Preview

Design of a New Security Protocol Using Hybrid Cryptography Algorithms

Powerful Essays
Open Document
Open Document
3590 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Design of a New Security Protocol Using Hybrid Cryptography Algorithms
Subasree & Sakthivel ● Design of a New Security Protocol

IJRRAS 2 (2) ● February 2010

DESIGN OF A NEW SECURITY PROTOCOL USING HYBRID
CRYPTOGRAPHY ALGORITHMS
S. Subasree and N. K. Sakthivel
School of Computing, Sastra University,
Thanjavur – 613401, Tamil Nadu, INDIA.

ABSTRACT
A Computer Network is an interconnected group of autono mous computing nodes, which use a well defined, mutually agreed set of rules and conventions known as protocols, interact with one -another meaningfully and allow resource sharing preferably in a predictable and controllable manner. Communication has a majo r impact on today‟s business. It is desired to communicate data with high security. Security Attacks compromises the security and hence various Symmetric and Asymmetric cryptographic algorithms have been proposed to achieve the security services such as Authentication, Confidentiality, Integrity, Non-Repudiation and Availability. At present, various types of cryptographic algorithms provide high security to information on controlled networks. These algorithms are required to provide data security and users authenticity. To improve the strength of these security algorithms, a new security protocol for on line transaction can be designed using combination of both symmetric and asymmetric cryptographic techniques. This protocol provides three cryptographic pr imitives such as integrity, confidentiality and authentication. These three primitives can be achieved with the help of Elliptic Curve Cryptography, Dual -RSA algorithm and Message Digest MD5. That is it uses Elliptic Curve Cryptography for encryption, Dual -RSA algorithm for authentication and MD-5 for integrity. This new security protocol has been designed for better security with integrity using a combination of both symmetric and asymmetric cryptographic techniques.
Keywords: Network Security, Elliptic Curve Cryptography, Dual-RSA, Message Digest-5.
1. INTRODUCTION
Curiosity is one of the most common



References: Advances in Cryptology, Crypto ‟05, pages 194-203, Springer-Verlag, 2005. B. den Boer and A. Bosselaers, “Collisions for the compression function of MD5”, Advances in Cryptology, Eurocrypt „07, pages 293-304, Springer-Verlag, 2007. E. Jochemsz and A. May, “A polynomial time attack on standard RSA with private CRT -exponents”, 2007. Applied Cryptographic Research, Technical Report CACR 2005 -35, 2005 [Online]. Available: http://www.cacr.math.uwaterloo.ca/techreports/2005/cacr2005 -35.pdf 2004), 6th International Workshop, pages 119 –132, 2004. [12] Ravindra Kumar Chahar and et.al., “ Design of a new Security Protocol”, IEEE International Conference on Computational Intelligence and Multimedia Applications, pp 132 – 134, 2007 [13] Ramaraj, E and Karthikeyan, S, “ A Design of Enhanced Security Protocol for Wireless Communication using Hybrid Encryption Technique, Indian Journal of Computing Technology, pp 22 -29, May, 2006.

You May Also Find These Documents Helpful

Related Topics