Powered by OpenAIRE graph
Found an issue? Give us feedback
ZENODOarrow_drop_down
ZENODO
Article . 2026
License: CC BY
Data sources: Datacite
ZENODO
Article . 2026
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

Hybrid Encryption Algorithms for Computer Resources Optimasation

Authors: Abdulrahman Mustapha; Aminu Aliyu Abdullahi; Farouk Lawan Gambo; Abubakar Muhammad Miyim; Muhammad Aminu;

Hybrid Encryption Algorithms for Computer Resources Optimasation

Abstract

In today\\\'s digital era, ensuring the confidentiality, integrity, verifying users and entities, and maintaining the secrecy of sensitive information of transmission are crucial; both in terms of speed and memory use is a growing challenge, especially for resource-limited devices like IoT, mobile, and embedded systems. The thesis presents an entropy-aware Key Encapsulation Mechanism (KEM) and Data Encapsulation Mechanism (DEM) hybrid scheme. The technical design pairs AES-256 (CBC mode) for bulk data confidentiality with ECC (secp256r1) for secure key encapsulation, using SHA 256 for integrity verification where needed. Performance benchmarking was conducted on an HP laptop (Intel i7 7200U) using distinct datasets: Audio and Image partitioned in 10% increments to analyse allocation effects. The research provides an empirically validated framework that offers specific engineering guidelines for optimising memory and latency in secure data transmission. The inclusion of entropy adaptation combined with NIST test vectors (Known Answer Tests) to validate the correctness of the hybrid implementation, distinguishing it from prior works that often lacked validation. These innovations enhance cryptographic performance for IoT and edge computing environments where both resource efficiency and strong security are imperative. The study recognises limitations in hardware diversity, sector-specific applicability, and exclusion of PQC showing directions for future studies.

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!