CFP last date
15 January 2025
Reseach Article

Security Enhancement Algorithm for Data Transmission using Elliptic Curve Diffie - Hellman Key Exchange

Published on June 2014 by Shaikh Ammarah P., Vikas Kaul, S K Narayankhedkar
International Conference and workshop on Advanced Computing 2014
Foundation of Computer Science USA
ICWAC2014 - Number 2
June 2014
Authors: Shaikh Ammarah P., Vikas Kaul, S K Narayankhedkar
f17aa4c1-8746-4691-b0b8-9ff42e957029

Shaikh Ammarah P., Vikas Kaul, S K Narayankhedkar . Security Enhancement Algorithm for Data Transmission using Elliptic Curve Diffie - Hellman Key Exchange. International Conference and workshop on Advanced Computing 2014. ICWAC2014, 2 (June 2014), 0-0.

@article{
author = { Shaikh Ammarah P., Vikas Kaul, S K Narayankhedkar },
title = { Security Enhancement Algorithm for Data Transmission using Elliptic Curve Diffie - Hellman Key Exchange },
journal = { International Conference and workshop on Advanced Computing 2014 },
issue_date = { June 2014 },
volume = { ICWAC2014 },
number = { 2 },
month = { June },
year = { 2014 },
issn = 2249-0868,
pages = { 0-0 },
numpages = 1,
url = { /proceedings/icwac2014/number2/648-1431/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference and workshop on Advanced Computing 2014
%A Shaikh Ammarah P.
%A Vikas Kaul
%A S K Narayankhedkar
%T Security Enhancement Algorithm for Data Transmission using Elliptic Curve Diffie - Hellman Key Exchange
%J International Conference and workshop on Advanced Computing 2014
%@ 2249-0868
%V ICWAC2014
%N 2
%P 0-0
%D 2014
%I International Journal of Applied Information Systems
Abstract

Data Security for end-end transmission is achieved by many different symmetric and asymmetric techniques for message confidentiality, message authentication and key exchange using transport layer security. This paper presents the combination of two symmetric algorithms AES and Blowfish to enhance security. AES is enhanced by modifying the S-boxes columns, and then combination of enhanced AES and blowfish is used for data confidentiality. Message digest 5 is used for authentication. Key exchange is done using ECDHA, Elliptic Curve Diffe Hellman algorithm. ECDSA is used for digital signature. Performance of this system is evaluated for text file, image file, audio file and video file on the basis of encryption/decryption processing time and throughput.

References
  1. "Network Security", Cisco system, ISOC NTW, 2000.
  2. Ayushi, 2010 "A Symmetric Key Cryptographic Algorithm", International Journal of Computer Applications (0975 - 8887) Volume 1 – No. 15.
  3. Thorsteinson, 2003. "Asymmetric Cryptography", book Page 99 July 29.
  4. Bruce Schneier, 2008 "The Blowfish Encryption Algorithm".
  5. T. Nie, C. Song, X. Zhi 2010 "Performance Evaluation of DES and Blowfish Algorithms", Biomedical Engineering and computer Science International Conference, IEEE.
  6. N. Koblitz. , 1987 "Elliptic curve cryptosystems", Mathematics of Computation", 48, pages 203–209.
  7. M. J. B. Robshaw, Y. Lisa Yin, 1997. "Elliptic Curve Cryptosystems", an RSA Laboratories Technical.
  8. Nadeem, A. , Javed, M. Y. , 2005 "A Performance Comparison of Data Encryption Algorithms," IEEE, Information and Communication Technologies, ICICT, First International Conference, pp. 84- 89.
  9. K. Rege, N. Goenka, P. Bhutada, S. Mane, 2014, "Bluetooth Communication using Hybrid Encryption Algorithm based on AES and RSA", International Journal of Computer applications (0975–8887) Volume 71– No. 2.
  10. D. S. Abdul, Elminaam, H. M. Abdul Kader and M. M. Hadhoud, 2009 "Performance Evaluation of Symmetric Encryption Algorithms" Communications of the IBIMA Volume 8, ISSN: 1943-7765.
  11. A. C. Pamarthy, K. Rajasekha. 2012. " A Hybrid Encryption Algorithm Based on Triple DES and RSA", International Conference on Information Technology, Electronics and Communications (ICITEC).
  12. A. Menezes, P. van Oorschot, S. Vanstone, 1996, "Key Management Techniques," CRC Press.
  13. Malan, David J. , M. Welsh, M. D. Smith, 2004 "A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography". IEEE SECON 2004: 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks: SantaClara, California, 71-80. Piscataway, N. J. IEEE, 4-7.
  14. K. Rege, N. Goenka, P. Bhutada, S. Mane, 2014 "Bluetooth Communication using Hybrid Encryption Algorithm based on AES and RSA", International Journal of Computer Applications (0975 – 8887), Volume 71– No. 22.
  15. R. Ahirwal, M. Ahke 2014 "Elliptic Curve Diffie-Hellman Key Exchange Algorithm for Securing Hypertext Information on Wide Area Network", (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 4 (2), 363 - 368.
  16. A. Chandrasekar, V. R. Rajasekar, V. Vasudevan, "Improved Authentication and Key Agreement Protocol Using Elliptic Curve Cryptography", International Journal of Computer Science and Security (IJCSS), Volume (3), Issue (4).
  17. H. Brar, 2010 "Performance analysis of Point multiplication methods for Elliptic curve".
  18. N. Jansma, B. Arrendondo 2004 "Performance comparison of elliptic curve and RSA digital signatures".
  19. G. M. Bertoni, F. Roberto, L. Breveglieri, F. Regazzoni, 2006 "Speeding Up AES By Extending a 32 bit Processor Instruction Set", Application-specific Systems, Architectures and Processors, IEEE.
  20. Abdel-Karim, Al Tamimi 2006, "Performance Analysis of Data Encryption Algorithms ".
  21. Yu-Jung Huang, Yang-Shih Lin, Kuang-Yu Hung, Kuo-Chen Lin 2006 "Efficient Implementation of AES IP", IEEE.
  22. Subashri T, Arunachalam R, Gokul Vinoth Kumar B, Vaidehi V 2010, "Pipelining Architecture of AES Encryption and Key Generation with Search Based Memory", International journal of VLSI design & Communication Systems (VLSICS) Vol. 1, No. 4.
  23. T. Akishita, T. Takagi 2003 "Zero-Value Point Attacks on Elliptic Curve Cryptosystem".
  24. Izu, T. Takagi, 2003 "Exceptional Procedure Attack on Elliptic Curve Cryptosystems".
  25. I. Verbauwhede, B. Rouzeyre, M. Flottes, G. Di Natale, A. Das and J. Rolt, 2005 "A scan-based attack on Elliptic Curve Cryptosystems in presence of industrial Design-for-Testability structures".
  26. Seyit A. 2007 "Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks", IEEE.
  27. X. Li, J. Chen, D. Qin, W. Wan, 2010, "Research and Realization based on hybrid encryption algorithm of improved AES and ECC", IEEE.
  28. D. Salama Abdul Minaam, H. M. Abdual-Kader2, M. Mohamed Hadhoud 2010, "Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types", International Journal of Network Security, Vol. 11, No. 2, PP. 78-87.
  29. D. Bouslimi, G. Coatrieux, 2012, "A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images", IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

Symmetric encryption AES Blowfish enhanced AES Elliptic Curve Cryptography ECDH MD5 and ECDSA.