eISSN:2278-5299

International Journal of Latest Research in Science and Technology

DOI:10.29111/ijlrst   ISRA Impact Factor:3.35

A News Letter Sign UP!
Implementing Secure Socket Layer by USING LBC-Public key algorithm

Research Paper Open Access

International Journal of Latest Research in Science and Technology Vol.1 Issue 3, pp 225-228,Year 2012

IMPLEMENTING SECURE SOCKET LAYER BY USING LBC-PUBLIC KEY ALGORITHM

Prakash Kuppuswamy, Prof. Osama Amer, Peer Mohamed Appa

Correspondence should be addressed to :

Received : 29 September 2012; Accepted : 12 October 2012 ; Published : 31 October 2012

Share
Download 125
View 177
Article No. 10061
Abstract

The Secure Sockets Layer (SSL) protocol was developed by Netscape Communications to provide application-independent secure communication over the Internet for protocols such as the Hypertext Transfer Protocol (HTTP). The SSL protocol is intended to provide a practical, application-layer, widely applicable connection oriented mechanism for Internet client/server communications security. This paper gives a detailed technical analysis of the cryptographic strength of the SSL protocol. It is a cryptographic protocol which has been used broadly for making secure connection to a web server. SSL relies upon the use of dependent cryptographic functions to perform a secure connection. The first function is the authentication function which facilitates the client to identify the server and vice versa. There have been used, several other functions such as encryption and integrity for the imbuement of security. The most common cryptographic algorithm used for ensuring security is RSA. It still has got several security breaches that need to be dealt with. An improvement over this has been implemented in this paper. In this paper, a LBC has been proposed that switches from the domain of integers to the domain of bit stuffing to be applied to the first function of SSL that would give more secure communication. The introduction of bit stuffing will complicate the access to the message even after getting the access to the private key. So, it will enhance the security which is the inevitable requirement for the design of cryptographic protocols for secure communication.

Key Words   
Secure Socket Layer (SSL), Ronald Rivest, Adi Shamir, and Leonard Adleman (RSA),
Copyright
References
  1. Parshotam, Rupinder Cheema and Aayush Gulati “Improving the Secure Socket Layer by Modifying the RSA Algorithm” International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.2, June 2012.
  2. H. Otrok, R.Haraty and A. N. El-Kassar,“Improving the Secure Socket Layer Protocol by modifying its Authentication functions” 2006.
  3. A. 0. Freier, P.Karlton and P.C.Kocher,“The SSL Protocol, version 3.0”, www.cryptoheaven.com.
  4. Judy Nguyen, “An analysis and comparison of E-commerce Transaction Protocols-purchasing order”, 1999 SJSU.
  5. A. Menezes, P. vanOorschot, and S. Vanstone, “Handbook of Applied Cryptography”, by, CRC Press, 1996.
  6. http://docs.oracle.com/cd/E17904_01/core.1111/e10105/  sslconfig.htm
  7. RSA website, Security on the Internet, http://www.emc.com/security/rsa-securid/rsaauthentication- manager html
  8. H.Otrok, “Security testing and evaluation of Cryptographic Algorithms”, Lebanese American University, June 2003.
  9. Yogesh Joshi, Debabrata Das, Subir Saha,“ Mitigating Man in the Middle Attack over Secure Sockets Layer” International Institute of Information Technology, Bangalore, India, 2009.
  10. A. J. Kenneth, P. C. Van Orshot and S. A. Vanstone, “Handbook of applied Cryptography”, CRC press, 1977.
  11. W.Stallings, “Cryptography and Network Security”, 2nd ed., Prentice Hall, Upper Saddle River, NJ, 1999.
To cite this article

Prakash Kuppuswamy, Prof. Osama Amer, Peer Mohamed Appa , " Implementing Secure Socket Layer By Using Lbc-public Key Algorithm ", International Journal of Latest Research in Science and Technology . Vol. 1, Issue 3, pp 225-228 , 2012


Responsive image

MNK Publication was founded in 2012 to upholder revolutionary ideas that would advance the research and practice of business and management. Today, we comply with to advance fresh thinking in latest scientific fields where we think we can make a real difference and growth now also including medical and social care, education,management and engineering.

Responsive image

We offers several opportunities for partnership and tie-up with individual, corporate and organizational level. We are working on the open access platform. Editors, authors, readers, librarians and conference organizer can work together. We are giving open opportunities to all. Our team is always willing to work and collaborate to promote open access publication.

Responsive image

Our Journals provide one of the strongest International open access platform for research communities. Our conference proceeding services provide conference organizers a privileged platform for publishing extended conference papers as journal publications. It is deliberated to disseminate scientific research and to establish long term International collaborations and partnerships with academic communities and conference organizers.