Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/156527
Title: | Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA | Authors: | Yue, Shiqi | Keywords: | Engineering::Computer science and engineering | Issue Date: | 2022 | Publisher: | Nanyang Technological University | Source: | Yue, S. (2022). Vulnerabilities found in an implementation of Hybrid cryptography – AES and RSA. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/156527 | Project: | SCSE21-0455 | Abstract: | Cryptography is a method used for the protection of information and communication, whereby it ensures a form of security that allows only the sender and recipient to view its content. In Cryptography, there are two different types of encryptions - Symmetric Key Encryption and Asymmetric Key Encryption. Though each of the encryption categories, it has its advantages of encrypting and decrypting sensitive information, it also has its disadvantages. Therefore, Hybrid Encryption is a cryptosystem that incorporates both symmetric and asymmetric encryption, which benefits from the strength of each encryption category. Despite having such a strong encryption algorithm that ensures robustness and integrity, nothing ensures a hundred percent security. Ironically, for us to understand how to implement strong hybrid cryptography, or to purchase it off the shelves of hybrid cryptography products, we need to understand how hybrid cryptography systems are commonly implemented weakly. In the project, we shall focus on the research, development, and implementation of RSA-AES Weak Hybrid Cryptography. The project aims to raise the awareness of the potential exploitation of systems that use Hybrid Cryptography, by providing information with regards to the detection of such exploitation and its recommendations to prevent users or consumers from being exploited. This report includes the introduction of the project, discussion of hybrid cryptography, the implementation of it, and discussion of common weak hybrid cryptography implementation. Under the Common Weak Hybrid Cryptography Implementation section, a set of common weak implementations developed by malicious or ignorant developers will be discussed. Following that, steps for detection and recommendations will be provided to help customers or consumers from being exploited by attackers. | URI: | https://hdl.handle.net/10356/156527 | Fulltext Permission: | restricted | Fulltext Availability: | With Fulltext |
Appears in Collections: | SCSE Student Reports (FYP/IA/PA/PI) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Yue Shiqi_ FYP Report Final.pdf Restricted Access | 5.41 MB | Adobe PDF | View/Open |
Page view(s)
15
Updated on May 25, 2022
Download(s)
4
Updated on May 25, 2022
Google ScholarTM
Check
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.