International Journal of Information Engineering and Electronic Business(IJIEEB)
ISSN: 2074-9023 (Print), ISSN: 2074-9031 (Online)
Published By: MECS Press
IJIEEB Vol.4, No.2, Apr. 2012
Secure Communication using Symmetric and Asymmetric Cryptographic Techniques
Full Text (PDF, 295KB), PP.36-42
Satellite based communication is a way to transmit digital information from one geographic location to another by utilizing satellites. Satellite as communication medium to transfer data vulnerable various types of information security threat, and require a novel methodology for safe and secure data transmission over satellite. In this paper a methodology is proposed to ensure safe and secured transferred of data or information for satellite based communication using symmetric and asymmetric Cryptographic techniques.
Cite This Paper
Omar M.Barukab, Asif Irshad Khan, Mahaboob Sharief Shaik , MV Ramana Murthy, Shahid Ali Khan,"Secure Communication using Symmetric and Asymmetric Cryptographic Techniques", IJIEEB, vol.4, no.2, pp.36-42, 2012.
s. Subasree and N. K. Sakthivel,, "Design of a new security protocol using hybrid cryptography algorithms", IJRRAS, vol. 2, 2010.
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer, "Strong authentication for RFID systems using the AES algorithm," in Proc. Workshop on Cryptographic Hardware and Embedded Syst., M. Joye and J.-J. Quisquater, Eds. New York: Springer-Verlag, 2004, vol. 3156, Lecture Notes in Computer Science, pp. 357–370.
Eun-Kyung Ryu, Tsuyoshi Takagi, "A hybrid approach for privacy-preserving RFID tags",Computer Standards & Interfaces, Elsevier, 31, pp. 812–815, 2010.
H. S. Majunatha Reddy, & K B Raja, "HIGH CAPACITY AND SECURITY STEGANOGRAPHY USINGDISCRETE WAVELET TRANSFORM", International Journal of Computer Science and Security (IJCSS), Vol. 3: Issue (6) pp 462-472.
Md. S. Khan, M V. V. Bhaskar, M V S. Nagaraju, "An Optimized Method for Concealing Data using Audio Steganography", International Journal of Computer Applications (0975 – 8887) Vol. 33– No.4, pp 25-30. 2011
J. Baek, R. Steinfeld and Y. Zheng, "Formal Proofs for the Security of Signcryption", Proc. PKC , Vol. 2274 of LNCS, Springer- Verlag, pp 80-98, 2002.
J. Baek, R. Steinfeld and Y. Zheng," Formal Proofs for the Security of Signcryption", a full version, submitted to Journal of Cryptology. A draft is available upon request to the authors.
J. Baek and Y. Zheng, "Description of Provably Secure Signcryption Schemes", Retrieved on 21-03-2012 from http://www.signcryption.org/publications/pdffiles/yz-baek-sc-description-02.pdf, Aug 2002.
Mac OS X Developer Library, "Security Overview", Retrieved on March 18th 2012 from, http://developer.apple.com/library/mac/#documentation/Security/Conceptual/Security_Overview /CryptographicServices/CryptographicServices.html
A. Brandt and A. Krasne, "How It Works: Encryption hides your data from prying eyes. Learn how it works and what you need to use it", Retrieved on March 18th 2012 from, http://www.pcworld.com/article/15230/how_it_works_encryption.html
Singh , S. Code "The Evolution of Secrecy from Mary, Queen of Scots to Quantum Cryptography", Doubleday, 1999
Schneier B.,"Applied Cryptography", John Wiley New York
Andrew s Tanebbaum, computer Networks, Third edition, Prentice-Hal inc, New Delhi, India 1999
Stallings, W, "Cryptography and Network Security: Principles and practice", 2nd edition, prentice hall
Diffe,W , Hellman, M , "New directions in cryptography", IEEE Trans, inform. Theory, 1996
RL,Rivest et al , "A method for obtaining digital signatures and public-key crypto systems", 2000
Rabin, M, "Probabilistic algorithms, In Algorithms and complexity", Academic Press, New York, 1986.