TY - JOUR
T1 - A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security
AU - Fauziyah,
AU - Wang, Zhaoshun
AU - Tabassum, Mujahid
N1 - Publisher Copyright:
© 2024 Tech Science Press. All rights reserved.
PY - 2024/3/26
Y1 - 2024/3/26
N2 - In an era characterized by digital pervasiveness and rapidly expanding datasets, ensuring the integrity and reliability of information is paramount. As cyber threats evolve in complexity, traditional cryptographic methods face increasingly sophisticated challenges. This article initiates an exploration into these challenges, focusing on key exchanges (encompassing their variety and subtleties), scalability, and the time metrics associated with various cryptographic processes. We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering. Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity, foundational pillars of information security. Our method employs a phased strategy, beginning with a detailed examination of traditional cryptographic processes, including Elliptic Curve Diffie-Hellman (ECDH) key exchanges. We also delve into encrypt/decrypt paradigms, signature generation modes, and the hashes used for Message Authentication Codes (MACs). Each process is rigorously evaluated for performance and reliability. To gain a comprehensive understanding, a meticulously designed simulation was conducted, revealing the strengths and potential improvement areas of various techniques. Notably, our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs, marking a significant advancement over existing methods. Furthermore, with integrity metrics at 9.35, the protocol’s resilience is further affirmed. These metrics, derived from stringent testing, underscore the protocol’s efficacy in enhancing data security.
AB - In an era characterized by digital pervasiveness and rapidly expanding datasets, ensuring the integrity and reliability of information is paramount. As cyber threats evolve in complexity, traditional cryptographic methods face increasingly sophisticated challenges. This article initiates an exploration into these challenges, focusing on key exchanges (encompassing their variety and subtleties), scalability, and the time metrics associated with various cryptographic processes. We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering. Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity, foundational pillars of information security. Our method employs a phased strategy, beginning with a detailed examination of traditional cryptographic processes, including Elliptic Curve Diffie-Hellman (ECDH) key exchanges. We also delve into encrypt/decrypt paradigms, signature generation modes, and the hashes used for Message Authentication Codes (MACs). Each process is rigorously evaluated for performance and reliability. To gain a comprehensive understanding, a meticulously designed simulation was conducted, revealing the strengths and potential improvement areas of various techniques. Notably, our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs, marking a significant advancement over existing methods. Furthermore, with integrity metrics at 9.35, the protocol’s resilience is further affirmed. These metrics, derived from stringent testing, underscore the protocol’s efficacy in enhancing data security.
KW - Cryptographic
KW - decryption
KW - integrity
KW - privacy preservation
KW - security
UR - http://www.scopus.com/inward/record.url?scp=85189170177&partnerID=8YFLogxK
U2 - 10.32604/cmc.2024.046797
DO - 10.32604/cmc.2024.046797
M3 - Article
AN - SCOPUS:85189170177
SN - 1546-2218
VL - 78
SP - 4417
EP - 4452
JO - Computers, Materials and Continua
JF - Computers, Materials and Continua
IS - 3
ER -