By Topic

Design of new security algorithm: Using hybrid Cryptography architecture

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Dubai, M.J. ; Dept. of Comput. Eng. & Inf. Technol., Atmiya Inst. of Technol. & Sci., Rajkot, India ; Mahesh, T.R. ; Ghosh, P.A.

A computer network is any set of computing nodes which has the ability of exchanging data by interacting with each other meaningfully, allowing resource sharing in a proper manner. The collection of computers is interconnected by communication channels, which need to be secure for better information exchange. This field of networking consists of specialist area of network security adopted by network administrator to prevent and monitor unauthorized access, modification and denial of computer network. To combat the growing problem, security professionals are in search of better protection. Security Attacks compromises the security and hence various Symmetric and Asymmetric cryptographic algorithms have been proposed to achieve the security service in the proper manner, such as Authentication, Confidentiality, Integrity, Non-Repudiation and Availability. These algorithms are required to provide data security and users authenticity. To improve the strength of these security algorithms, a new security algorithm can be designed using combination of both symmetric and asymmetric cryptographic techniques. This algorithm provides three cryptographic primitives such as integrity, confidentiality and authentication. This can be achieved by the combinatorial effect of Elliptic Curve Cryptography implemented by ECDH and ECDSA, Dual RSA and Hash algorithm implemented by Message Digest 5. This new security algorithm has been designed for better security with integrity using a combination of both symmetric and asymmetric cryptographic techniques.

Published in:

Electronics Computer Technology (ICECT), 2011 3rd International Conference on  (Volume:5 )

Date of Conference:

8-10 April 2011