Abstract

A new security protocol for on-line transaction can be designed using combination of both symmetric and asymmetric cryptographic techniques. This protocol provides three cryptographic primitives - integrity, confidentiality and authentication. It uses elliptic curve cryptography for encryption, RSA algorithm for authentication and MD-5 for integrity. Instead of ECC symmetric cipher (AES-Rijndael) can be used to encrypt, public key cryptography (RSA) to authenticate and MD-5 to check for integrity. The symmetric cryptographic algorithms are fast as compared to asymmetric cryptographic algorithms like RSA, elliptic curve cryptography. Communication has a major impact on today's business. It is desired to communicate data with high security. At present, various types of cryptographic algorithms provide high security to information on controlled networks. These algorithms are required to provide data security and users authenticity. A new security protocol has been designed for better security using a combination of both symmetric and asymmetric cryptographic techniques.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call