Next-Gen Data Security Using Hybrid Cryptography and Email-Based Two-Factor Authentication

Authors

  • Nadakuditi Vijay Vamsi
  • Radhika Rani Chintala

Abstract

Now-a-days it must be mandatory for the organization to properly secure data using cryptographic techniques-the advancing digital communication and cloud storage. Despite the effectiveness of hybrid encryption mechanisms used in the traditional models, they are not easily implemented in the environment where there is high throughput because of the bottleneck in performance and vulnerability. An original algorithm in hybrid cryptography, ARB3, is brought forward in this paper. This next-generation algorithm combines the merits of Advanced Encryption Standard (AES), Rivest-Shamir-Adleman (RSA), and the BLAKE3 hashing algorithm. The three components brought together form a fast, secure, and efficient data protection mechanism: high speed symmetric encryption from AES, secure key establishing capabilities from RSA, and fast and secure hashing for data integrity verification from BLAKE3. This model also adds an electronic email 2FA to give an extra layer to access control and user verification: time-sensitive one-time passwords issued to their registered email account. Through rigorous test cases, ARB3 has been found to perform better as regards both encryption and decryption speed and throughput improvements over common cyber threats against traditional models. Hence, this hybrid model is scalable and robustly geared up to provide a state-of-the-art solution for contemporary applications where the demand for high-performance adaptable crypto systems is becoming more urgent.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

H. Sharma, R. Kumar and M. Gupta, "A Review Paper on Hybrid Cryptographic Algorithms in Cloud Network," 2023 2nd International Conference for Innovation in Technology (INOCON), Bangalore, India, 2023, pp. 1-5, doi: 10.1109/INOCON57975.2023.10101044.

V. Verma, P. Kumar, R. K. Verma and S. Priya, "A Novel Approach for Security in Cloud Data Storage Using AES-DES-RSA Hybrid Cryptography," 2021 Emerging Trends in Industry 4.0 (ETI 4.0), Raigarh, India, 2021, pp. 1-6, doi: 10.1109/ETI4.051663.2021.9619274.

K. Tajane, R. Pitale, S. Zambre, H. Huda, A. Utage and V. Dhar, "Efficient Cloud Data Deduplication with Blake3 and Secure Transfer using AES," 2024 4th International Conference on Pervasive Computing and Social Networking (ICPCSN), Salem, India, 2024, pp. 572-579, doi:10.1109/ICPCSN62568.2024.00096.

Z. Li, "Exploration on Accounting Data Encryption Processing System Based on DES Algorithm," 2023 International Conference on Ambient Intelligence, Knowledge Informatics and Industrial Electronics (AIKIIE), Ballari, India, 2023, pp. 1-6, doi: 10.1109/AIKIIE60097.2023.10389923.

C. Susmitha, S. Srineeharika, K. S. Laasya, S. K. Kannaiah and S. Bulla, "Hybrid Cryptography for Secure File Storage," 2023 7th International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, 2023, pp. 1151-1156, doi: 10.1109/ICCMC56507.2023.10084073.

Murad, Sherief & Rahouma, Kamel. (2022). Hybrid Cryptography for Cloud Security: Methodologies and Designs. 10.1007/978-981-16-2275-5_7.

K. Jaspin, S. Selvan, S. Sahana and G. Thanmai, "Efficient and Secure File Transfer in Cloud Through Double Encryption Using AES and RSA Algorithm," 2021 International Conference on Emerging Smart Computing and Informatics (ESCI), Pune, India, 2021, pp. 791-796, doi: 10.1109/ESCI50559.2021.9397005.

V. Sharma, A. Chauhan, H. Saxena, S. Mishra and S. Bansal, "Secure File Storage on Cloud using Hybrid Cryptography," 2021 5th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 2021, pp. 1-6, doi: 10.1109/ISCON52037.2021.9702323.

E. Jintcharadze and M. Iavich, "Hybrid Implementation of Twofish, AES, ElGamal and RSA Cryptosystems," 2020 IEEE East-West Design & Test Symposium (EWDTS), Varna, Bulgaria, 2020, pp. 1-5, doi: 10.1109/EWDTS50664.2020.9224901.

S. A. Ahmad and A. B. Garko, "Hybrid Cryptography Algorithms in Cloud Computing: A Review," 2019 15th International Conference on Electronics, Computer and Computation (ICECCO), Abuja, Nigeria, 2019, pp. 1-6, doi: 10.1109/ICECCO48375.2019.9043254.

