Open Access   Article Go Back

A New Security Protocol Using Hybrid Cryptography Algorithms

Darshan Bhole1 , Aditi Mote2 , Rachana Patil3

Section:Review Paper, Product Type: Conference Paper
Volume-04 , Issue-02 , Page no. 18-22, Apr-2016

Online published on May 10, 2016

Copyright © Darshan Bhole, Aditi Mote, Rachana Patil . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Darshan Bhole, Aditi Mote, Rachana Patil , “A New Security Protocol Using Hybrid Cryptography Algorithms,” International Journal of Computer Sciences and Engineering, Vol.04, Issue.02, pp.18-22, 2016.

MLA Style Citation: Darshan Bhole, Aditi Mote, Rachana Patil "A New Security Protocol Using Hybrid Cryptography Algorithms." International Journal of Computer Sciences and Engineering 04.02 (2016): 18-22.

APA Style Citation: Darshan Bhole, Aditi Mote, Rachana Patil , (2016). A New Security Protocol Using Hybrid Cryptography Algorithms. International Journal of Computer Sciences and Engineering, 04(02), 18-22.

BibTex Style Citation:
@article{Bhole_2016,
author = {Darshan Bhole, Aditi Mote, Rachana Patil },
title = {A New Security Protocol Using Hybrid Cryptography Algorithms},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2016},
volume = {04},
Issue = {02},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {18-22},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=44},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=44
TI - A New Security Protocol Using Hybrid Cryptography Algorithms
T2 - International Journal of Computer Sciences and Engineering
AU - Darshan Bhole, Aditi Mote, Rachana Patil
PY - 2016
DA - 2016/05/10
PB - IJCSE, Indore, INDIA
SP - 18-22
IS - 02
VL - 04
SN - 2347-2693
ER -

           

Abstract

A Computer Network is an interconnected group of autonomous computing nodes, which use a well-defined, mutually agreed set of rules and conventions known as protocols, interact with one-another meaningfully and allow resource sharing preferably in a predictable and controllable manner. Communication has a major impact on today’s business. It is desired to communicate data with high security. Security Attacks compromises the security and hence various Symmetric and Asymmetric cryptographic algorithms have been proposed to achieve the security services such as Authentication, Confidentiality, Integrity, Non-Repudiation and Availability.At present, various types of cryptographic algorithms provide high security to information on controlled networks. These algorithms are required to provide data security and users authenticity.To improve the strength of these security algorithms, a new security protocol for online transaction can be designed using combination of both symmetric and asymmetric cryptographic techniques. This protocol provides three cryptographic primitives such as integrity, confidentiality and authentication. These three primitives can be achieved with the help of Advance Encryption Standard,Elliptic Curve Cryptography,XOR-Dual RSA algorithm and Message Digest MD5. It uses Elliptic Curve Cryptography and Advance Encryption both for encryption,XOR-Dual RSA algorithm for authentication and MD-5 for integrity. This new security protocol has been designed for better security with integrity using a combination of both symmetric and asymmetric cryptographic techniques.

Key-Words / Index Term

Advanced Encryption Standard;Cryptography;Message Digest-5;WSN,XOR-Dual RSA

References

[1] Dan Boneh and Glenn Durfee. Cryptanalysis of rsa with private key d less than n 0.292. Information Theory, IEEE Transactions on, 46(4):1339–1349, 2000.
[2] Ravi Kishore Kodali and NVS Narasimha Sarma. Energy efficient ecc encryption using ecdh. In Emerging Research in Electronics, Computer Science and Technology, volume248, pages 471–478. Springer, 2014.
[3] N. Kumar. A secure communication wireless sensor networks through hybrid (aes+ecc) algorithm. von LAP LAMBERT Academic Publishing, 386, 2012.
[4] Mewada, Shivlal, Pradeep Sharma, and S. S. Gautam. "Classification of Efficient Symmetric Key Cryptography Algorithms" International Journal of Computer Science and Information Security, Vol-14, No-2 (2016): 105-110.
[5] T. R. Mahesh M. J. Dubal and P. A. Ghosh. Design of a new security protocol using hybrid cryptography algorithms. In Proceedings of 3rd International Conference on Electronics Computer Technology (ICECT), 5), year=2010.
[6] Wuling Ren and Zhiqian Miao. A hybrid encryption algorithm based on des and rsa in Bluetooth communication. In Modeling, Simulation and Visualization Methods (WMSVM), 2010 Second International Conference on, pages 221–225. IEEE, 2010.
[7] S Subasree and NK Sakthivel. Design of a new security protocol using hybrid cryptography.
[8] Hung-Min Sun, Mu-En Wu, Wei-Chi Ting, and M Jason Hinek. Dual rsa and its security analysis. Information Theory, IEEE Transactions on, 53(8):2922–2933, 2007.
[9] Stefan Tillich and Johann Großsch¨adl. Accelerating aes using instruction set extensions for elliptic curve cryptography. In Computational Science and Its Applications–ICCSA 2005, pages 665–675. Springer, 2005.
[10] Shi-hai Zhu. Research of hybrid cipher algorithm application to hydraulic information transmission. In Electronics, Communications and Control (ICECC), 2011 International Conference on, pages 3873–3876. IEEE, 2011.