Design of a New Security Protocol
#1

Design of a New Security Protocol
Abstract:

A new security protocol for on- line- transaction can be designed using combination of both symmetric and asymmetric cryptographic techniques . This protocol provides three cryptographic primitives – integrity, confidentiality and authentication. It uses Elliptic Curve Cryptography for encryption, RSA algorithm for authentication and MD-5 for integrity. Instead of ECC symmetric cipher (AES-Rijndael) can be used to encrypt, public key cryptography (RSA) to authenticate and MD-5 to check for integrity .The symmetric cryptographic algorithms are fast as compared to asymmetric cryptographic algorithms like RSA, Elliptic Curve Cryptography. Communication has a major impact on today’s business. It is desired to communicate data with high security. At present, various types of cryptographic algorithms provide high security to information on controlled networks. These algorithms are required to provide data security and
users authenticity. A new security protocol has been designed for better security using a combination of both symmetric and asymmetric cryptographic techniques.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: protocol design, seminar topic for design new security protocol,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Exploring the design space of social network-based Sybil defenses 1 924 15-02-2017, 02:55 PM
Last Post: jaseela123d
  Cloud Computing Security: From Single to Multi-Clouds 1 832 14-02-2017, 04:56 PM
Last Post: jaseela123d
  A New Cell-Counting-Based Attack against Tor 1 726 14-02-2017, 11:26 AM
Last Post: ijasti
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Design of Intranet Mail System nit_cal 14 11,478 19-05-2015, 11:17 AM
Last Post: seminar report asees
  Security system using IP camera mechanical engineering crazy 5 4,378 16-03-2015, 02:52 PM
Last Post: seminar report asees
  Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs Projects9 6 3,580 10-01-2015, 11:13 PM
Last Post: Guest
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,268 19-09-2014, 12:52 AM
Last Post: [email protected]
  Data Security Using Honey Pot System computer science topics 5 6,707 11-09-2014, 07:45 PM
Last Post: erhhk
  Folder Security System computer science topics 6 3,675 29-07-2013, 11:09 AM
Last Post: computer topic

Forum Jump: