
Research Article
Hybrid Encryption Algorithm: Fusion of 3DES and ECC
@INPROCEEDINGS{10.4108/eai.28-4-2025.2358064, author={Tharun A and Govardhan M and Jayachetan P and Abhiram G and Gayathri R}, title={Hybrid Encryption Algorithm: Fusion of 3DES and ECC}, proceedings={Proceedings of the 4th International Conference on Information Technology, Civil Innovation, Science, and Management, ICITSM 2025, 28-29 April 2025, Tiruchengode, Tamil Nadu, India, Part II}, publisher={EAI}, proceedings_a={ICITSM PART II}, year={2025}, month={10}, keywords={hybrid encryption 3des (triple des) ecc (elliptic curve cryptography) symmetric encryption asymmetric encryption secure key exchange cryptography data confidentiality computational efficiency public key infrastructure}, doi={10.4108/eai.28-4-2025.2358064} }
- Tharun A
Govardhan M
Jayachetan P
Abhiram G
Gayathri R
Year: 2025
Hybrid Encryption Algorithm: Fusion of 3DES and ECC
ICITSM PART II
EAI
DOI: 10.4108/eai.28-4-2025.2358064
Abstract
In contemporary cryptographic frameworks, the imperative of achieving secure communication alongside operational efficiency constitutes a fundamental concern. This study introduces an innovative hybrid encryption approach that integrates the advantages of Triple DES (3DES), which is a symmetric encryption technique, with Elliptic Curve Cryptography (ECC), classified as an asymmetric encryption technique. 3DES delivers elevated security levels for the encryption of substantial data quantities, whereas ECC supplies a secure and efficient mechanism for key exchange. The hybrid model uses ECC for secure key exchange and uses 3DES for bulk data encryption, providing both security and speed. The use of two different cryptographic techniques together leads to the improvement in performance of the proposed algorithm, the reduction in complexity of the computations, and strong guarantees for security. This should solve the problems related to scaling issues and the overhead associated with traditional encryption schemes, thus providing a balanced approach to modern cryptographic applications.