Identity-Based Encryption Algorithm using Hybrid Encryption and MAC Address for Key Generation
Darpan Anand1, Jeetendra Pande2, Udit Maheshwari3

1Darpan Anand*, Associate Professor, Department of Computer Science Engineering Chandigarh University, Chandigarh, India.
2Jeetendra Pande, Assistant Professor, Department of Computer Science, Uttarakhand Open University, Haldwani, India.
3Udit Maheshwari, Hindustan Institute of Technology and Management, India. 

Manuscript received on September 16, 2019. | Revised Manuscript received on 24 September, 2019. | Manuscript published on October 10, 2019. | PP: 2467-2474 | Volume-8 Issue-12, October 2019. | Retrieval Number: L34231081219/2019©BEIESP | DOI: 10.35940/ijitee.L3423.1081219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In today’s world, secured communication is what every field wants. But due to the escalation of theft and unauthorized access to the data, the need for new encryption algorithms has also gone high. This paper proposed a hybrid encryption scheme which uses ElGamal key exchange algorithm and Genetic algorithms. In this scheme, the users share seventeen 16-bit keys, random in nature, using the ElGamal algorithm, which is used to calculate a shared key. Along with this shared key and MAC(Medium Access Control) addresses of both sender and receiver(MAC is used as it is a unique identifier attached to a network adapter or system), a final key is generated through a 10-round algorithm. Further, this final key is used for data encryption using Genetic algorithms. A new key is generated for each communication session between sender and receiver. The proposed technique shows that it is resistant to most of today’s known and common attacks.
Keywords: Identity-Based Encryption, Genetic Algorithm, Mutation, Crossover.
Scope of the Article: Algorithm Engineering