An Innovative Digital Envelope Slant for an Unsecured Channel

Authors

  • Nilima Karankar Department of Information Technology, Institute of Engineering & Technology, DAVV, Indore-India
  • V. Kapoor Department of Information Technology, Institute of Engineering & Technology, DAVV, Indore-India
  • C.P. Patidar Department of Information Technology, Institute of Engineering & Technology, DAVV, Indore-India

Keywords:

Encryption, Decryption, Authenticity, Confidentiality, Integrity, Message Digest-5, Blowfish, Non-repudiation, Ron Rivets Shamir Adelman

Abstract

The digital signature and digital envelope are two techniques extensively used in data communication. Both techniques have some deficiencies like digital envelope provides only confidentiality and best of both the world. Digital Signature provides confidentiality as well as integrity and non-repudiation. Symmetric key cryptography in combination with asymmetric key cryptography is used in digital envelope does not provide all security features such as integrity, authentication, and non-repudiation. Hence to fulfil all security features MD5 has to be used with a symmetric key and asymmetric key cryptography. In our work, we suggest an implementation of a novel digital envelope technique. It comprises best of both the world and digital signature to fulfil all security features integrity, confidentiality, authentication, and non-repudiation. In our project work we are using the hash generation algorithm MD5, the symmetric key algorithm (Blowfish) and the asymmetric key algorithm (Ron Rivest Shamir Adelman (RSA)). RSA is very popular and proven asymmetric key cryptography. It provides confidentiality as well as integrity and non-repudiation. So we are providing an integrated solution which will meet the above mentioned requirements. It can overcome the shortcomings of the existing digital envelope technique and it provides strength to the security of e-commerce channel.

 

References

Ramachandran Ganesan, Mohan Gobi, and Kanniappan Vivekananda “A Novel Digital Envelope Approach for A Secure E-Commerce Channel” International Journal of Network Security, Vol.11, No.3, PP.121 {127, Nov. 2010.

Rajasree R. S., “Generation of Dynamic Group Digital Signature” International Journal of Computer Applications (0975 - 8887) Volume 98 No.9.

Ashmi Singh, Puran Gour, Braj Bihari Soni , “Analysis of 64-bit RC5 Encryption Algorithm for Pipelined Architecture” International Journal of Computer Applications (0975 - 8887) Volume 96 No.20.

Akash Kumar Mandal, Chandra Prakash “Performance Evaluation of Cryptographic Algorithms: DES and AES” 2012 IEEE Students’ Conference on Electrical, Electronics and Computer Science.

Ayushi "A Symmetric Key Cryptographic Algorithm" ©2010 International Journal of Computer Applications (0975 - 8887) Volume 1 - No. 15.

E. Thambiraja, G.Ramesh, Dr. R. Umarani "A Survey on Various Most Common Encryption Techniques" Volume 2, Issue 7, July 2012 International Journal of Advanced Research in Computer Science and Software Engineering.

Diaa Salama, Hatem Abdual Kader, and Mohiy Hadhoud "Studying the Effects of Most Common Encryption Algorithms" International Arab Journal of e-Technology, Vol. 2, No. 1, January 2011.

Min-Shiang Hwang, Chi-Yu Liu "Authenticated Encryption Schemes: Current Status and Key Issues"International Journal of Network Security, Vol.1, No.2, PP.61–73, Sep. 2005.

Jawahar Thakur, Nagesh Kumar "DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis" Volume 1, Issue 2, December 2011 International Journal of Emerging Technology and Advanced Engineering.

Stallings (2005), ''Cryptography and Network Security 4th Ed,'' Prentice Hall.

Abdel-Karim Al Tamimi "Performance Analysis of Data Encryption Algorithms" http://www.cse.wustl.edu/.

P.Karthigaikumar, Soumiya Rasheed “Simulation of Image Encryption using AES Algorithm” IJCA Special Issue on “Computational Science - New Dimensions & Perspectives” NCCSE, 2011.

Wenping Guo, Ying Chen, and Xiaoming Zhao “A Study on High-Strength Communication Scheme Based on Signed Digital Envelope” Proceedings of the Second International Symposium on Networking and Network Security (ISNNS’10) Jinggangshan, P. R. China, 2-4, April. 2010 pp. 190-192.

Desponia palaka, Petros Daras “A Novel Peer-to-Peer Payment Protocol” International Journal of Network Security, Vol.4, No.1, PP.107-120, Jan.2007.

Sultan Almuhammadi, “Better Privacy and Security in E-Commerce: Using Elliptic Curve- Based Zero- Knowledge Proofs”, ieeexplore.ieee.org/Xplore/home.jsp.

S. Han, E. Chang, W. Liu, “A New Encryption Algorithm over Elliptic Curve”, ieeexplore.ieee.org/Xplore/home.jsp

Atul Kahate (2008), “Cryptography and Network Security” McGraw Hill 2nd Edition.

M Gobi, “A New Digital Envelope Approach for Secure Electronic Medical Records”, IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.1. (January 2009).

Downloads

Published

2014-10-30

How to Cite

[1]
N. Karankar, V. Kapoor, and C. Patidar, “An Innovative Digital Envelope Slant for an Unsecured Channel”, Int. J. Sci. Res. Net. Sec. Comm., vol. 2, no. 3, pp. 9–12, Oct. 2014.

Issue

Section

Research Article

Similar Articles

<< < 1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.