Open Access Open Access  Restricted Access Subscription or Fee Access

High Performance Internet Security Cryptographic Functions through OpenSSL

T. Vijayalakshmi, K.G. Sathiya

Abstract


The transport layer security protocol is currently the predominant method of implementing internet security. This project proposes the cryptographic algorithms used in the SSL/TLS protocol. Open SSL(Secure Socket Layer), an open source implementation of the SSL v3 and TLS v1 protocol is deployed in the proposed system. Key cipher functions used in SSL-driven connections, which include SHA-2,SEA ,MD5 algorithms. Experimental results show significant improvements in performance of the SSL Transactions when the proposed cryptosystem is deployed in the networking system.

 


Keywords


Cryptographic Algorithm, SSL/TLS Protocol, SHA-2 , SEA , MD5 .

Full Text:

PDF

References


Mohamed Khalil-Hani, Vishnu P., Nambiar M., Marsono N., (2010) “Hardware Acceleration of OpenSSL cryptographic functionsfor high-performance Internet Security”International Conference on Intelligent Systems, Modelling and Simulation.

Nambiar V. P., Khalil-Hani M., and Zabidi M. M, (IJCTS 2009), “Accelerating the AES encryption function in OpenSSL for embedded systems,” International Journal of Information and Communication Technology, vol. 2, no. 1/2, pp. 83–93.

Khalil-Hani M., Nazrin M., and Hau Y. W., (ICED 2008) “Implementation of SHA-2 hash function for a digital signature System-on- Chip in FPGA,” in International Conference on Electronic Design.

Praveen Kumar B., Ezhumalai P., Ramesh P., Dr SankaraGomathi S., Dr.Sakthivel P., (Febraury 2010), “Improving the Performance of a Scalable Encryption Algorithm (SEA) using FPGA”, IJCSNS International Journal of Computer Science and Network Security, VOL. 10 No.2.

Maharak C. and Sowanwanichakul B., (in TENCON 2004), “Security methods for Web- based applications on embedded system,” 2004 IEEE Region 10 Conference, vol. C, 2004, pp.56–59 Vol. 3.

Colleen E. Garcia, Naval Postgraduate School, Monterey, California, (June 2010) “Regulating nation-state cyber attacks in Counter terrorism operations” – Master Thesis.

EkawatHomsirikamol, MarcinRogawski, Kris Gaj, in George Mason University, (2010) “Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs” – Master Thesis.

Jury: Prof. Y.Willems, voorzitter in Katholiekeuniversiteitleuven, Kasteelpark, Arenberg 10, B–3001 Heverlee, (May 2007), “Analysis and design of symmetric encryption algorithms” - Master Thesis .

Pravir Chandra, Matt Messier, John Viega, (June 2002) Publisher: O'ReillyPub Date: ISBN: 0-596-00270. Network Security with OpenSSL.

Pascal junod, in EcolePolytechnique, Federale De Lausanne, (2005)“Statistical Cryptanalysis of Block Ciphers” – Master Thesis.

www.openssl.org/documents/ssl-tls.php and www.cryptography.org


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.