Abstract
This research paper contains a performance-based comparative study of a new Hybrid security protocol architecture for online transaction. This protocol is designed using combination of both symmetric and asymmetric cryptographic techniques known as Hybrid cryptography. This protocol serves three very important cryptographic primitives—integrity, confidentiality, and authentication. Each of the so-called cryptographic primitives is provided or fulfilled by the particular symmetric or asymmetric cryptographic techniques. The symmetric cryptographic algorithms are fast compared to asymmetric cryptographic algorithms, so when both symmetric and asymmetric algorithms are used in tandem or together in a proper way, the result is very encouraging in terms of providing high security with fast speed. This research paper simply showcases that the proposed protocol architecture is better than the relevant or recent protocol architecture in terms of execution time and security.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Stallings W (2003) Cryptography and network security—principles and practices, 3rd edn. Pearson Education Asia
Domingo-Ferrer J, Herrera-Joancomarti J (1996) New privacy homomorphism and applications. Inf Process Lett 60(5):277–282
Schneier B (1996) Applied cryptography, 2nd edn. Wiley, New York
Dabida GI, Wells DB, Kam JB (1981) A database encryption system with subkeys[J]. ACM Trans Database Syst 6(2):192–199
Jingmei L, Baodian W, Xiangguo C, et al (2005) An AES to increase complexity and cryptographic analysis[C]. In: 19th International conference on advanced information networking and applications, pp 724–728
Subasree S, Sakthivel NK (2010) Design of a new security protocol using hybrid cryptography algorithm, IJRRAS (2 Feb 2010)
Sun H-M (2007) Dual RSA and its security analysis. IEEE Trans Inf Theory 53(8):2922–2933
Bleichenbacher D, May A (2006) New attacks on RSA with small CRT exponent in public key cryptography, PKC 2006. Lecture notes in computer science, vol 3968. Springer, Heidelberg, pp 1–13
Rivest R (1992) The MD5 message-digest algorithm, RFC 1321
Ramaraj E, Karthikeyan S (2011) A design of enhanced security protocol for wireless communication using hybrid encryption technique (AES—Rijndael and RSA), India
Bhatele K, Sinhal A, Pathak M (2012) A novel approach to the design of a new Hybrid security protocol Architecture. IEEE ICACCCT conference at Ramanathapuram, Tamil Nadu, India
Dubal MJ, Mahesh TR, Ghosh PA (2011) Design of new security algorithm using hybrid cryptographic architecture. IEEE (ICECT 2011) 1:1–428
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer India
About this paper
Cite this paper
Bhatele, K., Sinhal, A., Pathak, M. (2013). A Performance-Centric Comparative Study of Hybrid Security Protocol Architectures. In: Kumar, V., Bhatele, M. (eds) Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012). Lecture Notes in Bioengineering. Springer, India. https://doi.org/10.1007/978-81-322-0970-6_26
Download citation
DOI: https://doi.org/10.1007/978-81-322-0970-6_26
Published:
Publisher Name: Springer, India
Print ISBN: 978-81-322-0969-0
Online ISBN: 978-81-322-0970-6
eBook Packages: EngineeringEngineering (R0)