ISSN: 2348 9510 International Journal Of Core Engineering & Management(IJCEM) Volume 1, Issue 3, June 2014 126 Implementation Of Hybrid Cryptography Algorithm Mr. Mahavir Jain 1 M.E. Student, IET DAVV Indore, M.P. E-mail id:- e2zinfo@gmail.com Mr. Arpit Agrawal Asst. Professor, IET DAVV Indore, M.P. Abstract Internet is a public-interacted system; the amount of information exchanged over the internet is completely not safe. Protecting the information transmitted over the network is a difficult task and the data security issues become increasingly important. In recent years, a controversy has arisen over so-called strong encryption. This refers to ciphers that are essentially unbreakable without the decryption keys. While most companies and their customers view it as a means of keeping secrets and minimizing fraud, some governments view strong encryption as a potential vehicle by which terrorists might evade authorities. These governments, including that of the United States, want to set up a key-escrow arrangement. This means everyone who uses a cipher would be required to provide the government with a copy of the key. Decryption keys would be stored in a supposedly secure place, used only by authorities, and used only if backed up by a court order. Opponents of this scheme argue that criminals could hack into the key-escrow database and illegally obtain, steal, or alter the keys. Supporters claim that while this is a possibility, implementing the key escrow scheme would be better than doing nothing to prevent criminals from freely using encryption/decryption. At present, various types of cryptographic algorithms provide high security to information on networks, but they are also have some drawbacks. To improve the strength of these algorithms, we propose a new hybrid cryptographic algorithm in this paper. The algorithm is designed using combination