A Performance-Centric Comparative Study of Hybrid Security Protocol Architectures

This research paper contains a performance-based comparative study of a new Hybrid security protocol architecture for online transaction. This protocol is designed using combination of both symmetric and asymmetric cryptographic techniques known as Hybrid cryptography. This protocol serves three very important cryptographic primitives—integrity, confidentiality, and authentication. Each of the so-called cryptographic primitives is provided or fulfilled by the particular symmetric or asymmetric cryptographic techniques. The symmetric cryptographic algorithms are fast compared to asymmetric cryptographic algorithms, so when both symmetric and asymmetric algorithms are used in tandem or together in a proper way, the result is very encouraging in terms of providing high security with fast speed. This research paper simply showcases that the proposed protocol architecture is better than the relevant or recent protocol architecture in terms of execution time and security.

[1]  J. Ferrer A new privacy homomorphism and applications , 1996 .

[2]  S. Subasree,et al.  DESIGN OF A NEW SECURITY PROTOCOL USING HYBRID CRYPTOGRAPHY ALGORITHMS , 2010 .

[3]  Alexander May,et al.  New Attacks on RSA with Small Secret CRT-Exponents , 2006, Public Key Cryptography.

[4]  A. Sinhal,et al.  A novel approach to the design of a new hybrid security protocol architecture , 2012, 2012 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT).

[5]  Hung-Min Sun,et al.  Dual RSA and Its Security Analysis , 2007, IEEE Transactions on Information Theory.

[6]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[7]  Baodian Wei,et al.  An AES S-box to increase complexity and cryptographic analysis , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[8]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[9]  M. Hemalatha,et al.  A design of security protocol using hybrid encryption technique (AES-Rijndael and RSA) , 2009 .

[10]  John B. Kam,et al.  A database encryption system with subkeys , 1981, TODS.