Skip to main content

A Performance-Centric Comparative Study of Hybrid Security Protocol Architectures

  • Conference paper
  • First Online:
  • 959 Accesses

Part of the book series: Lecture Notes in Bioengineering ((LNBE))

Abstract

This research paper contains a performance-based comparative study of a new Hybrid security protocol architecture for online transaction. This protocol is designed using combination of both symmetric and asymmetric cryptographic techniques known as Hybrid cryptography. This protocol serves three very important cryptographic primitives—integrity, confidentiality, and authentication. Each of the so-called cryptographic primitives is provided or fulfilled by the particular symmetric or asymmetric cryptographic techniques. The symmetric cryptographic algorithms are fast compared to asymmetric cryptographic algorithms, so when both symmetric and asymmetric algorithms are used in tandem or together in a proper way, the result is very encouraging in terms of providing high security with fast speed. This research paper simply showcases that the proposed protocol architecture is better than the relevant or recent protocol architecture in terms of execution time and security.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Stallings W (2003) Cryptography and network security—principles and practices, 3rd edn. Pearson Education Asia

    Google Scholar 

  2. Domingo-Ferrer J, Herrera-Joancomarti J (1996) New privacy homomorphism and applications. Inf Process Lett 60(5):277–282

    Article  Google Scholar 

  3. Schneier B (1996) Applied cryptography, 2nd edn. Wiley, New York

    Google Scholar 

  4. Dabida GI, Wells DB, Kam JB (1981) A database encryption system with subkeys[J]. ACM Trans Database Syst 6(2):192–199

    Google Scholar 

  5. Jingmei L, Baodian W, Xiangguo C, et al (2005) An AES to increase complexity and cryptographic analysis[C]. In: 19th International conference on advanced information networking and applications, pp 724–728

    Google Scholar 

  6. Subasree S, Sakthivel NK (2010) Design of a new security protocol using hybrid cryptography algorithm, IJRRAS (2 Feb 2010)

    Google Scholar 

  7. Sun H-M (2007) Dual RSA and its security analysis. IEEE Trans Inf Theory 53(8):2922–2933

    Google Scholar 

  8. Bleichenbacher D, May A (2006) New attacks on RSA with small CRT exponent in public key cryptography, PKC 2006. Lecture notes in computer science, vol 3968. Springer, Heidelberg, pp 1–13

    Google Scholar 

  9. Rivest R (1992) The MD5 message-digest algorithm, RFC 1321

    Google Scholar 

  10. Ramaraj E, Karthikeyan S (2011) A design of enhanced security protocol for wireless communication using hybrid encryption technique (AES—Rijndael and RSA), India

    Google Scholar 

  11. Bhatele K, Sinhal A, Pathak M (2012) A novel approach to the design of a new Hybrid security protocol Architecture. IEEE ICACCCT conference at Ramanathapuram, Tamil Nadu, India

    Google Scholar 

  12. Dubal MJ, Mahesh TR, Ghosh PA (2011) Design of new security algorithm using hybrid cryptographic architecture. IEEE (ICECT 2011) 1:1–428

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kirtiraj Bhatele .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer India

About this paper

Cite this paper

Bhatele, K., Sinhal, A., Pathak, M. (2013). A Performance-Centric Comparative Study of Hybrid Security Protocol Architectures. In: Kumar, V., Bhatele, M. (eds) Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012). Lecture Notes in Bioengineering. Springer, India. https://doi.org/10.1007/978-81-322-0970-6_26

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-0970-6_26

  • Published:

  • Publisher Name: Springer, India

  • Print ISBN: 978-81-322-0969-0

  • Online ISBN: 978-81-322-0970-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics