Improved Data Security System Using Hybrid Cryptosystem

Authors(3) :-Olatunde Yusuf Owolabi, P. B. Shola, Muhammed Besiru Jibrin

As information is send and receive through the World Wide Web, it becomes subject to inspection and access by unauthorized parties from different part of the world since it contains vital and private content that can be use for fraudulent purpose. As a result, data privacy requires more attention in order to reduce data loss and pilfering. Cryptography is one of the popular means of protecting information in order to achieve data integrity, authentication, confidentiality, accountability, accuracy and digital signatures. Symmetric & Asymmetric are the two main categories of cryptography algorithms used to protect data using the desired key. Asymmetric algorithms have been analysed by researchers to be stronger compared to Symmetric algorithms but has higher time complexity. Previous research shows that the loophole of a particular method or algorithm can be solved or minimized by another method or algorithm. Therefore, this paper proposes a method to improve data security and reduce the encryption and decryption speed of El-gamal algorithm for large volume of data using hybridization of El-gamal and Blowfish algorithm. The expected outcome of the proposed method is to achieve a more secure encryption technique to protect vital documents with faster encryption and decryption speed compare to El-Gamal algorithm.

Authors and Affiliations

Olatunde Yusuf Owolabi
Computer Science Department, University of Ilorin, Ilorin, Kwara State, Nigeria
P. B. Shola
Computer Science Department, University of Ilorin, Ilorin, Kwara State, Nigeria
Muhammed Besiru Jibrin
Computer Science Department, Federal University Kashere, Gombe State, Nigeria

Algorithm, Ciphertext, Encryption, Decryption, El-gamal, Blowfish

  1. Abari Ovye John, P.B. Shola, & Simon Philip (2015). Comparative analysis of discrete logarithm and RSA Algorithm in data cryptography. International Journal of Computer Science and Information security. (ISSN 1947-5500 Volume 13– No.2, 2015)
  2. Ankush Sharma, Jyoti Attri, Aarti Devi & Pratibha Sharma. (2014). Implementation & Analysis of RSA and ElGamal Algorithm. Asian J. of Adv. Basic Sci.: 2(3), 125-129 ISSN (Online): 2347 – 4114
  3. Boomija M.D. & S.V. Kasmir Raja (2016). Secure  data sharing through Additive Similarity based ElGamal like Encryption. International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB16). 978-1-4673-9745-2 ©2016 IEEE
  4. Chaitali Haldankar & Sonia Kuwelkar (2014). Implementation of AES and Blowfish algorithm. IJRET: International Journal of Research in Engineering and Technology. Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, eISSN: 2319-1163 | pISSN: 2321-7308. Available @
  5. Gary C. Kessler. (2014). An Overview of Cryptography and Handbook on Local Area Networks (Auerbach, Sept. 1998). © 1998-2016. Retrived from
  6. Jawahar Thakur, & Nagesh Kumar. (2011). DES, AES and Blowfish: Symmetric Key   Cryptography Algorithms Simulation Based Performance Analysis. International Journal of Emerging Technology and Advanced Engineering (ISSN 2250-2459, Volume 1, Issue 2, December 2011)
  7. Kumar Saurabh Er., & Ravinder Er. Singh Mann (2012). A Comparative Evaluation of Cryptographic Algorithms. Ravinder Singh Mann et al, Int. J. Computer Technology & Applications,Vol 3 (5), 1653-1657 ,ISSN:2229-6093, Sept-Oct 2012
  8. Kumar, Chandan; Dutta, Sandip & Chakraborty, Soubhik (2015). Hiding Messages using Musical Notes: A Fuzzy Logic Approach. International Journal of Security And Its Application.
  9. Malek jakob kakish (2012). Authenticated and secure el-gamal cryptosystem over Elliptic curves. Ijrras 10 (2).  February 2012
  10. Mansoor Ebrahim , Shujaat Khan,& Umer Bin Khalid (2013). Symmetric Algorithm Survey: A Comparative Analysis. International Journal of Computer Applications (0975 – 8887) Volume 61– No.20, January 2013
  11. Ramesh A., & Dr.A.Suruliandi ME (2013). Performance Analysis of Encryption Algorithms for Information Security. 2013International Conference on Circuits, Power and Computing Technologies [ICCPCT-2013]. 978-1-4673-4922-2/13/$31.00 ©2013 IEEE
  12. Rishabh Arora & Sandeep Sharma. (2012). Performance Analysis of Cryptography Algorithms. International Journal of Computer Applications (0975 – 8887) Volume 48– No.21, June 2012
  13. Zengqiang Wu, Di Su, & Gang Ding (2014). ElGamal Algorithm for Encryption of Data Transmission. 2014 International Conference on Mechatronics and Control (ICMC). July 3 - 5, 2014, Jinzhou, China. 978-1-4799-2538-4/14/$31.00 ©2014 IEEE

Publication Details

Published in : Volume 3 | Issue 3 | May-June 2017
Date of Publication : 2017-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 90-93
Manuscript Number : IJSRSET173311
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Olatunde Yusuf Owolabi, P. B. Shola, Muhammed Besiru Jibrin, " Improved Data Security System Using Hybrid Cryptosystem, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 3, pp.90-93, May-June-2017.
Journal URL :

Article Preview