A Performance-Centric Comparative Study of Hybrid Security Protocol Architectures

Conference paper
Part of the Lecture Notes in Bioengineering book series (LNBE)


This research paper contains a performance-based comparative study of a new Hybrid security protocol architecture for online transaction. This protocol is designed using combination of both symmetric and asymmetric cryptographic techniques known as Hybrid cryptography. This protocol serves three very important cryptographic primitives—integrity, confidentiality, and authentication. Each of the so-called cryptographic primitives is provided or fulfilled by the particular symmetric or asymmetric cryptographic techniques. The symmetric cryptographic algorithms are fast compared to asymmetric cryptographic algorithms, so when both symmetric and asymmetric algorithms are used in tandem or together in a proper way, the result is very encouraging in terms of providing high security with fast speed. This research paper simply showcases that the proposed protocol architecture is better than the relevant or recent protocol architecture in terms of execution time and security.


Hybrid cryptography ECC AES Dual RSA MD5 


  1. 1.
    Stallings W (2003) Cryptography and network security—principles and practices, 3rd edn. Pearson Education AsiaGoogle Scholar
  2. 2.
    Domingo-Ferrer J, Herrera-Joancomarti J (1996) New privacy homomorphism and applications. Inf Process Lett 60(5):277–282CrossRefGoogle Scholar
  3. 3.
    Schneier B (1996) Applied cryptography, 2nd edn. Wiley, New YorkGoogle Scholar
  4. 4.
    Dabida GI, Wells DB, Kam JB (1981) A database encryption system with subkeys[J]. ACM Trans Database Syst 6(2):192–199Google Scholar
  5. 5.
    Jingmei L, Baodian W, Xiangguo C, et al (2005) An AES to increase complexity and cryptographic analysis[C]. In: 19th International conference on advanced information networking and applications, pp 724–728Google Scholar
  6. 6.
    Subasree S, Sakthivel NK (2010) Design of a new security protocol using hybrid cryptography algorithm, IJRRAS (2 Feb 2010)Google Scholar
  7. 7.
    Sun H-M (2007) Dual RSA and its security analysis. IEEE Trans Inf Theory 53(8):2922–2933Google Scholar
  8. 8.
    Bleichenbacher D, May A (2006) New attacks on RSA with small CRT exponent in public key cryptography, PKC 2006. Lecture notes in computer science, vol 3968. Springer, Heidelberg, pp 1–13Google Scholar
  9. 9.
    Rivest R (1992) The MD5 message-digest algorithm, RFC 1321Google Scholar
  10. 10.
    Ramaraj E, Karthikeyan S (2011) A design of enhanced security protocol for wireless communication using hybrid encryption technique (AES—Rijndael and RSA), IndiaGoogle Scholar
  11. 11.
    Bhatele K, Sinhal A, Pathak M (2012) A novel approach to the design of a new Hybrid security protocol Architecture. IEEE ICACCCT conference at Ramanathapuram, Tamil Nadu, IndiaGoogle Scholar
  12. 12.
    Dubal MJ, Mahesh TR, Ghosh PA (2011) Design of new security algorithm using hybrid cryptographic architecture. IEEE (ICECT 2011) 1:1–428 Google Scholar

Copyright information

© Springer India 2013

Authors and Affiliations

  1. 1.Department of ITTIT CollegeBhopalIndia
  2. 2.Department of CSETIT CollegeBhopalIndia

Personalised recommendations