CFP last date
20 December 2024
Reseach Article

Policy for Secure Communication using Hybrid Encryption Algorithm

by Amrita Jain, Vivek Kapoor
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 125 - Number 10
Year of Publication: 2015
Authors: Amrita Jain, Vivek Kapoor
10.5120/ijca2015906035

Amrita Jain, Vivek Kapoor . Policy for Secure Communication using Hybrid Encryption Algorithm. International Journal of Computer Applications. 125, 10 ( September 2015), 16-20. DOI=10.5120/ijca2015906035

@article{ 10.5120/ijca2015906035,
author = { Amrita Jain, Vivek Kapoor },
title = { Policy for Secure Communication using Hybrid Encryption Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 125 },
number = { 10 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 16-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume125/number10/22468-2015906035/ },
doi = { 10.5120/ijca2015906035 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:15:40.974180+05:30
%A Amrita Jain
%A Vivek Kapoor
%T Policy for Secure Communication using Hybrid Encryption Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 125
%N 10
%P 16-20
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Secure communication in network environment is primary requirement to access remote resources in a controlled and efficient way. For validation and authentication in e-banking and e-commerce transactions, digital signatures using public key cryptography is extensively employed. To maintain confidentiality, Digital Envelope, which is the combination of the encrypted message and signature with the encrypted symmetric key, is also used. This research paper has proposed to develop a hybrid technique using Symmetric & Asymmetric key cryptography. It will also include Message authentication code to maintain integrity of message. Therefore, proposed model will not only help to maintain confidentiality and authentication of message and user but integrity of data too. Java technology has been proposed to validate the performance of proposed model in context of message length, key length, cipher text length and computational time for encryption and decryption.

References
  1. Elichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval and Jacques Stern, RSAOAEP is secure under the RSA assumption, Journal of Cryptology, 2002
  2. Adrian Perrig, RobetSzewczyk, Victor Wen, David Culler and J.D. Tygar,SPINS: Security protocols for sensor networks, Mobile Computing and Networking, Rome, Italy, 2001
  3. Lai, Xuejia, and Massey, James L., A Proposal for a New Block Encryption Standard, Advances in Cryptology - EUROCRYPT ’90, Lecture Notes in Computer Science, Springer-Verlag, 1991:389-404.
  4. Menezes, A., van Oorschot, P., and Vanstone, S. 1996. Handbook of Applied Cryptography.
  5. CRC Press. This book may downloaded from http://www.cacr.math.uwaterloo.ca/hac/ Giuseppe Ateniese, Michael Steiner, and Gene Tsudik, New multipartyauthentication services and key agreement protocols, IEEE Journal of Selected Areas in Communication, 18(4), 2000.
  6. Anand Krishnamurthy, Yiyan Tang, Cathy Xu and Yuke Wang, An efficient implementation of multi-prime RSA on DSP processor, University of Texas, Texas, USA,2002.
  7. David Pointcheval and Jacques Stern, Security proofs for signature schemes, EUROCRYPT ’96, Zaragoza, Spain, 1996.
  8. Bruce Scheneir, Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition.
  9. Adrian Perrig, RobetSzewczyk, Victor Wen, David Culler and J.D. Tygar,SPINS: Security protocols for sensor networks, Mobile Computing and Networking, Rome, Italy, 2001
  10. Lai, Xuejia, and Massey, James L., A Proposal for a New Block Encryption Standard, Advances in Cryptology - EUROCRYPT ’90
  11. Lecture Notes in Computer Science, Springer-Verlag, 1991:389-404. Menezes, A., van Oorschot, P., and Vanstone, S. 1996. Handbook of Applied Cryptography.
  12. Anand Krishnamurthy, Yiyan Tang, Cathy Xu and Yuke Wang, An efficient implementation of multi-prime RSA on DSP processor, University of Texas, Texas, USA,2002.
  13. David Pointcheval and Jacques Stern, Security proofs for signature schemes, EUROCRYPT ’96, Zaragoza, Spain, 1996.
  14. AtulKahate,Cryptography and Network Security, Tata McGraw-Hill Publication Company Limited.
  15. Prasad S. Halgaonkar, Sukmal ,V.M. Wadhai,” A review of Technology,Tags applications and security”,2013.
  16. Tarek Salah Sobh and Mohammad IbrahiemAmer,”PGP Modificaion for securing Digital Envelope mail using COM+ and Web Services”,2011.
  17. Brian LaMcchia, Kristin lauter, Anton Mityagin,”Strong security of Authentication key Exchange”,2013.
  18. Ravi Kishore Kodali,NarasimhaSarma,”Low energy Digital Envelope Model for WSN’s”,2014.
Index Terms

Computer Science
Information Sciences

Keywords

Hybrid Secure Communication RSA MAC Symmetric Key.