Od, Zina & Derdour, Makhlouf & Bouhamed, Mohammed Mounir. (2024). Improving Resource Security by Integrating Authentication and Cryptography. 1-8. 10.1109/ECTE-Tech62477.2024.10851191.

omwoyo, R., Kamau, J., & Mgala, M. (2022). A review of Two Factor Authentication Security Challenges in the Cyberspace. International Journal of Advanced Computer Technology, 11(5), 1-6. Retrieved from https://ijact.org/index.php/ijact/article/view/112

Y. Sharma, H. Gupta and S. K. Khatri, "A Security Model for the Enhancement of Data Privacy in Cloud Computing," 2019 Amity International Conference on Artificial Intelligence (AICAI), Dubai, United Arab Emirates, 2019, pp. 898-902, doi: 10.1109/AICAI.2019.8701398.

P. V. Maitri and A. Verma, "Secure file storage in cloud computing using hybrid cryptography algorithm," 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 2016, pp. 1635-1638, doi: 10.1109/WiSPNET.2016.7566416.

B. P. Gajendra, V. K. Singh and M. Sujeet, "Achieving cloud security using third party auditor, MD5 and identity-based encryption," 2016 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, India, 2016, pp. 1304-1309, doi: 10.1109/CCAA.2016.7813920.

B. Swathi, S.D Bhaludra, S. Raveendranadh, “Secure File Storage In Cloud Computing Using Hybrid Cryptography Algorithm”, International Journal of Advance Research in Science and Engineering 6(11), 2017.

Kumar, Sanjeev & Karnani, Garima & Gaur, Madhu & Mishra, Anju. (2021). Cloud Security using Hybrid Cryptography Algorithms. 599-604. 10.1109/ICIEM51511.2021.9445377.

Baqtian, H & Ali Al-Aidroos, Naziha. (2023). Three Hash Functions Comparison on Digital Holy Quran Integrity Verification. 11. 1-7.

F. Kahri, B. Bouallegue, M. Machhout and R. Tourki, "An FPGA implementation of the SHA-3: The BLAKE hash function," 10th International Multi-Conferences on Systems, Signals & Devices 2013 (SSD13), Hammamet, Tunisia, 2013, pp. 1-5, doi: 10.1109/SSD.2013.6564030.

kaur, Sandeep & Kaur, Gaganpreet & Shabaz, Dr. Mohammad. (2022). A Secure Two-Factor Authentication Framework in Cloud Computing. Security and Communication Networks. 2022. 1-9. 10.1155/2022/7540891.

Colnago, Jessica & Devlin, Summer & Oates, Maggie & Swoopes, Chelse & Bauer, Lujo & Cranor, Lorrie & Christin, Nicolas. (2018). It's not actually that horrible: Exploring Adoption of Two-Factor Authentication at a University. 1-11. 10.1145/3173574.3174030.

Lu, C. C., & Tseng, S. Y. “Integrated design of AES (Advanced Encryption Standard) encrypter and decrypter. In Application Specific Systems, Architectures and Processors”, 2002. Proceedings. The IEEE International Conference on (pp. 277285).

P. V. Maitri and A. Verma, "Secure file storage in cloud computing using hybrid cryptography algorithm," 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 2016, pp. 1635-1638, doi: 10.1109/WiSPNET.2016.7566416.

Kumar, Sanjeev & Karnani, Garima & Gaur, Madhu & Mishra, Anju. (2021). Cloud Security using Hybrid Cryptography Algorithms. 599-604. 10.1109/ICIEM51511.2021.9445377.

F. J. Aufa, Endroyono, and A. Affandi, “Security System Analysis in Combination Method: RSA Encryption and Digital Signature Algorithm,” Proc. - 2018 4th Int. Conf. Sci. Technol. ICST 2018, vol. 1, pp. 1–5, 2018, doi: 10.1109/ICSTC.2018.8528584.

F. Kahri, B. Bouallegue, M. Machhout and R. Tourki, "An FPGA implementation of the SHA-3: The BLAKE hash function," 10th International Multi-Conferences on Systems, Signals & Devices 2013 (SSD13), Hammamet, Tunisia, 2013, pp. 1-5, doi: 10.1109/SSD.2013.6564030.

Baqtian, H & Ali Al-Aidroos, Naziha. (2023). Three Hash Functions Comparison on Digital Holy Quran Integrity Verification. 11. 1-7.

Melo, Laerte & Amaral, Dino & Albuquerque, Robson & de Sousa Junior, Rafael & Sandoval Orozco, Ana & García Villalba, Luis. (2024). A Secure Approach Out-of-Band for e-Bank with Visual Two-Factor Authorization Protocol. Cryptography. 8. 51. 10.3390/cryptography8040051.

Downloads

Published

2025-08-20

How to Cite

1.
Vamsi NV, Chintala RR. Next-Gen Data Security Using Hybrid Cryptography and Email-Based Two-Factor Authentication. J Neonatal Surg [Internet]. 2025Aug.20 [cited 2025Oct.14];14(32S):7626-38. Available from: https://jneonatalsurg.com/index.php/jns/article/view/8728