Authors :
Vemula Sai; Medikonda Jhoshna; Prasanna Guduru; R. J. Ramasree
Volume/Issue :
Volume 11 - 2026, Issue 3 - March
Google Scholar :
https://tinyurl.com/y4j8e28k
Scribd :
https://tinyurl.com/ypre3jwd
DOI :
https://doi.org/10.38124/ijisrt/26mar1753
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
In the proposed hybrid encryption scheme, Blowfish is utilised for encrypting the actual medical data because of
its fast and computationally efficient symmetric encryption mechanism. Symmetric encryption algorithms require only one
secret key for both encryption and decryption purposes, making them highly efficient for processing large amounts of data
like patient records, reports, and medical data. Blowfish, functioning in the CBC mode, ensures the secure conversion of the
plaintext to ciphertext with high performance and low processing cost.
Conversely, RSA is utilized for encrypting and securely transmitting the Blowfish secret key. As RSA is an asymmetric
encryption algorithm, it requires a public-private key pair, thereby completely eliminating the key distribution issue often
encountered in symmetric encryption algorithms. By encrypting the symmetric key with RSA using secure padding like
PKCS#1 OAEP, the proposed scheme ensures that only the intended recipient can decrypt the secret key. This hybrid
encryption scheme effectively leverages the speed of symmetric encryption algorithms with the secure key exchange
mechanism of asymmetric cryptography, thereby providing both efficiency and security.
Keywords :
Hybrid Cryptography, Medical Data Security, Dual-Layer Encryption, Role-Based Access Control, Data Confidentiality, Integrity Verification, Secure Healthcare Systems.
References :
- IBM Security, “Cost of a Data Breach Report 2023,” IBM Corporation, 2023.
- World Health Organisation, “Global Strategy on Digital Health 2020–2025,” WHO Press, 2021.
- William Stallings, Cryptography and Network Security: Principles and Practice, 7th ed., Pearson, 2017.
- Douglas R. Stinson, Cryptography: Theory and Practice, 3rd ed., CRC Press, 2005.
- Bruce Schneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish),” Fast Software Encryption, 1993.
- Ron Rivest, Adi Shamir, and Leonard Adleman, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
- National Institute of Standards and Technology, “Secure Hash Standard (SHS), FIPS PUB 180-4,” 2015.
- National Institute of Standards and Technology, “Post-Quantum Cryptography Standardization,” 2022.
- Cybersecurity and Infrastructure Security Agency, “Healthcare and Public Health Sector Cybersecurity Report,” 2022.
- A. Kumar and S. Singh, “A Secure Hybrid Encryption Approach for Healthcare Data Protection,” International Journal of Computer Applications, vol. 182, no. 10, pp. 25–30, 2018.
- M. Patel and R. Shah, “Hybrid Cryptography-Based Secure Data Sharing in Cloud Healthcare Systems,” Journal of Information Security and Applications, vol. 45, pp. 150–158, 2019.
- C. H. Lee, K. H. Lim, and S. Eswaran, “Secure healthcare data processing using homomorphic encryption: challenges and solutions,” Discover Public Health, vol. 22, pp. 1–15, 2025.
- W. Stallings, Cryptography and Network Security: Principles and Practice, 7th ed., Pearson Education, 2017.
- B. Schneier, “Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish),” Fast Software Encryption, Springer, pp. 191–204, 1994.
- R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
- K. V. Saravanan and G. Sakthi Priya, “Hybrid Blowfish cryptography with elliptic curve Diffie–Hellman key exchange protocol for enhancing data security,” Discover Electronics, 2025.
- A. Shafique et al., “Hybrid encryption framework for secure transmission of medical images in IoT-based telemedicine networks,” Scientific Reports, vol. 14, 2024.
- P. Yanez and N. Yadav, “Homomorphic encryption for secure healthcare artificial intelligence applications,” Discover Artificial Intelligence, 2026.
- P. Venkataradha krishnamurty and K. Malathi, “Blockchain-based secure healthcare data management framework,” Scientific Reports, 2025.
In the proposed hybrid encryption scheme, Blowfish is utilised for encrypting the actual medical data because of
its fast and computationally efficient symmetric encryption mechanism. Symmetric encryption algorithms require only one
secret key for both encryption and decryption purposes, making them highly efficient for processing large amounts of data
like patient records, reports, and medical data. Blowfish, functioning in the CBC mode, ensures the secure conversion of the
plaintext to ciphertext with high performance and low processing cost.
Conversely, RSA is utilized for encrypting and securely transmitting the Blowfish secret key. As RSA is an asymmetric
encryption algorithm, it requires a public-private key pair, thereby completely eliminating the key distribution issue often
encountered in symmetric encryption algorithms. By encrypting the symmetric key with RSA using secure padding like
PKCS#1 OAEP, the proposed scheme ensures that only the intended recipient can decrypt the secret key. This hybrid
encryption scheme effectively leverages the speed of symmetric encryption algorithms with the secure key exchange
mechanism of asymmetric cryptography, thereby providing both efficiency and security.
Keywords :
Hybrid Cryptography, Medical Data Security, Dual-Layer Encryption, Role-Based Access Control, Data Confidentiality, Integrity Verification, Secure Healthcare Systems.