Full Paper View Go Back

An Innovative Digital Envelope Slant for an Unsecured Channel

Nilima Karankar1 , V. Kapoor2 , C.P. Patidar3

Section:Research Paper, Product Type: Journal
Vol.2 , Issue.3 , pp.9-12, May-2014

Online published on Nov 01, 2014


Copyright © Nilima Karankar, V. Kapoor , C.P. Patidar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Nilima Karankar, V. Kapoor , C.P. Patidar, “An Innovative Digital Envelope Slant for an Unsecured Channel,” International Journal of Scientific Research in Network Security and Communication, Vol.2, Issue.3, pp.9-12, 2014.

MLA Style Citation: Nilima Karankar, V. Kapoor , C.P. Patidar "An Innovative Digital Envelope Slant for an Unsecured Channel." International Journal of Scientific Research in Network Security and Communication 2.3 (2014): 9-12.

APA Style Citation: Nilima Karankar, V. Kapoor , C.P. Patidar, (2014). An Innovative Digital Envelope Slant for an Unsecured Channel. International Journal of Scientific Research in Network Security and Communication, 2(3), 9-12.

BibTex Style Citation:
@article{Karankar_2014,
author = {Nilima Karankar, V. Kapoor , C.P. Patidar},
title = {An Innovative Digital Envelope Slant for an Unsecured Channel},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {5 2014},
volume = {2},
Issue = {3},
month = {5},
year = {2014},
issn = {2347-2693},
pages = {9-12},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=146},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=146
TI - An Innovative Digital Envelope Slant for an Unsecured Channel
T2 - International Journal of Scientific Research in Network Security and Communication
AU - Nilima Karankar, V. Kapoor , C.P. Patidar
PY - 2014
DA - 2014/11/01
PB - IJCSE, Indore, INDIA
SP - 9-12
IS - 3
VL - 2
SN - 2347-2693
ER -

4119 Views    3393 Downloads    3372 Downloads
  
  

Abstract :
The digital signature and digital envelope are two techniques extensively used in data communication. Both techniques have some deficiencies like digital envelope provides only confidentiality and best of both the world. Digital Signature provides confidentiality as well as integrity and non-repudiation. Symmetric key cryptography in combination with asymmetric key cryptography is used in digital envelope does not provide all security features such as integrity, authentication, and non-repudiation. Hence to fulfil all security features MD5 has to be used with a symmetric key and asymmetric key cryptography. In our work, we suggest an implementation of a novel digital envelope technique. It comprises best of both the world and digital signature to fulfil all security features integrity, confidentiality, authentication, and non-repudiation. In our project work we are using the hash generation algorithm MD5, the symmetric key algorithm (Blowfish) and the asymmetric key algorithm (Ron Rivest Shamir Adelman (RSA)). RSA is very popular and proven asymmetric key cryptography. It provides confidentiality as well as integrity and non-repudiation. So we are providing an integrated solution which will meet the above mentioned requirements. It can overcome the shortcomings of the existing digital envelope technique and it provides strength to the security of e-commerce channel.

Key-Words / Index Term :
Encryption, Decryption, Authenticity, Confidentiality, Integrity, Message Digest-5, Blowfish, Non-repudiation, Ron Rivets Shamir Adelman

References :
[1]. Ramachandran Ganesan, Mohan Gobi, and Kanniappan Vivekananda “A Novel Digital Envelope Approach for A Secure E-Commerce Channel” International Journal of Network Security, Vol.11, No.3, PP.121 {127, Nov. 2010.
[2]. Rajasree R. S., “Generation of Dynamic Group Digital Signature” International Journal of Computer Applications (0975 - 8887) Volume 98 No.9.
[3]. Ashmi Singh, Puran Gour, Braj Bihari Soni , “Analysis of 64-bit RC5 Encryption Algorithm for Pipelined Architecture” International Journal of Computer Applications (0975 - 8887) Volume 96 No.20.
[4]. Akash Kumar Mandal, Chandra Prakash “Performance Evaluation of Cryptographic Algorithms: DES and AES” 2012 IEEE Students’ Conference on Electrical, Electronics and Computer Science.
[5]. Ayushi "A Symmetric Key Cryptographic Algorithm" ©2010 International Journal of Computer Applications (0975 - 8887) Volume 1 - No. 15.
[6]. E. Thambiraja, G.Ramesh, Dr. R. Umarani "A Survey on Various Most Common Encryption Techniques" Volume 2, Issue 7, July 2012 International Journal of Advanced Research in Computer Science and Software Engineering.
[7]. Diaa Salama, Hatem Abdual Kader, and Mohiy Hadhoud "Studying the Effects of Most Common Encryption Algorithms" International Arab Journal of e-Technology, Vol. 2, No. 1, January 2011.
[8]. Min-Shiang Hwang, Chi-Yu Liu "Authenticated Encryption Schemes: Current Status and Key Issues"International Journal of Network Security, Vol.1, No.2, PP.61–73, Sep. 2005.
[9]. Jawahar Thakur, Nagesh Kumar "DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis" Volume 1, Issue 2, December 2011 International Journal of Emerging Technology and Advanced Engineering.
[10]. Stallings (2005), ''Cryptography and Network Security 4th Ed,'' Prentice Hall.
[11]. Abdel-Karim Al Tamimi "Performance Analysis of Data Encryption Algorithms" http://www.cse.wustl.edu/.
[12]. P.Karthigaikumar, Soumiya Rasheed “Simulation of Image Encryption using AES Algorithm” IJCA Special Issue on “Computational Science - New Dimensions & Perspectives” NCCSE, 2011.
[13]. Wenping Guo, Ying Chen, and Xiaoming Zhao “A Study on High-Strength Communication Scheme Based on Signed Digital Envelope” Proceedings of the Second International Symposium on Networking and Network Security (ISNNS’10) Jinggangshan, P. R. China, 2-4, April. 2010 pp. 190-192.
[14]. Desponia palaka, Petros Daras “A Novel Peer-to-Peer Payment Protocol” International Journal of Network Security, Vol.4, No.1, PP.107-120, Jan.2007.
[15]. Sultan Almuhammadi, “Better Privacy and Security in E-Commerce: Using Elliptic Curve- Based Zero- Knowledge Proofs”, ieeexplore.ieee.org/Xplore/home.jsp.
[16]. S. Han, E. Chang, W. Liu, “A New Encryption Algorithm over Elliptic Curve”, ieeexplore.ieee.org/Xplore/home.jsp
[17]. Atul Kahate (2008), “Cryptography and Network Security” McGraw Hill 2nd Edition.
[18]. M Gobi, “A New Digital Envelope Approach for Secure Electronic Medical Records”, IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.1. (January 2009).

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation