Abstract
AES and ECC are considered as the best encryption algorithms, both are approved by NIST and are regarded as next generation algorithm. It is believed that they are quantum computer resistant. The compact ciphertext size of ECC and AES makes them the best choice for cloud computing, sensor networks or small devices where we want resource-saving without compromising the security of the system. But the main issue with AES is key sharing, which is dependent on the secured channel and if that channel gets compromised the communication will also get compromised. To overcome this issue, we are proposing the novel concept, which is generating keys for both AES and ECC using the proposed methodology given in the paper. The algorithm does not need a secured channel at any level as it is inheriting properties of the ECDH algorithm and adding novel concepts with it for key generation. We have observed from the experimental results that our proposed algorithm generates 16-byte key which is inheriting ECC property, so it can with stand with prime factorization attack and QC. The other property is that the key generation algorithm is lesser complex as compared to the existing related algorithms.
Similar content being viewed by others
Abbreviations
- ECDH:
-
Elliptic curve Diffie Hellman
- ECC:
-
Elliptic curve cryptography
- NGE:
-
Next-generation algorithm
- QCR:
-
Quantum computing resistant
- DH:
-
Diffie-Hellman
References
Adnan NAN, Ariffin S (2018) Big data security in the web-based cloud storage system using 3D-AES block cipher cryptography algorithm. In: International conference on soft computing in data science. Springer, Singapore, pp 309–321
Bhadauria R, Chaki R, Chaki N, Sanyal S (2011). A survey on security issues in cloud computing. pp 1–15. arXiv preprint arXiv:1109.5388
Coetzee L, Eksteen J (2011) The internet of things-promise for the future? An introduction. IST-Africa Conference Proceedings, 2011. IEEE, 2011
Dubal MJ, Mahesh TR, Ghosh PA (2011) Design of a new security protocol using hybrid cryptography architecture. In: Proceedings of 3rd International Conference on Electronics Computer Technology (ICECT), vol 5, India
Hashizume K, Rosado DG, Fernández-Medina E, Fernandez EB (2013) An analysis of security issues for cloud computing. J Internet Serv Appl 4(1):5
Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wirel Netw 20(8):2481–2501
Kahanwal D, Singh DT (2013) The distributed computing paradigms: P2P, grid, cluster, cloud, and jungle. arXiv preprint arXiv:1311.3070
Kumar N (2012) A secure communication wireless sensor networks through hybrid (AES+ECC) algorithm, vol 386. von LAP LAMBERT Academic Publishing
Madakam S, Ramaswamy R, Tripathi S (2015) Internet of things (IoT): a literature review. J Comput Commun 3(5):164
Rehman SU, Bilal M, Ahmad B, Yahya KM, Ullah A, Rehman OU (2012) Comparison based analysis of different cryptographic and encryption techniques using Message Authentication Code (MAC) in wireless sensor networks (WSN). Int J Comput Sci Issues (IJCSI) 9(1):96–101
Rizk R, Alkady Y (2015) Two-phase hybrid cryptography algorithm for wireless sensor networks. J Electr Syst Inf Technol 2(3):296–313
Subasree S, Sakthivel NK (2010) Design of a new security protocol using hybrid cryptography algorithms. IJRRAS 2(2):95–103
Thomas G, Janardhanan PS (2012) Intrusion tolerance: enhancement of safety in cloud computing. Int J Adv Res Comput Commun Eng 1(4)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Farooq, S., Chawla, P. A novel approach of asymmetric key generation in symmetric AES via ECDH. Int J Syst Assur Eng Manag 11, 962–971 (2020). https://doi.org/10.1007/s13198-020-01029-z
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13198-020-01029-z