Skip to main content
Log in

A novel approach of asymmetric key generation in symmetric AES via ECDH

  • Original Article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

AES and ECC are considered as the best encryption algorithms, both are approved by NIST and are regarded as next generation algorithm. It is believed that they are quantum computer resistant. The compact ciphertext size of ECC and AES makes them the best choice for cloud computing, sensor networks or small devices where we want resource-saving without compromising the security of the system. But the main issue with AES is key sharing, which is dependent on the secured channel and if that channel gets compromised the communication will also get compromised. To overcome this issue, we are proposing the novel concept, which is generating keys for both AES and ECC using the proposed methodology given in the paper. The algorithm does not need a secured channel at any level as it is inheriting properties of the ECDH algorithm and adding novel concepts with it for key generation. We have observed from the experimental results that our proposed algorithm generates 16-byte key which is inheriting ECC property, so it can with stand with prime factorization attack and QC. The other property is that the key generation algorithm is lesser complex as compared to the existing related algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Abbreviations

ECDH:

Elliptic curve Diffie Hellman

ECC:

Elliptic curve cryptography

NGE:

Next-generation algorithm

QCR:

Quantum computing resistant

DH:

Diffie-Hellman

References

  • Adnan NAN, Ariffin S (2018) Big data security in the web-based cloud storage system using 3D-AES block cipher cryptography algorithm. In: International conference on soft computing in data science. Springer, Singapore, pp 309–321

  • Bhadauria R, Chaki R, Chaki N, Sanyal S (2011). A survey on security issues in cloud computing. pp 1–15. arXiv preprint arXiv:1109.5388

  • Coetzee L, Eksteen J (2011) The internet of things-promise for the future? An introduction. IST-Africa Conference Proceedings, 2011. IEEE, 2011

  • Dubal MJ, Mahesh TR, Ghosh PA (2011) Design of a new security protocol using hybrid cryptography architecture. In: Proceedings of 3rd International Conference on Electronics Computer Technology (ICECT), vol 5, India

  • Hashizume K, Rosado DG, Fernández-Medina E, Fernandez EB (2013) An analysis of security issues for cloud computing. J Internet Serv Appl 4(1):5

    Article  Google Scholar 

  • Jing Q, Vasilakos AV, Wan J, Lu J, Qiu D (2014) Security of the internet of things: perspectives and challenges. Wirel Netw 20(8):2481–2501

    Article  Google Scholar 

  • Kahanwal D, Singh DT (2013) The distributed computing paradigms: P2P, grid, cluster, cloud, and jungle. arXiv preprint arXiv:1311.3070

  • Kumar N (2012) A secure communication wireless sensor networks through hybrid (AES+ECC) algorithm, vol 386. von LAP LAMBERT Academic Publishing

  • Madakam S, Ramaswamy R, Tripathi S (2015) Internet of things (IoT): a literature review. J Comput Commun 3(5):164

    Article  Google Scholar 

  • Rehman SU, Bilal M, Ahmad B, Yahya KM, Ullah A, Rehman OU (2012) Comparison based analysis of different cryptographic and encryption techniques using Message Authentication Code (MAC) in wireless sensor networks (WSN). Int J Comput Sci Issues (IJCSI) 9(1):96–101

    Google Scholar 

  • Rizk R, Alkady Y (2015) Two-phase hybrid cryptography algorithm for wireless sensor networks. J Electr Syst Inf Technol 2(3):296–313

    Article  Google Scholar 

  • Subasree S, Sakthivel NK (2010) Design of a new security protocol using hybrid cryptography algorithms. IJRRAS 2(2):95–103

    MATH  Google Scholar 

  • Thomas G, Janardhanan PS (2012) Intrusion tolerance: enhancement of safety in cloud computing. Int J Adv Res Comput Commun Eng 1(4)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priyanka Chawla.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Farooq, S., Chawla, P. A novel approach of asymmetric key generation in symmetric AES via ECDH. Int J Syst Assur Eng Manag 11, 962–971 (2020). https://doi.org/10.1007/s13198-020-01029-z

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-020-01029-z

Keywords

Navigation