Published on: April 2026
SECURITY ALL FORMATS FILE USING HYBRID ENCRYPTION
Varuna Kshirsagar Purvi Mandlik Nagare Siddhi Pacharne Komal
Article Status
Available Documents
Abstract
Keywords: Data Security, Advanced Encryption Standard (AES), Genetic Algorithm, Key Generation, Cryptography
How to Cite this Paper
Kshirsagar, V., Mandlik, P., Siddhi, N. & Komal, P. (2026). Security all formats file using hybrid encryption. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(04). https://doi.org/10.55041/ijcope.v2i4.267
Kshirsagar, Varuna, et al.. "Security all formats file using hybrid encryption." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i4.267.
Kshirsagar, Varuna,Purvi Mandlik,Nagare Siddhi, and Pacharne Komal. "Security all formats file using hybrid encryption." International Journal of Creative and Open Research in Engineering and Management 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i4.267.
References
- Sandyarani and P. N. Kumar, ”Design and analysis of AES-CM with non linearity S-box architecture,” 2013 International Conference on Current Trends in Engineering and Technology (ICCTET), 2013, pp. 252-254, doi: 10.1109/IC CTET.2013.6675960.
- Fang Rao and Jianjun Tan, ”Energy consumption research of AES encryption al gorithm in ZigBee,” International Conference on Cyberspace Technology (CCT 2014), 2014, pp. 1-6, doi: 10.1049/cp.2014.1330.
- Koteshwara, A. Das and K. K. Parhi, ”Performance comparison of AES GCM-SIV and AES-GCM algorithms for authenticated encryption on FPGA platforms,” 2017 51st Asilomar Conference on Signals, Systems, and Computers, 2017, pp. 1331-1336, doi: 10.1109/ACSSC.2017.8335570.
- Ritambhara, A. Gupta and M. Jaiswal, ”An enhanced AES algorithm using cascading method on 400 bits key size used in enhancing the safety of next generation internet of things (IOT),” 2017 International Conference on Com puting, Communication and Automation (ICCCA), 2017, pp. 422-427, doi: 10.1109/CCAA.2017.8229877.
- H. Kim, ”Differential Fault Analysis against AES-192 and AES-256 with Minimal Faults,” 2010 Workshop on Fault Diagnosis and Tolerance in Cryptog raphy, 2010, pp. 3-9, doi: 10.1109/FDTC.2010.10.
- Floissac and Y. L’Hyver, ”From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks on Key Expansion,” 2011 Work shop on Fault Diagnosis and Tolerance in Cryptography, 2011, pp. 43-53, doi: 10.1109/FDTC.2011.15.
- Hsiao and G. Liou, ”Application of Advanced Encryption Standard to Chaotic Synchronization Systems: Using an Improved Genetic Algorithm as Auxiliary,” 2014 International Conference on IT Convergence and Security (ICITCS), 2014, pp. 1-4, doi: 10.1109/ICITCS.2014.7021740.
- Conci, A. L. Brazil, S. B. L. Ferreira and T. MacHenry, ”AES cryptography in color image steganography by genetic algorithms,” 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), 2015, pp. 1-8, doi: 10.1109/AICCSA.2015.7507100.
- S. Semente, A. O. Salazar and F. D. M. Oliveira, ”CRYSEED: An auto matic 8-bit cryptographic algorithm developed with genetic programming,” 2014 IEEE International Instrumentation and Measurement Technology Conference (I2MTC) Proceedings, 2014, pp. 1065-1068, doi: 10.1109/I2MTC.2014.6860905.
- Ray, A. Potnis, P. Dwivedy, S. Soofi and U. Bhade, ”Comparative study of AES, RSA, genetic, affine transform with XOR operation, and watermarking for image encryption,” 2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE), 2017, pp. 274-278, doi: 10.1109/RISE.2017.8378166.
Ethical Compliance & Review Process
- •All submissions are screened under plagiarism detection.
- •Review follows editorial policy.
- •Authors retain copyright.
- •Peer Review Type: Double-Blind Peer Review
- •Published on: Apr 11 2026
This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

