CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Hybrid Crypto System based on a new Circle- Symmetric key Algorithm and RSA with CRT Asymmetric key Algorithm for E-commerce Applications

Published on None 2011 by Rasmi P S, Dr. Varghese Paul
International Conference on VLSI, Communication & Instrumentation
Foundation of Computer Science USA
ICVCI - Number 9
None 2011
Authors: Rasmi P S, Dr. Varghese Paul
007b8d53-f953-4a88-bf0b-faed31eb4892

Rasmi P S, Dr. Varghese Paul . A Hybrid Crypto System based on a new Circle- Symmetric key Algorithm and RSA with CRT Asymmetric key Algorithm for E-commerce Applications. International Conference on VLSI, Communication & Instrumentation. ICVCI, 9 (None 2011), 14-18.

@article{
author = { Rasmi P S, Dr. Varghese Paul },
title = { A Hybrid Crypto System based on a new Circle- Symmetric key Algorithm and RSA with CRT Asymmetric key Algorithm for E-commerce Applications },
journal = { International Conference on VLSI, Communication & Instrumentation },
issue_date = { None 2011 },
volume = { ICVCI },
number = { 9 },
month = { None },
year = { 2011 },
issn = 0975-8887,
pages = { 14-18 },
numpages = 5,
url = { /proceedings/icvci/number9/2693-1377/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on VLSI, Communication & Instrumentation
%A Rasmi P S
%A Dr. Varghese Paul
%T A Hybrid Crypto System based on a new Circle- Symmetric key Algorithm and RSA with CRT Asymmetric key Algorithm for E-commerce Applications
%J International Conference on VLSI, Communication & Instrumentation
%@ 0975-8887
%V ICVCI
%N 9
%P 14-18
%D 2011
%I International Journal of Computer Applications
Abstract

It is widely recognized and accepted that data security will play a crucial and critical role in modern times for businesses will be transacted over the Internet through e-commerce and m-commerce channels. To address these security concerns, various security protocols that are of symmetric-key and asymmetric-key type have been developed. In this paper, we present a hybrid cryptographic system that combines both the symmetric key algorithm, which uses the properties of a circle and asymmetric-key algorithm of RSA with CRT. The circle symmetric key algorithm is based on 2-d geometry using property of circle, and circle-centered angle. It is a block cipher technique but has the advantage of producing fixed size encrypted messages all cases. The asymmetric algorithm is RSA with CRT which improves the performance of the basic RSA algorithm by four.

References
  1. William Stallings “Cryptography and Network Security”,3rd Edition, Prentice-Hall Inc., 2005.
  2. Janakiraman V S, Ganesan R, Gobi M “Hybrid Cryptographic Algorithm for Robust Network Security” ICGST- CNIR, Volume (7), Issue (I), July 2007
  3. Elliptic curve cryptography http://en.wikipedia.org/wiki/Elliptic Curve Cryptography
  4. Dus and Gupta, Planar geometry (2nd edition)
  5. The Discrete Logarithm Problem (http: //www.cs.toronto.edu/~cvs/dlog/)
  6. Cipher text-Only Attack, http://www.javvin.com/networksecurity/CiphertextOnlyAttack.html)
  7. Known-plaintext attack (http://www.tech- faq.com/known-plaintext-attack.shtml)
  8. ”A New Symmetric Key Encryption Algorithm based on 2d geometry”-2009 International Conference on Electronic Computer Technology.
  9. JJ Quisquarter and Couvreur.” Fast decipherment Algorithm for RSA public key crypto system”, electronic Letters Vol435, 1989
  10. RSA (http://en.wikipedia.org/wiki/chinese RSA.htm)
  11. RSA (http://en.wikipedia.org/wiki/chinese Remainder.htm
  12. Deepak Garg, Seema Verma “Improvement over public Key cryptographic Algorithm” 2009 IEEE International Advance computing conference
  13. Jinbiao Hou “Research on Database Security of E-Commerce Based on Hybrid Encryption” 2009 International Symposium on Web Information Systems and Applications
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Encryption Decryption hybrid cryptography Symmetric Key Algorithms