Consult an Expert
Trademark
Design Registration
Consult an Expert
Trademark
Copyright
Patent
Infringement
Design Registration
More
Consult an Expert
Consult an Expert
Trademark
Design Registration
Login
Method and System for Securing Data Using AES and ECC with Split and Swap Encryption Technique
Extensive patent search conducted by a registered patent agent
Patent search done by experts in under 48hrs
₹999
₹399
Abstract
Information
Inventors
Applicants
Specification
Documents
ORDINARY APPLICATION
Published
Filed on 19 November 2024
Abstract
This invention presents a novel hybrid encryption framework combining Advanced Encryption Standard (AES) and Elliptic Curve Cryptography (ECC) to achieve robust data security. The proposed system introduces a unique approach based on the formula E = ECC.(AES)², where AES provides high-speed symmetric encryption and ECC ensures secure key exchange through asymmetric cryptography. The framework enhances security by splitting the data into two equal parts: one encrypted using AES and the other with ECC. A swapping mechanism further obfuscates the data structure, adding an extra layer of protection. This innovative combination of cryptographic techniques ensures resilience against modern cyber threats, including brute force and key compromise attacks, while maintaining computational efficiency. The system is scalable and suitable for applications requiring high levels of confidentiality, such as secure communication, cloud storage, financial transactions, and military-grade data protection. Experimental results demonstrate the invention's robustness, efficiency, and adaptability, making it a reliable solution for securing sensitive digital information in an increasingly interconnected world.
Patent Information
Application ID | 202441089521 |
Invention Field | COMMUNICATION |
Date of Application | 19/11/2024 |
Publication Number | 47/2024 |
Inventors
Name | Address | Country | Nationality |
---|---|---|---|
Donagani Ramakrishna | Research Scholar School of CS &AI, SR University, Warangal, Telangana-506371, India | India | India |
Mohammed Ali Shaik | Associate Professor School of CS &AI, SR University, Warangal, Telangana-506371, India | India | India |
Applicants
Name | Address | Country | Nationality |
---|---|---|---|
SR University, Warangal | Ananthasagar, Hasanparthy (PO), Warangal-506371 | India | India |
Specification
Description:This invention presents a novel hybrid encryption framework combining Advanced Encryption Standard (AES) and Elliptic Curve Cryptography (ECC) to achieve robust data security. The proposed system introduces a unique approach based on the formula E = ECC.(AES)², where AES provides high-speed symmetric encryption and ECC ensures secure key exchange through asymmetric cryptography. The framework enhances security by splitting the data into two equal parts: one encrypted using AES and the other with ECC. A swapping mechanism further obfuscates the data structure, adding an extra layer of protection. This innovative combination of cryptographic techniques ensures resilience against modern cyber threats, including brute force and key compromise attacks, while maintaining computational efficiency. The system is scalable and suitable for applications requiring high levels of confidentiality, such as secure communication, cloud storage, financial transactions, and military-grade data protection. Experimental results demonstrate the invention's robustness, efficiency, and adaptability, making it a reliable solution for securing sensitive digital information in an increasingly interconnected world. , C , C , Claims:1. Hybrid Encryption Framework
A method for securing data using a hybrid encryption framework, comprising:
Splitting input data into two equal segments, Part1 and Part2.
Encrypting Part1 using Elliptic Curve Cryptography (ECC).
Encrypting Part2 using Advanced Encryption Standard (AES) with a dual encryption process, denoted as AES2
Swapping Part1 and Part2 before encryption to enhance data obfuscation and security.
2. Dual Encryption Process
A method as claimed in Claim 1, wherein the AES2 encryption process involves applying AES encryption twice using two distinct keys, significantly enhancing the security and complexity of the encrypted data.
3. Data Splitting and Swapping
A method as claimed in Claim 1, wherein the data splitting mechanism ensures balanced segmentation of data, and the swapping of segments introduces an additional layer of unpredictability to the encrypted structure.
4. Resilience against Cyber Threats
A method as claimed in Claim 1, wherein the integration of ECC and AES provides enhanced resilience against modern cyber threats, including brute force attacks, key compromise, and cryptographic analysis, by leveraging the strengths of symmetric and asymmetric encryption.
5. Efficiency and Scalability
A method as claimed in Claim 1, wherein the framework is designed to offer high computational efficiency and scalability, making it adaptable for diverse applications, such as secure communication, cloud storage, and financial data protection.
Documents
Name | Date |
---|---|
202441089521-COMPLETE SPECIFICATION [19-11-2024(online)].pdf | 19/11/2024 |
202441089521-DECLARATION OF INVENTORSHIP (FORM 5) [19-11-2024(online)].pdf | 19/11/2024 |
202441089521-DRAWINGS [19-11-2024(online)].pdf | 19/11/2024 |
202441089521-FORM 1 [19-11-2024(online)].pdf | 19/11/2024 |
202441089521-FORM-9 [19-11-2024(online)].pdf | 19/11/2024 |
Talk To Experts
Calculators
Downloads
By continuing past this page, you agree to our Terms of Service,, Cookie Policy, Privacy Policy and Refund Policy © - Uber9 Business Process Services Private Limited. All rights reserved.
Uber9 Business Process Services Private Limited, CIN - U74900TN2014PTC098414, GSTIN - 33AABCU7650C1ZM, Registered Office Address - F-97, Newry Shreya Apartments Anna Nagar East, Chennai, Tamil Nadu 600102, India.
Please note that we are a facilitating platform enabling access to reliable professionals. We are not a law firm and do not provide legal services ourselves. The information on this website is for the purpose of knowledge only and should not be relied upon as legal advice or opinion.