IJCOPE Journal

UGC Logo DOI / ISO Logo

International Journal of Creative and Open Research in Engineering and Management

A Peer-Reviewed, Open-Access International Journal Supporting Multidisciplinary Research, Digital Publishing Standards, DOI Registration, and Academic Indexing.
Journal Information
ISSN: 3108-1754 (Online)
Crossref DOI: Available
ISO Certification: 9001:2015
Publication Fee: 599/- INR
Compliance: UGC Journal Norms
License: CC BY 4.0
Peer Review: Double Blind
Volume 02, Issue 04

Published on: April 2026

SECURITY ALL FORMATS FILE USING HYBRID ENCRYPTION

Varuna Kshirsagar Purvi Mandlik Nagare Siddhi Pacharne Komal

Article Status

Plagiarism Passed Peer Reviewed Open Access

Available Documents

Abstract

Data security and encryption is one of the most useful at highly essential aspects of enabling effective security of the data against attacks and intrusions. This is an effective and useful technique that has been evolved significantly over the past few years. For the purpose of encryption the AES was prominently used before. The data encryption standard is highly effective but was prone to encryption failure against brute force attacks that have been highly effective against this encryption standard. Therefore the advanced encryption standard has been used since then to improve the performance of encryption significantly. The advanced encryption standard has been useful and realization of effective security but has been optimized specifically for achieving high throughput and high bandwidth for a variety of implementations. In this methodology we propose an enhancement to the AES encryption approach through the improvement of key generation process through the utilization of the genetic algorithm. The effective and useful implementation of genetic algorithm has been significantly useful for improving the performance of the AES encryption con siderably.

Keywords: Data Security, Advanced Encryption Standard (AES), Genetic Algorithm, Key Generation, Cryptography

How to Cite this Paper

Kshirsagar, V., Mandlik, P., Siddhi, N. & Komal, P. (2026). Security all formats file using hybrid encryption. International Journal of Creative and Open Research in Engineering and Management, <i>02</i>(04). https://doi.org/10.55041/ijcope.v2i4.267

Kshirsagar, Varuna, et al.. "Security all formats file using hybrid encryption." International Journal of Creative and Open Research in Engineering and Management, vol. 02, no. 04, 2026, pp. . doi:https://doi.org/10.55041/ijcope.v2i4.267.

Kshirsagar, Varuna,Purvi Mandlik,Nagare Siddhi, and Pacharne Komal. "Security all formats file using hybrid encryption." International Journal of Creative and Open Research in Engineering and Management 02, no. 04 (2026). https://doi.org/https://doi.org/10.55041/ijcope.v2i4.267.

Search & Index

References


  1. Sandyarani and P. N. Kumar, ”Design and analysis of AES-CM with non linearity S-box architecture,” 2013 International Conference on Current Trends in Engineering and Technology (ICCTET), 2013, pp. 252-254, doi: 10.1109/IC CTET.2013.6675960.

  2. Fang Rao and Jianjun Tan, ”Energy consumption research of AES encryption al gorithm in ZigBee,” International Conference on Cyberspace Technology (CCT 2014), 2014, pp. 1-6, doi: 10.1049/cp.2014.1330.

  3. Koteshwara, A. Das and K. K. Parhi, ”Performance comparison of AES GCM-SIV and AES-GCM algorithms for authenticated encryption on FPGA platforms,” 2017 51st Asilomar Conference on Signals, Systems, and Computers, 2017, pp. 1331-1336, doi: 10.1109/ACSSC.2017.8335570.

  4. Ritambhara, A. Gupta and M. Jaiswal, ”An enhanced AES algorithm using cascading method on 400 bits key size used in enhancing the safety of next generation internet of things (IOT),” 2017 International Conference on Com puting, Communication and Automation (ICCCA), 2017, pp. 422-427, doi: 10.1109/CCAA.2017.8229877.

  5. H. Kim, ”Differential Fault Analysis against AES-192 and AES-256 with Minimal Faults,” 2010 Workshop on Fault Diagnosis and Tolerance in Cryptog raphy, 2010, pp. 3-9, doi: 10.1109/FDTC.2010.10.

  6. Floissac and Y. L’Hyver, ”From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks on Key Expansion,” 2011 Work shop on Fault Diagnosis and Tolerance in Cryptography, 2011, pp. 43-53, doi: 10.1109/FDTC.2011.15.

  7. Hsiao and G. Liou, ”Application of Advanced Encryption Standard to Chaotic Synchronization Systems: Using an Improved Genetic Algorithm as Auxiliary,” 2014 International Conference on IT Convergence and Security (ICITCS), 2014, pp. 1-4, doi: 10.1109/ICITCS.2014.7021740.

  8. Conci, A. L. Brazil, S. B. L. Ferreira and T. MacHenry, ”AES cryptography in color image steganography by genetic algorithms,” 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), 2015, pp. 1-8, doi: 10.1109/AICCSA.2015.7507100.

  9. S. Semente, A. O. Salazar and F. D. M. Oliveira, ”CRYSEED: An auto matic 8-bit cryptographic algorithm developed with genetic programming,” 2014 IEEE International Instrumentation and Measurement Technology Conference (I2MTC) Proceedings, 2014, pp. 1065-1068, doi: 10.1109/I2MTC.2014.6860905.

  10. Ray, A. Potnis, P. Dwivedy, S. Soofi and U. Bhade, ”Comparative study of AES, RSA, genetic, affine transform with XOR operation, and watermarking for image encryption,” 2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE), 2017, pp. 274-278, doi: 10.1109/RISE.2017.8378166.

Ethical Compliance & Review Process

  • All submissions are screened under plagiarism detection.
  • Review follows editorial policy.
  • Authors retain copyright.
  • Peer Review Type: Double-Blind Peer Review
  • Published on: Apr 11 2026
CCBYNC

This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. You are free to share and adapt this work for non-commercial purposes with proper attribution.

View License
Scroll to Top