AECC: An Enhanced Public Key Cryptosystem for User Defined Messages
Autor: | Shajina Anand, Gunasekaran Raja, Aishwarya Ganapathisubramaniyan |
---|---|
Rok vydání: | 2019 |
Předmět: |
021110 strategic
defence & security studies Authentication Computer science business.industry 020208 electrical & electronic engineering 0211 other engineering and technologies Data security Eavesdropping Cryptography 02 engineering and technology Man-in-the-middle attack Computer security computer.software_genre Public-key cryptography Elliptic curve Passive attack 0202 electrical engineering electronic engineering information engineering Code (cryptography) Message authentication code business computer |
Zdroj: | UEMCON |
DOI: | 10.1109/uemcon47517.2019.8992992 |
Popis: | Due to enormous growth of devices and its interconnected communication, there are lot of possibilities for attacks and vulnerabilities in the network. From recent studies, we come to know about various security related techniques and their usage. A lot of cryptographic algorithms are used efficiently and effectively in plenty of applications. Thus it is notable to classify the attacks as two types Active and Passive Attack. Unauthorized access to the information implies passive attack. For example, in the communication channel doing operations like intercepting and eavesdropping are considered as passive attack. If the attacker tries to access the information and modify the information in an unauthorized manner, then it is considered as active attack. Man in the Middle attack is the best example of active attack. Here the attacker sends its public key as the hosts public and tries to hack the message. To overcome the issues in tradional authentication model, we proposed an Advanced Elliptical Curve Cryptographic (AECC) Algorithm which uses a code bit with a random function in both the sender and receiver side for encoding and decoding functions. This code bit is used to identify whether the public key belongs to attacker or the sender. By identifying the sender, the receiver can communicate with it without any restrictions. The results analysis section shows that our proposed AECC algorithm enhances security for user defined input messages like text, image, video and also for binary data. |
Databáze: | OpenAIRE |
Externí odkaz: |