• DocumentCode
    3545773
  • Title

    A novel approach to the design of a new hybrid security protocol architecture

  • Author

    Bhatele, Kirtiraj ; Sinhal, Amit ; Pathak, Mayank

  • Author_Institution
    Dept. of IT, TIT Coll., Bhopal, India
  • fYear
    2012
  • fDate
    23-25 Aug. 2012
  • Firstpage
    429
  • Lastpage
    433
  • Abstract
    This research paper is simply the gathering of recent developments in the field of Hybrid cryptography and its application in the designing of a hybrid security protocol for online transaction based on Hybrid cryptography. A new security protocol for on-line transaction can be designed using combination of both symmetric and asymmetric cryptographic techniques known as Hybrid cryptography. This protocol serves three very important cryptographic primitives - integrity, confidentiality and authentication. Each of the so called cryptographic primitive is provided or fulfilled by the particular symmetric or asymmetric cryptographic techniques. The symmetric cryptographic algorithms are fast as compared to asymmetric cryptographic algorithms, so when both symmetric and asymmetric algorithms are used in tandem or together in a proper way, then the result is very encouraging in terms of providing high security with fast speed. With the help of this survey paper, we tried to encapsulate all the developments introduce in the designing of new security protocol for On-line transaction and its importance is very much evident from the fact that Communication has a major impact on today´s business. It is desired to communicate data with high security and in less amount of time. At present, various types of cryptographic algorithms provide high security to information on controlled networks. These algorithms are required to provide data security and users authenticity. A Hybrid security protocol has been designed for better security using a combination of both symmetric and asymmetric cryptographic algorithms.
  • Keywords
    cryptographic protocols; data integrity; data privacy; transaction processing; asymmetric cryptographic techniques; controlled networks; data authentication; data communication security; data confidentiality; data integrity; hybrid cryptographic primitives; hybrid security protocol architecture design; online transaction; symmetric cryptographic techniques; user authenticity; Abstracts; Computer architecture; Cryptography; AES; DUAL RSA; ECC; Hybrid cryptography; MD5; RSA;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Advanced Communication Control and Computing Technologies (ICACCCT), 2012 IEEE International Conference on
  • Conference_Location
    Ramanathapuram
  • Print_ISBN
    978-1-4673-2045-0
  • Type

    conf

  • DOI
    10.1109/ICACCCT.2012.6320816
  • Filename
    6320816