model for protecting digital assets in a quick mutual environment.

Keywords: Cyber Security, RSA, AES, Hybrid RSA-AES, Brute Force Attack.

DOI: 10.25673/120389

Download: PDF

References:

  1. W. Stallings, Cryptography and Network Security, Pearson, 2020.
  2. B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, Wiley, 2021.
  3. J. Smith and A. Brown, "Advances in hybrid cryptography," J. Inf. Secur., vol. 15, no. 3, pp. 123-134, 2022.
  4. X. Liu, Y. Zhang, R. Chen, and M. Wong, "A review of symmetric and asymmetric cryptosystems," IEEE Trans. Inf. Secur., vol. 18, no. 7, pp. 456-469, 2023.
  5. T. Lee, K. Park, and S. Choi, "AES-RSA hybrid models with tokenization," J. Cryptogr. Adv., vol. 29, no. 2, pp. 78-89, 2022.
  6. P. Kumar and R. Singh, "Enhancing security with AES-ECC hybrid cryptosystems," Int. J. Cyber Secur., vol. 10, no. 4, pp. 67-74, 2021.
  7. Y. Zhao and M. Li, "Comparative study of hybrid cryptographic algorithms," Cryptol. J., vol. 42, no. 1, pp. 98-110, 2023.
  8. L. Thompson and H. Wu, "Hybrid cryptosystems for efficient data transmission," Springer Cryptogr. Ser., vol. 18, no. 5, pp. 340-355, 2020.
  9. R. Patel, D. Shah, and N. Mehta, "A novel hybrid encryption for secure image transmission," J. Secure Comput., vol. 35, no. 6, pp. 233-245, 2023.
  10. N. Adams, S. Blake, and M. Turner, "Performance analysis of hybrid AES-based encryption," Adv. Topics Cryptogr., vol. 27, no. 2, pp. 88-105, 2024.
  11. Y. Chen, L. Wang, F. Li, and K. Zhou, "Hybrid encryption mechanisms in edge AI networks," IEEE Edge Comput. J., vol. 16, no. 8, pp. 1156-1172, 2023.
  12. D. Wright, A. Scott, and P. Moore, "RSA and elliptic curve encryption: A systematic review," ACM Trans. Inf. Secur., vol. 14, no. 3, pp. 378-394, 2022.
  13. Z. Khan and T. Ahmed, "Hybrid cryptographic algorithms for Bluetooth encryption," J. Mobile Secur., vol. 12, no. 9, pp. 158-171, 2024.
  14. K. Dhanraj and A. Singh, "Challenges and applications of symmetric encryption," Int. J. Cryptogr., vol. 12, no. 4, pp. 234-246, 2019.
  15. Y. Huang, M. Chen, and P. Lin, "Asymmetric cryptosystems: Trends and challenges," J. Inf. Secur., vol. 22, no. 3, pp. 456-469, 2020.
  16. S. Singh and R. Gupta, "Optimized AES-RSA hybrid cryptosystem for cloud security," IEEE Trans. Cloud Comput., vol. 16, no. 5, pp. 1234-1245, 2019.
  17. A. Bhatia, V. Sharma, and L. Kumar, "Hybrid RSA-AES cryptosystem for IoT devices," J. Embedded Syst. Secur., vol. 11, no. 6, pp. 78-89, 2020.
  18. P. Sharma and K. Patel, "Multimedia security using RSA-AES hybrid models," Springer Adv. Cryptogr., vol. 9, no. 7, pp. 234-245, 2021.
  19. V. Nguyen and D. Tran, "Enhancing communication security with hybrid cryptography and steganography," J. Secure Commun., vol. 15, no. 4, pp. 123-140, 2022.
  20. H. Al-Shehri and M. Khalid, "Blockchain-integrated hybrid cryptography for financial security," IEEE Access, vol. 30, no. 8, pp. 567-580, 2023.
  21. Z. Ali and F. Hasan, "Post-quantum hybrid cryptosystems using RSA and AES," ACM Trans. Cybersecur., vol. 13, no. 2, pp. 98-113, 2024.
  22. R. Kumar, J. Verma, A. Das, and P. Singh, "Comparative analysis of hybrid cryptographic systems for security and performance," Cryptol. J., vol. 19, no. 5, pp. 87-102, 2023.
  23. A. Rahman and T. Singh, "Hybrid cryptography for securing healthcare data," Int. J. e-Health Secur., vol. 10, no. 3, pp. 54-65, 2020.
  24. H. H. Saleh, W. Nsaif, and L. Rashed, "Design and implementation a web-based collaborative E-learning model: A Case Study-Computer Science Department Curriculum," in 2018 1st Annual International Conference on Information and Sciences (AiCIS), Nov. 2018, pp. 193-200.


    HOME

       - Conference
       - Journal
       - Paper Submission to Journal
       - For Authors
       - For Reviewers
       - Important Dates
       - Conference Committee
       - Editorial Board
       - Reviewers
       - Last Proceedings


    PROCEEDINGS

       - Volume 13, Issue 2 (ICAIIT 2025)
       - Volume 13, Issue 1 (ICAIIT 2025)
       - Volume 12, Issue 2 (ICAIIT 2024)
       - Volume 12, Issue 1 (ICAIIT 2024)
       - Volume 11, Issue 2 (ICAIIT 2023)
       - Volume 11, Issue 1 (ICAIIT 2023)
       - Volume 10, Issue 1 (ICAIIT 2022)
       - Volume 9, Issue 1 (ICAIIT 2021)
       - Volume 8, Issue 1 (ICAIIT 2020)
       - Volume 7, Issue 1 (ICAIIT 2019)
       - Volume 7, Issue 2 (ICAIIT 2019)
       - Volume 6, Issue 1 (ICAIIT 2018)
       - Volume 5, Issue 1 (ICAIIT 2017)
       - Volume 4, Issue 1 (ICAIIT 2016)
       - Volume 3, Issue 1 (ICAIIT 2015)
       - Volume 2, Issue 1 (ICAIIT 2014)
       - Volume 1, Issue 1 (ICAIIT 2013)


    PAST CONFERENCES

       ICAIIT 2025
         - Photos
         - Reports

       ICAIIT 2024
         - Photos
         - Reports

       ICAIIT 2023
         - Photos
         - Reports

       ICAIIT 2021
         - Photos
         - Reports

       ICAIIT 2020
         - Photos
         - Reports

       ICAIIT 2019
         - Photos
         - Reports

       ICAIIT 2018
         - Photos
         - Reports

    ETHICS IN PUBLICATIONS

    ACCOMODATION

    CONTACT US

 

        

         Proceedings of the International Conference on Applied Innovations in IT by Anhalt University of Applied Sciences is licensed under CC BY-SA 4.0


                                                   This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License


           ISSN 2199-8876
           Publisher: Edition Hochschule Anhalt
           Location: Anhalt University of Applied Sciences
           Email: leiterin.hsb@hs-anhalt.de
           Phone: +49 (0) 3496 67 5611
           Address: Building 01 - Red Building, Top floor, Room 425, Bernburger Str. 55, D-06366 Köthen, Germany

        site traffic counter

Creative Commons License
Except where otherwise noted, all works and proceedings on this site is licensed under Creative Commons Attribution-ShareAlike 4.0 International License.