Secure Communication using Symmetric and Asymmetric Cryptographic Techniques

Full Text (PDF, 296KB), PP.36-42

Views: 0 Downloads: 0

Author(s)

Omar M.Barukab 1,* Asif Irshad Khan 1 Mahaboob Sharief Shaik 1 M.V. Ramana Murthy 1 Shahid Ali Khan 2

1. Faculty of Computing and Information Technology, King Abdul Aziz University, Jeddah, Saudi Arabia

2. Department of Computer Science & Engg. Waljat College of Applied Sciences, Oman

* Corresponding author.

DOI: https://doi.org/10.5815/ijieeb.2012.02.06

Received: 16 Jan. 2012 / Revised: 10 Feb. 2012 / Accepted: 1 Mar. 2012 / Published: 8 Apr. 2012

Index Terms

Satellite based communication, Information security, Encryption, Cryptographic Algorithms

Abstract

Satellite based communication is a way to transmit digital information from one geographic location to another by utilizing satellites. Satellite as communication medium to transfer data vulnerable various types of information security threat, and require a novel methodology for safe and secure data transmission over satellite. In this paper a methodology is proposed to ensure safe and secured transferred of data or information for satellite based communication using symmetric and asymmetric Cryptographic techniques.

Cite This Paper

Omar M.Barukab, Asif Irshad Khan, Mahaboob Sharief Shaik, MV Ramana Murthy, Shahid Ali Khan, "Secure Communication using Symmetric and Asymmetric Cryptographic Techniques", International Journal of Information Engineering and Electronic Business(IJIEEB), vol.4, no.2, pp.36-42, 2012. DOI:10.5815/ijieeb.2012.02.06

Reference

[1]s. Subasree and N. K. Sakthivel,, "Design of a new security protocol using hybrid cryptography algorithms", IJRRAS, vol. 2, 2010. 

[2]M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong authentication for RFID systems using the AES algorithm," in Proc. Workshop on Cryptographic Hardware and Embedded Syst., M. Joye and J.-J. Quisquater, Eds. New York: Springer-Verlag, 2004, vol. 3156, Lecture Notes in Computer Science, pp. 357–370.

[3]Eun-Kyung Ryu, Tsuyoshi Takagi, "A hybrid approach for privacy-preserving RFID tags",Computer Standards & Interfaces, Elsevier, 31, pp. 812–815, 2010.

[4]H. S. Majunatha Reddy, & K B Raja, "HIGH CAPACITY AND SECURITY STEGANOGRAPHY USINGDISCRETE WAVELET TRANSFORM", International Journal of Computer Science and Security (IJCSS), Vol. 3: Issue (6) pp 462-472.

[5]Md. S. Khan, M V. V. Bhaskar, M V S. Nagaraju, "An Optimized Method for Concealing Data using Audio Steganography", International Journal of Computer Applications (0975 – 8887) Vol. 33– No.4, pp 25-30. 2011

[6]J. Baek, R. Steinfeld and Y. Zheng, "Formal Proofs for the Security of Signcryption", Proc. PKC , Vol. 2274 of LNCS, Springer- Verlag, pp 80-98, 2002.

[7]J. Baek, R. Steinfeld and Y. Zheng," Formal Proofs for the Security of Signcryption", a full version, submitted to Journal of Cryptology. A draft is available upon request to the authors.

[8]J. Baek and Y. Zheng, "Description of Provably Secure Signcryption Schemes", Retrieved on 21-03-2012 from http://www.signcryption.org/publications/pdffiles/yz-baek-sc-description-02.pdf, Aug 2002.

[9]Mac OS X Developer Library, "Security Overview", Retrieved on March 18th 2012 from, http://developer.apple.com/library/mac/#documentation/Security/Conceptual/Security_Overview  /CryptographicServices/CryptographicServices.html

[10]A. Brandt and A. Krasne, "How It Works: Encryption hides your data from prying eyes. Learn how it works and what you need to use it", Retrieved on March 18th 2012 from, http://www.pcworld.com/article/15230/how_it_works_encryption.html

[11]Singh , S. Code "The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography", Doubleday, 1999 

[12]Schneier B.,"Applied Cryptography", John Wiley New York

[13]Andrew s Tanebbaum, computer Networks, Third edition, Prentice-Hal inc, New Delhi, India 1999

[14]Stallings, W, "Cryptography and Network Security: Principles and practice", 2nd edition, prentice hall

[15]Diffe,W , Hellman, M , "New directions in cryptography", IEEE Trans, inform. Theory, 1996

[16]RL,Rivest et al , "A method for obtaining digital signatures and public-key crypto systems", 2000

[17]Rabin, M, "Probabilistic algorithms, In Algorithms and complexity", Academic Press, New York, 1986.