Abstract

The easiness of data transmission is one of the information security flaws that needs to be handled rigorously. It makes eavesdropping, tampering and message forgery by malicious more simple. One of the protocols developed to secure communication between the client and the server consists of using Transport Layer Security (TLS). TLS is a cryptographic protocol that allows encryption using record protocol, authentication and data integrity. In this paper, a new TLS version is proposed, named Transport Layer Security with Metaheuristics (TLSM), which is based on a recently designed metaheuristic symmetric ciphering technique for data encryption, combined with hash function SHA-SBOX and a new method for private key exchange. Compared to the existing TLS versions, the suggested protocol outperform all of them in terms of level of security of the encrypted data, key management and execution time.

Highlights

  • Computer communication involving online transactions and payment in exchange for goods and services grew over the last decade drastically

  • 1) Transport Layer Security with Metaheuristics (TLSM) handshake protocol: The proposed TLSM protocol consists of several steps (Fig. 1)

  • Decrypt the received composite data frame EFi,j using the metaheuristic key kH obtained in the handshake protocol, this results in an decrypted frame [Fi, ski,j] = decrypt([EFi,j, kH )

Read more

Summary

INTRODUCTION

Computer communication involving online transactions and payment in exchange for goods and services grew over the last decade drastically. TLS is a cryptographic protocol that provides end-to-end secure communication for different types of applications [12] It was adopted by the IETF and specified as an RFC standard. In order to increase the speed of new connections, in this paper the use of the recently developed symmetrical metaheuristics ciphering technique [4] is suggested in the most sensitive phase of TLS protocol. This technique helps secure messages and private keys (session keys) exchanged between the client and the server. The last section concludes this paper and presents future works

RELATED WORK
Background
TLSM Description
Symmetrical Metaheuristics Ciphering Execution Time
Sha-Sbox Robustness
Meta Secret Key Security Analysis
Key Session Security Analysis
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.