Open Access Open Access  Restricted Access Subscription or Fee Access

Locked Digital Envelope System Grounded on Hash Function for Providing Key Security Features

Nilima Karankar, V. Kapoor

Abstract


In data communication, the digital signature and digital envelope are the two widely used techniques. Where digital envelope provides only confidentiality and digital signature provides non-repudiation, confidentiality and integrity. Digital envelope is using symmetric and asymmetric key cryptography but not providing all security features like authentication, non-repudiation and integrity. In order to achieve all security features, we have used MD5 with asymmetric and symmetric key cryptography. We have implemented a novel digital envelope technique which provides all security features at once. Novel digital envelope comprises of digital signature and best of both the world and providing security features like non-repudiation, authentication, confidentiality and integrity. We have used blowfish and RSA (Ron Rivest Shamir Adelman) algorithm in integration with MD5. In result, out integrated solution meets above mentioned requirement and it also removed the deficiency of current digital envelope technique and strengthen the security of ad-hoc network, Wireless sensor network, Wireless network.


Keywords


Encryption, Decryption, Integrity, Confidentiality, Message Digest 5 (MD5), Authenticity, Non-Repudiation, Blowfish, Ron Rivets Shamir Adelman (RSA).

Full Text:

PDF

References


Ramachandran Ganesan, Mohan Gobi, and Kanniappan Vivekananda” A Novel Digital Envelope Approach for A Secure Ad-hoc network, Wireless sensor network,, Wireless network. Channel” International Journal of Network Security, Vol.11, No.3, PP.121 {127, Nov. 2010.

Rajasree R. S., “Generation of Dynamic Group Digital Signature” International Journal of Computer Applications (0975 - 8887) Volume 98 No.9.

Ashmi Singh, Puran Gour, Braj Bihari Soni , “Analysis of 64-bit RC5 Encryption Algorithm for Pipelined Architecture” International Journal of Computer Applications (0975 - 8887) Volume 96 No.20.

Akash Kumar Mandal, ChandraParakash “Performance Evaluation of Cryptographic Algorithms: DES and AES” 2012 IEEE Students’ Conference on Electrical, Electronics and Computer Science.

Ayushi "A Symmetric Key Cryptographic Algorithm" ©2010 International Journal of Computer Applications (0975 - 8887) Volume 1 - No. 15.

E. Thambiraja, G.Ramesh, Dr. R. Umarani "A Survey on Various Most Common Encryption Techniques" Volume 2, Issue 7, July 2012 International Journal of Advanced Research in Computer Science and Software Engineering.

Diaa Salama, Hatem Abdual Kader, and Mohiy Hadhoud "Studying the Effects of Most Common Encryption Algorithms" International Arab Journal of e-Technology, Vol. 2, No. 1, January 2011.

Min-Shiang Hwang, Chi-Yu Liu "Authenticated Encryption Schemes: Current Status and Key Issues" International Journal of Network Security, Vol.1, No.2, PP.61–73, Sep. 2005

Jawahar Thakur, Nagesh Kumar "DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis" Volume 1, Issue 2, December 2011 International Journal of Emerging Technology and Advanced Engineering.

Stallings.W (2005), ‘‘Cryptography and Network Security 4th Ed,'' Prentice Hall.

Wenping Guo, Ying Chen, and Xiaoming Zhao “A Study on High-Strength Communication Scheme Based on Signed Digital Envelope” Proceedings of the Second International Symposium on Networking and Network Security (ISNNS’10) Jinggangshan, P. R. China, 2-4, April. 2010 pp. 190-192.

Despoina Palaka1, Petros Daras1,2, Kosmas Petridis2 , and Michael G. Strintzis1,2 , “A Novel Peer-to-Peer Payment Protocol ”, International Journal of Network Security, Vol.4, No.1, PP.107-120, Jan. 2007.

M Gobi, “A New Digital Envelope Approach for Secure Electronic Medical Records”, IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.1, January 2009.

Chong Fu, Zhi-Liang Zhu, “An Efficient Implementation of RSA Digital Signature Algorithm” , 978-i-4244-2108-04/08 2008 IEEE.

Atul Kahate 2008, “Cryptography and Network Security” McGraw Hill 2nd Edition.

B. Padmavathi, S. Ranjitha Kumari, “A Survey on Performance Analysis of DES, AES and RSA Algorithm along with LSB Substitution Technique”, International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064

S.R Subramanya and Byung K. Yi, “Digital Signatures”, IEEE Potentials MARCH/APRIL 2006.




DOI: http://dx.doi.org/10.36039/AA032015003.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.