Title :
Design of a New Security Protocol
Author :
Chahar, R.K. ; Datta, Chahar Goutam ; Rajpal, Navin
Author_Institution :
Lingaya´´s Inst. of Manage. & Technol., Faridabad
Abstract :
A new security protocol for on-line transaction can be designed using combination of both symmetric and asymmetric cryptographic techniques. This protocol provides three cryptographic primitives - integrity, confidentiality and authentication. It uses elliptic curve cryptography for encryption, RSA algorithm for authentication and MD-5 for integrity. Instead of ECC symmetric cipher (AES-Rijndael) can be used to encrypt, public key cryptography (RSA) to authenticate and MD-5 to check for integrity. The symmetric cryptographic algorithms are fast as compared to asymmetric cryptographic algorithms like RSA, elliptic curve cryptography. Communication has a major impact on today´s business. It is desired to communicate data with high security. At present, various types of cryptographic algorithms provide high security to information on controlled networks. These algorithms are required to provide data security and users authenticity. A new security protocol has been designed for better security using a combination of both symmetric and asymmetric cryptographic techniques.
Keywords :
cryptographic protocols; public key cryptography; asymmetric cryptographic technique; elliptic curve cryptography; on-line transaction; public key cryptography; security protocol; symmetric cipher; symmetric cryptographic technique; Authentication; Cryptographic protocols; Data security; Elliptic curve cryptography; Elliptic curves; Galois fields; Information security; Public key; Public key cryptography; Technology management;
Conference_Titel :
Conference on Computational Intelligence and Multimedia Applications, 2007. International Conference on
Conference_Location :
Sivakasi, Tamil Nadu
Print_ISBN :
0-7695-3050-8
DOI :
10.1109/ICCIMA.2007.147