CFP last date
20 June 2024
Reseach Article

Secure Communication using RSA Algorithm for Network Environment

by Amrita Jain, Vivek Kapoor
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 7
Year of Publication: 2015
Authors: Amrita Jain, Vivek Kapoor
10.5120/20755-3153

Amrita Jain, Vivek Kapoor . Secure Communication using RSA Algorithm for Network Environment. International Journal of Computer Applications. 118, 7 ( May 2015), 6-9. DOI=10.5120/20755-3153

@article{ 10.5120/20755-3153,
author = { Amrita Jain, Vivek Kapoor },
title = { Secure Communication using RSA Algorithm for Network Environment },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 7 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 6-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number7/20755-3153/ },
doi = { 10.5120/20755-3153 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:01:01.373518+05:30
%A Amrita Jain
%A Vivek Kapoor
%T Secure Communication using RSA Algorithm for Network Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 7
%P 6-9
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Secure communication in network environment is primary requirement to access remote resources in a controlled and efficient way. For validation and authentication in e-banking and e-commerce transactions, digital signatures using public key cryptography is extensively employed. To maintain confidentiality, Digital Envelope, which is the combination of the encrypted message and signature with the encrypted symmetric key, is also used. This research paper has proposed to develop a hybrid technique using Symmetric & Asymmetric key cryptography. It will also include Message authentication code to maintain integrity of message. Therefore, proposed model will not only help to maintain confidentiality and authentication of message and user but integrity of data too. Java technology has been proposed to validate the performance of proposed model in context of message length, key length, cipher text length and computational time for encryption and decryption.

References
  1. Rongrong Xi, Shuyuan Jin, Xiaochun Yun and Yongzheng Zhang, "CNSSA: A Comprehensive Network Security Situation Awareness System", in International Joint Conference of IEEE TrustCom, ISSN: 978-0-7695-4600-1/11, doi: 10. 1109/TrustCom. 2011. 62, 2011.
  2. Wang, C. Yao, A. Singhal and S. Jajodia, "Network Security Analysis Using Attack Graphs :Interactive Analysis of Attack Graphs using Relational Queries", in proceedings of IFIP WG Working Conference on Data and Application Security (DBSEC), 11. 3 pages 119-132, 2006.
  3. Mr. Marc Grégoire and Mr. Luc Beaudoin, "Visualisation for Network Situational Awareness in Computer Network Defence", in proceedings of visualisation and the common operational picture meeting RTO-MP-IST-043, Paper 20. 2008.
  4. White Paper on, "Public Safety and Homeland Security Situational Awareness", in ESRI, February 2008.
  5. P. Barford, M. Dacier, T. G. Dietterich, M. Fredrikson, "Cyber SA: Situational Awareness", in Cyber Defense University of Wisconsin, 2009.
  6. Rostyslav Barabanov, Stewart Kowalski and Louise Yngström, "Information Security Metrics", DSV Report series No 11-007, Mar 25, 2011
  7. Pallavi Vaidya and S. K. Shinde, "Application for Network Security Situation Awareness", in International Conference in Recent Trends in Information Technology and Computer Science (ICRTITCS - 2012), IJCA, ISSN: 0975 – 8887, 2012.
  8. Xiu-Zhen Chena, Qing-Hua Zhenga, Xiao-Hong Guana,b, Chen-Guang Lina, Jie Sun, "Multiple behavior information fusion based quantitative threat evaluation", in Elsevier Journal of Computers & Security , ISSN: 0167-4048 ,doi:10. 1016/j. cose. 2004. 08. 009,2005. pp 218-231
  9. Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, and Sushil Jajodia, "An Attack Graph-Based Probabilistic Security Metric", in National Institute of Standards and Technology Computer Security Division; Concordia Institute for Information Systems Engineering, Montreal, Canada.
  10. Marianne Swanson, Nadya Bartol, John Sabato, Joan Hash, and Laurie Graffo, "Security Metrics Guide for Information Technology Systems", in NIST Special Publication 800-55, July 2003.
  11. William Streilein, Kendra Kratkiewicz, Michael Sikorski, Keith Piwowarski, Seth Webster, "PANEMOTO: Network Visualization of Security Situational Awareness through Passive Analysis", in Workshop on Information Assurance United States Military Academy, Proceedings of the IEEE, 2007.
  12. Rongzhen FAN, Mingkuai ZHOU, "Network Security Awareness and Tracking Method by GT", in Journal of Computational Information Systems, Binary Information Press, ISSN: 1043-1050, Vol. 9: Issue 3, 2013.
  13. Igor Kotenko and Andrew Chechulim, "Attack Modelling and Security Evaluation in SIEM System", in International Transaction of System Science and Application, SIWN Press,, ISSN:2051-5642, Vol. 8, Dec 2012.
  14. Bon K. Sy, "Integrating intrusion alert information to aid forensic explanation: An analytical intrusion detection framework for distributive IDS", in Elsevier Journal of Information Fusion, ISSN: 1566-2535, doi:10. 1016/j. inffus. 2009. 01. 001, 2009.
  15. Timothy Shimeall, Sidney Faber, Markus DeShon and Andrew Kompanek, "Using SiLK for Network Traffic Analysis", in CERT R Network Situational Awareness Group, Carnegie Mellon University. September 2010.
  16. William Yurcik, "Visualizing NetFlows for Security at Line Speed: The SIFT Tool Suite", in 19th Large Installation System Administration Conference (LISA '05), 2005.
  17. Xiaoxin Yin, William Yurcik and Michael Treaster, "VisFlowConnect: NetFlow Visualizations of Link Relationships for Security Situational Awareness", in ACM, doi: 1-58113-974-8/04/0010, Oct 2004.
  18. Xiaoxin Yin, William Yurcik and Adam Slagell, "The Design of VisFlowConnect-IP: a Link Analysis System for IP Security", in National Center for Advanced Secure Systems Research (NCASSR), 2010.
  19. Ji-Bao Lai, Hui-Qiang Wang, Xiao-Wu Liu and Ying Liang, "WNN-Based Network Security Situation Quantitative Prediction Method and Its Optimization", in Journal of computer science and technology, Vol. 23, Issue 3, ISSN: 0222:0230, Mar 2008.
  20. SunJun Liu, Le Yu and Jin Yang, "Research on Network Security Situation Awareness Technology based on AIS", in International Journal of Knowledge and Language Processing, ISSN: 2191-2734, Volume 2, Number 2, April 2011.
  21. P. Mell and K. Scarfone, "Improving the Common Vulnerability Scoring System", in proceedings of IET Information Security, doi:10. 1049/iet-ifs:20060055, 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Hybrid Secure Communication RSA MAC Symmetric Key.