A novel approach to the design of a new hybrid security protocol architecture

This research paper is simply the gathering of recent developments in the field of Hybrid cryptography and its application in the designing of a hybrid security protocol for online transaction based on Hybrid cryptography. A new security protocol for on-line transaction can be designed using combination of both symmetric and asymmetric cryptographic techniques known as Hybrid cryptography. This protocol serves three very important cryptographic primitives - integrity, confidentiality and authentication. Each of the so called cryptographic primitive is provided or fulfilled by the particular symmetric or asymmetric cryptographic techniques. The symmetric cryptographic algorithms are fast as compared to asymmetric cryptographic algorithms, so when both symmetric and asymmetric algorithms are used in tandem or together in a proper way, then the result is very encouraging in terms of providing high security with fast speed. With the help of this survey paper, we tried to encapsulate all the developments introduce in the designing of new security protocol for On-line transaction and its importance is very much evident from the fact that Communication has a major impact on today's business. It is desired to communicate data with high security and in less amount of time. At present, various types of cryptographic algorithms provide high security to information on controlled networks. These algorithms are required to provide data security and users authenticity. A Hybrid security protocol has been designed for better security using a combination of both symmetric and asymmetric cryptographic algorithms.

[1]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[2]  M.C. Krishna,et al.  Convolution-Based Interpolation Kernels for Reconstruction of High Resolution EMR Images from Low Sampled k-Space Data , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[3]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[4]  Ieee Staff 2014 International Conference on Advanced Communication, Control and Computing Technologies (ICACCCT) , 2014 .

[5]  Alexander May,et al.  New Attacks on RSA with Small Secret CRT-Exponents , 2006, Public Key Cryptography.

[6]  J. Ferrer A new privacy homomorphism and applications , 1996 .

[7]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[8]  Hung-Min Sun,et al.  Dual RSA and Its Security Analysis , 2007, IEEE Transactions on Information Theory.

[9]  Josep Domingo-Ferrer A New Privacy Homomorphism and Applications , 1996, Inf. Process. Lett..

[10]  John B. Kam,et al.  A database encryption system with subkeys , 1981, TODS.

[11]  Baodian Wei,et al.  An AES S-box to increase complexity and cryptographic analysis , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[12]  S. Subasree,et al.  DESIGN OF A NEW SECURITY PROTOCOL USING HYBRID CRYPTOGRAPHY ALGORITHMS , 2010 .

[13]  N. Rajpal,et al.  Design of a New Security Protocol , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[14]  Elaine B. Barker,et al.  Report on the Development of the Advanced Encryption Standard (AES) , 2001, Journal of research of the National Institute of Standards and Technology.

[15]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[16]  R. Schoof Elliptic Curves Over Finite Fields and the Computation of Square Roots mod p , 1985 .