Biomedical Engineering Reference
In-Depth Information
The Recent Architecture
The recent architecture has been already discussed in the Research paper [ 11 ].
Proposed Architecture
In the proposed architecture, given plain text can be encrypted with the help of
AES and the derived cipher text can be communicated to the destination through
any secured channel. Simultaneously the Hash value is calculated through MD5
for the same plaintext, which already has been converted into the cipher text by
AES. This Hash value has been encrypted with Dual RSA and the encrypted
message of this Hash value is also sent to destination.
Now at the receiving end, hash value of Decrypted plaintext is calculated with
MD5 and then it is compared with the hash value of original plaintext which is
calculated at the sending end for its integrity. By this we are able to know whether
the original text being altered or not during transmission in the communication
medium.
The intruders may try to hack the original information from the encrypted
messages. Although he may be able to trap both the encrypted messages of
plaintext and the hash value, but he will not be able to decrypt these messages to
get original one. Hence the message can be communicated to the destination in a
highly secured manner. The design of proposed hybrid security protocol archi-
tecture is given in Fig. 1 .
The proposed Hybrid security protocol architecture is superior from the pre-
vious security protocol architecture because of three reasons which are as follows:
1. The proposed security protocol architecture is more time efficient as compared
to the recent security protocol architecture because its execution time is less
compared to the execution time of recent security protocol architecture. It is
evident from the performance evaluation matrix drawn below. The proposed
security protocol architecture performance is better from its counterpart on
most of the hardware platform available right from Pentium 4 to the latest i5
processors.
2. The proposed hybrid security protocol is more immune against the square attacks
because of the inclusion of AES algorithm. The square attack on AES Rijndael
can be extended to 7 rounds by guessing the 16 bytes of the last round key.
The attractiveness of AES is that it offers better security for smaller key size
and thereby reducing processing overheads. The benefits of this higher strength per
bit include higher speed low power consumption, bandwidth saving, storage effi-
ciencies, smaller certificates. These advantages are beneficial in applications where
bandwidth, processing capability, power availability, and storage are constrained.
The hybrid security protocol architecture is as such it can be easily upgraded and
Search WWH ::




Custom Search