Abstract

This study proposes a Generic Hybrid Encryption System (HES) under mutual committee of symmetric and asymmetric cryptosystems. Asymmetric (public key) Cryptosystems associates several performance issues like computational incompetence, memory wastages, energy consumptions and employment limitations on bulky data sets but they are quite secure and reliable in key exchange over insecure remote communication channels. Symmetric (private key) cryptosystems are 100 times out performed, having no such issues but they cannot fulfill non-repudiation, false modifications in secret key, fake modifications in cipher text and origin authentication of both parties while exchanging information. These contradictory issues can be omitted by utilizing hybrid encryption mechanisms (symmetric+asymmetric) to get optimal benefits of both schemes. Several hybrid mechanisms are available with different logics but our logic differs in infrastructural design, simplicity, computational efficiency and security as compared to prior hybrid encryption schemes. Some prior schemes are either diversified in performance aspects, customer satisfaction, memory utilization or energy consumptions and some are vulnerable against forgery and password guessing (session key recovery) attacks. We have done some functional and design related changes in existing Public Key Infrastructure (PKI) to achieve simplicity, optimal privacy and more customer satisfaction by providing Hybrid Encryption System (HES) that is able to fulfill all set of standardized security constraints. No such PKI based generic hybrid encryption scheme persists as we have provided in order to manage all these kinds of discussed issues.

Highlights

  • Encryption mechanisms are the backbone of exchanging secure transactions over insecure remote channels

  • The hybrid infrastructure used by the author of study (Ramaraj et al, 2009) is other than the Public Key Infrastructure that is fully vulnerable against forgery and session key recovery attacks as discussed earlier

  • Hybrid Encryption System (HES) is effectively secured in fulfilling of all set of standardized security constraints with hybrid encryption support as evidenced by Table 1

Read more

Summary

Introduction

Encryption mechanisms are the backbone of exchanging secure transactions over insecure remote channels. Encrypting of data mostly concerns with the robustness of encryption methods, achieving of security constraints and processing speed related issues. The actual problem occurs at the time of exchanging encrypted data and key(s) via insecure remote communication channels. The exchange of key is said to be secure if it fulfills the all set of security goals like confidentiality, integrity (false modification, authenticity) and availability (Melia and Elbirt, 2010). Confidentiality concerns with secrecy and privacy which means message should be visible to whom person for which it has been sent. Integrity assures that message is free from fake modifications (false addition or deletion) and it can be further classified into two terms:

Objectives
Methods
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call