Design of New Security Protocol

Download Now
Provided by: Creative Commons
Topic: Security
Format: PDF
A new security protocol for on-line-transaction can be designed using combination of both symmetric and asymmetric cryptographic techniques. This protocol provides three cryptographic primitives - integrity, confidentiality and authentication. It uses Elliptic Curve Cryptography (ECC) for encryption, RSA algorithm for authentication and MD-5 for integrity. Instead of ECC symmetric cipher can be used to encrypt, public key cryptography to authenticate and MD-5 to check for integrity. The symmetric cryptographic algorithms are fast as compared to asymmetric cryptographic algorithms like RSA, Elliptic Curve Cryptography (ECC). Communication has a major impact on today's business.
Download Now

Find By Topic