Analysis of E0, DES, RSA, AES and Hybrid Algorithm for Bluetooth Transmission
Keywords:
E0 Algorithm RSA Algorithm AES Algorithm Cryp-tography Hybrid Algorithm.Abstract
Bluetooth is a short range wireless technology standard for exchanging data over devices and It uses di erent types of Algorithms for its Data protection, easy secure transmission. This paper is analysis for E0, DES, RSA and AES cipher algorithms with concept of cryptog-raphy and machine learning. However, Hybrid Algorithm is convenient technique for encryption of transmission of data. Hybrid Algorithm is also discussed.
References
- Jagadeeshbabu, B et al. \DESIGN OF SAFER + ENCRYPTION ALGO-RITHM FOR BLUETOOTH TRANSMISSION." (2015).
- Bluetooth Protocol Architecture. White Paper, Bluetooth. Downloadable from : (last visited: May 26, 2017) http://www.ece.eng.wayne.edu/ smahmud/BluetoothWeb/BT oothP rotocol.pdf
- Bluetooth { What is Bluetooth? (last visited: May 26, 2017)
- https://www.bluetooth.com/what-is-bluetooth- technology/how-it-works.
- Bluetooth Security Architecture. White Paper, Bluetooth. Downloadable from: (last visited: May 26, 2017) http://www.afn.org/ afn48922/downs/wireless/1c11600.pdf.
- Bluetooth Security White Paper. Bluetooth SIG Security Expert Group.Downloadable from: (last visited: May 26, 2017) http://grouper.ieee.org/groups/1451/5/Comparison
- Singh, G. (2013) A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security. International Journal of Computer Applications, 67, 33-38. https://doi.org/10.5120/11507-7224
- Bhanot, R. and Hans, R. (2015) A Review and Comparative Analysis of Various Encryption Algorithms. International Journal of Security and Its Appli-cations, 9, 289-306. https://doi.org/10.14257/ijsia.2015.9.4.27
- Shanta, J.V. (2012) Evaluating the Performance of Symmetric Key Algo-rithms: AES (Advanced Encryption Standard) and DES (Data Encryption Stan-dard). IJCEM International Journal of Computational Engineering Manage-ment, 15, 43-49.
- Stallings, W. (2006) Cryptography and Network Security: Principles and Practices. Pearson Education, India.
- Chowdhury, Z.J., Pishva, D. and Nishantha, G.G.D. (2010) AES and Con - dentiality from the Inside Out. The 12th International Conference on Advanced Communication Technology (ICACT), 2, 1587-1591.
- Rege, K., Goenka, N., Bhutada, P. and Mane, S. (2013) Bluetooth Commu-nication Using Hybrid Encryption Algorithm Based on AES and RSA. Interna-tional Journal of Computer Applications, 71, 10-13.
- Armknecht, F. and Krause, M. (2003) Algebraic Attacks on Combiners with Memory, in Advances. In: Boneh, D., Ed., Advances in Cryptology|CRYPTO 2003, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 162-175.
- Hermelin, M. and Nyberg, K. (2000) Correlation Properties of the Bluetooth Combiner. In: Song, J., Ed., Information Security and Cryptology|ICISC’99, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 17-29.
- Lu, Y. and Vaudenay, S. (2004) Faster Correlation Attack on Bluetooth Keystream Generator Eo. In: Franklin, M., Ed., Advances in Cryptology|CRYPTO
- 2004, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 407-425.https://doi.org/10.1007/978-3-540-28628-825
- Albahar; M:; Haataja; K:andT oivanen; P:(2016) TowardsEnhancingJustW orksM odelinBluetoothP airi\
- Albahar; M:; Olawumi; O:; Haataja; K:andT oivanen; P:(2018) NovelHybridEncryptionAlgorithmBased 176:doi : 10:4236=jis:2018:92012
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET
This work is licensed under a Creative Commons Attribution 4.0 International License.