image
image
user-login
Patent search/

Method and System for Securing Data Using AES and ECC with Split and Swap Encryption Technique

search

Patent Search in India

  • tick

    Extensive patent search conducted by a registered patent agent

  • tick

    Patent search done by experts in under 48hrs

₹999

₹399

Talk to expert

Method and System for Securing Data Using AES and ECC with Split and Swap Encryption Technique

ORDINARY APPLICATION

Published

date

Filed on 19 November 2024

Abstract

This invention presents a novel hybrid encryption framework combining Advanced Encryption Standard (AES) and Elliptic Curve Cryptography (ECC) to achieve robust data security. The proposed system introduces a unique approach based on the formula E = ECC.(AES)², where AES provides high-speed symmetric encryption and ECC ensures secure key exchange through asymmetric cryptography. The framework enhances security by splitting the data into two equal parts: one encrypted using AES and the other with ECC. A swapping mechanism further obfuscates the data structure, adding an extra layer of protection. This innovative combination of cryptographic techniques ensures resilience against modern cyber threats, including brute force and key compromise attacks, while maintaining computational efficiency. The system is scalable and suitable for applications requiring high levels of confidentiality, such as secure communication, cloud storage, financial transactions, and military-grade data protection. Experimental results demonstrate the invention's robustness, efficiency, and adaptability, making it a reliable solution for securing sensitive digital information in an increasingly interconnected world.

Patent Information

Application ID202441089521
Invention FieldCOMMUNICATION
Date of Application19/11/2024
Publication Number47/2024

Inventors

NameAddressCountryNationality
Donagani RamakrishnaResearch Scholar School of CS &AI, SR University, Warangal, Telangana-506371, IndiaIndiaIndia
Mohammed Ali ShaikAssociate Professor School of CS &AI, SR University, Warangal, Telangana-506371, IndiaIndiaIndia

Applicants

NameAddressCountryNationality
SR University, WarangalAnanthasagar, Hasanparthy (PO), Warangal-506371IndiaIndia

Specification

Description:This invention presents a novel hybrid encryption framework combining Advanced Encryption Standard (AES) and Elliptic Curve Cryptography (ECC) to achieve robust data security. The proposed system introduces a unique approach based on the formula E = ECC.(AES)², where AES provides high-speed symmetric encryption and ECC ensures secure key exchange through asymmetric cryptography. The framework enhances security by splitting the data into two equal parts: one encrypted using AES and the other with ECC. A swapping mechanism further obfuscates the data structure, adding an extra layer of protection. This innovative combination of cryptographic techniques ensures resilience against modern cyber threats, including brute force and key compromise attacks, while maintaining computational efficiency. The system is scalable and suitable for applications requiring high levels of confidentiality, such as secure communication, cloud storage, financial transactions, and military-grade data protection. Experimental results demonstrate the invention's robustness, efficiency, and adaptability, making it a reliable solution for securing sensitive digital information in an increasingly interconnected world. , C , C , Claims:1. Hybrid Encryption Framework
A method for securing data using a hybrid encryption framework, comprising:

Splitting input data into two equal segments, Part1 and Part2.
Encrypting Part1 using Elliptic Curve Cryptography (ECC).
Encrypting Part2 using Advanced Encryption Standard (AES) with a dual encryption process, denoted as AES2
Swapping Part1 and Part2 before encryption to enhance data obfuscation and security.

2. Dual Encryption Process
A method as claimed in Claim 1, wherein the AES2 encryption process involves applying AES encryption twice using two distinct keys, significantly enhancing the security and complexity of the encrypted data.

3. Data Splitting and Swapping
A method as claimed in Claim 1, wherein the data splitting mechanism ensures balanced segmentation of data, and the swapping of segments introduces an additional layer of unpredictability to the encrypted structure.

4. Resilience against Cyber Threats
A method as claimed in Claim 1, wherein the integration of ECC and AES provides enhanced resilience against modern cyber threats, including brute force attacks, key compromise, and cryptographic analysis, by leveraging the strengths of symmetric and asymmetric encryption.

5. Efficiency and Scalability
A method as claimed in Claim 1, wherein the framework is designed to offer high computational efficiency and scalability, making it adaptable for diverse applications, such as secure communication, cloud storage, and financial data protection.

Documents

NameDate
202441089521-COMPLETE SPECIFICATION [19-11-2024(online)].pdf19/11/2024
202441089521-DECLARATION OF INVENTORSHIP (FORM 5) [19-11-2024(online)].pdf19/11/2024
202441089521-DRAWINGS [19-11-2024(online)].pdf19/11/2024
202441089521-FORM 1 [19-11-2024(online)].pdf19/11/2024
202441089521-FORM-9 [19-11-2024(online)].pdf19/11/2024

footer-service

By continuing past this page, you agree to our Terms of Service,Cookie PolicyPrivacy Policy  and  Refund Policy  © - Uber9 Business Process Services Private Limited. All rights reserved.

Uber9 Business Process Services Private Limited, CIN - U74900TN2014PTC098414, GSTIN - 33AABCU7650C1ZM, Registered Office Address - F-97, Newry Shreya Apartments Anna Nagar East, Chennai, Tamil Nadu 600102, India.

Please note that we are a facilitating platform enabling access to reliable professionals. We are not a law firm and do not provide legal services ourselves. The information on this website is for the purpose of knowledge only and should not be relied upon as legal advice or opinion.