Title: Secure system to secure crime data using hybrid: RSA-AES and hybrid: Blowfish-Triple DES

Authors: Raghav Modi; Ananjay Singh Jammoria; Akshat Pattiwar; Arnav Agrawal; S.P. Raja

Addresses: School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, Tamilnadu, India ' School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, Tamilnadu, India ' School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, Tamilnadu, India ' School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, Tamilnadu, India ' School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, Tamilnadu, India

Abstract: Data security is the project's primary goal. We suggest hybrid cryptography as a technique to keep the data secure. When the sender tries to email the recipient the criminal data, it will be encrypted with a symmetric key utilising symmetric encryption. In most cases, the recipient receives a symmetric key that he can use to decrypt the data. However, we employ hybrid cryptography to further increase security by encrypting the symmetric key using asymmetric encryption and transmitting both the encrypted symmetric key and the encrypted crime data to the recipient. The encrypted symmetric key is decrypted by the recipient using their private key, and the encrypted criminal data is then safely delivered to the recipient using the decrypted symmetric key. In the police department data about offenders, including their background, record, and information about their prison records and officers who treated them is maintained in the cloud. Yet, that information is moved from one department to another for departmental purposes. The hackers may hack this process and contaminate the data. We recommend hybrid cryptography as a strategy to keep this data secure.

Keywords: Advanced Encryption Standard; AES; Rivest-Shamir-Adleman; RSA; Triple Data Encryption; 3DES; Blowfish.

DOI: 10.1504/IJESDF.2025.143472

International Journal of Electronic Security and Digital Forensics, 2025 Vol.17 No.1/2, pp.194 - 232

Received: 23 Apr 2023
Accepted: 13 Jul 2023

Published online: 23 Dec 2024 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article