Analysis of E0, DES, RSA, AES and Hybrid Algorithm for Bluetooth Transmission

Authors

  • Shivam Vatshayan  Department of Computer Science and Engineering, Galgotias University, Uttar Pradesh, India

Keywords:

E0 Algorithm RSA Algorithm AES Algorithm Cryp-tography Hybrid Algorithm.

Abstract

Bluetooth is a short range wireless technology standard for exchanging data over devices and It uses di erent types of Algorithms for its Data protection, easy secure transmission. This paper is analysis for E0, DES, RSA and AES cipher algorithms with concept of cryptog-raphy and machine learning. However, Hybrid Algorithm is convenient technique for encryption of transmission of data. Hybrid Algorithm is also discussed.

References

  1. Jagadeeshbabu, B et al. \DESIGN OF SAFER + ENCRYPTION ALGO-RITHM FOR BLUETOOTH TRANSMISSION." (2015).
  2. Bluetooth Protocol Architecture. White Paper, Bluetooth. Downloadable from : (last visited: May 26, 2017) http://www.ece.eng.wayne.edu/ smahmud/BluetoothWeb/BT oothP rotocol.pdf
  3. Bluetooth { What is Bluetooth? (last visited: May 26, 2017)
  4. https://www.bluetooth.com/what-is-bluetooth- technology/how-it-works.
  5. Bluetooth Security Architecture. White Paper, Bluetooth. Downloadable from: (last visited: May 26, 2017) http://www.afn.org/ afn48922/downs/wireless/1c11600.pdf.
  6. Bluetooth Security White Paper. Bluetooth SIG Security Expert Group.Downloadable from: (last visited: May 26, 2017) http://grouper.ieee.org/groups/1451/5/Comparison
  7. Singh, G. (2013) A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security. International Journal of Computer Applications, 67, 33-38. https://doi.org/10.5120/11507-7224
  8. Bhanot, R. and Hans, R. (2015) A Review and Comparative Analysis of Various Encryption Algorithms. International Journal of Security and Its Appli-cations, 9, 289-306. https://doi.org/10.14257/ijsia.2015.9.4.27
  9. Shanta, J.V. (2012) Evaluating the Performance of Symmetric Key Algo-rithms: AES (Advanced Encryption Standard) and DES (Data Encryption Stan-dard). IJCEM International Journal of Computational Engineering Manage-ment, 15, 43-49.
  10. Stallings, W. (2006) Cryptography and Network Security: Principles and Practices. Pearson Education, India.
  11. Chowdhury, Z.J., Pishva, D. and Nishantha, G.G.D. (2010) AES and Con - dentiality from the Inside Out. The 12th International Conference on Advanced Communication Technology (ICACT), 2, 1587-1591.
  12. Rege, K., Goenka, N., Bhutada, P. and Mane, S. (2013) Bluetooth Commu-nication Using Hybrid Encryption Algorithm Based on AES and RSA. Interna-tional Journal of Computer Applications, 71, 10-13.
  13. Armknecht, F. and Krause, M. (2003) Algebraic Attacks on Combiners with Memory, in Advances. In: Boneh, D., Ed., Advances in Cryptology|CRYPTO 2003, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 162-175.
  14. Hermelin, M. and Nyberg, K. (2000) Correlation Properties of the Bluetooth Combiner. In: Song, J., Ed., Information Security and Cryptology|ICISC’99, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 17-29.
  15. Lu, Y. and Vaudenay, S. (2004) Faster Correlation Attack on Bluetooth Keystream Generator Eo. In: Franklin, M., Ed., Advances in Cryptology|CRYPTO
  16. 2004, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 407-425.https://doi.org/10.1007/978-3-540-28628-825
  17. Albahar; M:; Haataja; K:andT oivanen; P:(2016) TowardsEnhancingJustW orksM odelinBluetoothP airi\
  18. Albahar; M:; Olawumi; O:; Haataja; K:andT oivanen; P:(2018) NovelHybridEncryptionAlgorithmBased 176:doi : 10:4236=jis:2018:92012

Downloads

Published

2019-08-30

Issue

Section

Research Articles

How to Cite

[1]
Shivam Vatshayan, " Analysis of E0, DES, RSA, AES and Hybrid Algorithm for Bluetooth Transmission, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 6, Issue 4, pp.361-366, July-August-2019.