Comparative Analysis of AES-ECC and AES-ECDH Hybrid Models for a Client-Server System

Data security refers to safeguard or protect the data. Data security is an essential prerequisite of the world today because of internet that provides a medium for communication between different communities of the world. Communication can be through a wireless media or wired, that requires security...

Full description

Saved in:
Bibliographic Details
Published in:2021 2nd Global Conference for Advancement in Technology (GCAT) pp. 1 - 7
Main Authors: Sharma, Samiksha, Pokharana, Anchal
Format: Conference Proceeding
Language:English
Published: IEEE 01.10.2021
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Data security refers to safeguard or protect the data. Data security is an essential prerequisite of the world today because of internet that provides a medium for communication between different communities of the world. Communication can be through a wireless media or wired, that requires security of data while transmitting through it because such mediums are susceptible to different external threats, so there's a strong need of data security for those channels. Cryptography is an art to write code for solving such data threats related problems for communications over an unsecure channel. Cryptography provides diverse set of services to the data such as authentication, privacy, integrity and nonrepudiation through a wide range of techniques. It is broadly classified into two categories named as symmetric and asymmetric cryptography; symmetric technique is fast and uses the same key for encrypting the data and converting the cipher back to its original text using decryption process whereas asymmetric requires different key pair for encrypting and decrypting data. This paper presents a comparative analysis of two hybrid models AES-ECC and AES-ECDH implemented for a client server system. AES is a symmetric technique and is first implemented with ECC for a client server system. After first implementation for further enhancement in the security of data communication between client and server, AES is again implemented with another asymmetric technique ECDH commonly known as a key agreement protocol and a variant of Diffie-Hellman combined with elliptic curve cryptography that adds up more security by establishing a shared secret after a successful key agreement between client and server. After implementing, both the models are analyzed on the basis of various parameters. This paper thus presents the comparison between AES-ECC and AES-ECDH on the basis of various metrics that signify the performance, effectiveness, strength and weakness of an algorithm and also the paper will verify which hybrid technique will be more superior in providing the security and effective delivery of confidential information for a client server communication system.
AbstractList Data security refers to safeguard or protect the data. Data security is an essential prerequisite of the world today because of internet that provides a medium for communication between different communities of the world. Communication can be through a wireless media or wired, that requires security of data while transmitting through it because such mediums are susceptible to different external threats, so there's a strong need of data security for those channels. Cryptography is an art to write code for solving such data threats related problems for communications over an unsecure channel. Cryptography provides diverse set of services to the data such as authentication, privacy, integrity and nonrepudiation through a wide range of techniques. It is broadly classified into two categories named as symmetric and asymmetric cryptography; symmetric technique is fast and uses the same key for encrypting the data and converting the cipher back to its original text using decryption process whereas asymmetric requires different key pair for encrypting and decrypting data. This paper presents a comparative analysis of two hybrid models AES-ECC and AES-ECDH implemented for a client server system. AES is a symmetric technique and is first implemented with ECC for a client server system. After first implementation for further enhancement in the security of data communication between client and server, AES is again implemented with another asymmetric technique ECDH commonly known as a key agreement protocol and a variant of Diffie-Hellman combined with elliptic curve cryptography that adds up more security by establishing a shared secret after a successful key agreement between client and server. After implementing, both the models are analyzed on the basis of various parameters. This paper thus presents the comparison between AES-ECC and AES-ECDH on the basis of various metrics that signify the performance, effectiveness, strength and weakness of an algorithm and also the paper will verify which hybrid technique will be more superior in providing the security and effective delivery of confidential information for a client server communication system.
Author Pokharana, Anchal
Sharma, Samiksha
Author_xml – sequence: 1
  givenname: Samiksha
  surname: Sharma
  fullname: Sharma, Samiksha
  email: samikshadogra1992@gmail.com
  organization: Chandigarh University,Department of CSE,Punjab,India
– sequence: 2
  givenname: Anchal
  surname: Pokharana
  fullname: Pokharana, Anchal
  email: anchalpokharana258@gmail.com
  organization: Chandigarh University,Department of CSE,Punjab,India
BookMark eNotj0tqwzAUAFVoF03aExSKLuDUTx9LWhrVjQspXThZhydbAoE_QTYB376LejWzGpgdeRyn0RPyDvkBIDcfR1ueJQPNDixncDBSK6HEA9lBUUgBmhfsmVzsNNww4RLvnpYj9uscZzoFWlZNVllLcew2_6xpvboUO_ozdb6faZgSRWr76Mcla3y6-0SbdV788EKeAvazf924J5ev6mzr7PR7_LblKYsAeslcqwKKAjDIAg14LgKqVmiHTreiU84YGSTmRjjHFEfDIbTC5ZKpIKXjfE_e_rvRe3-9pThgWq_bKf8D3EVMqQ
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/GCAT52182.2021.9587474
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1665418362
9781665418362
EndPage 7
ExternalDocumentID 9587474
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i118t-bc7fa461af56a91e34fa7c48bab8c4d7b995f5a094bb273a931fc4b0527f55b33
IEDL.DBID RIE
IngestDate Thu Jun 29 18:38:11 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i118t-bc7fa461af56a91e34fa7c48bab8c4d7b995f5a094bb273a931fc4b0527f55b33
PageCount 7
ParticipantIDs ieee_primary_9587474
PublicationCentury 2000
PublicationDate 2021-Oct.-1
PublicationDateYYYYMMDD 2021-10-01
PublicationDate_xml – month: 10
  year: 2021
  text: 2021-Oct.-1
  day: 01
PublicationDecade 2020
PublicationTitle 2021 2nd Global Conference for Advancement in Technology (GCAT)
PublicationTitleAbbrev GCAT
PublicationYear 2021
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.7933059
Snippet Data security refers to safeguard or protect the data. Data security is an essential prerequisite of the world today because of internet that provides a medium...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Advanced Encryption Standard
Analytical models
Authentication
Avalanche Effect
Ciphers
Correlation
Data privacy
Elliptic Curve Cryptography
Encryption/Decryption
Measurement
Protocols
Wireless communication
Title Comparative Analysis of AES-ECC and AES-ECDH Hybrid Models for a Client-Server System
URI https://ieeexplore.ieee.org/document/9587474
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LawIxEB5UeuipLVr6JoceGzW7ySY5ylbrSYQqeJM8QZC1-Cj03zfZ3SqFXnobQkhgwmRmkvm-AXiWTqjg2BWmmmSYZioLNicJTqVNNEmsSK0pm03wyUQsFnLagJcjFsY5VxafuW4Uy798uzGH-FTWk0yE6Jc2ocl5VmG1atAv6cveWz6YsUhIHrK-hHTryb-6ppROY3Txv-0uoXNC36Hp0a9cQcMVbZjnJ5pu9MMkgjYeDYbveJjnSBW2ll_HaPwVgVgoNjpb71CIS5FC-TpCH3G8HNwWVUzlHZiPhrN8jOuWCHgVMoE91oZ7RTOiPMuUJC6lXnFDhVZaGGq5lpJ5pkLOpnUITJRMiTdU91nCPWM6Ta-hVWwKdwOIJJm1QkhLwypGRmLAYMDeREKYvtf0FtpRJcuPivViWWvj7u_heziPWq_K3B6gtd8e3COcmc_9ard9Ko_qG9kllI4
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEA61CnpSacW3OXg07WY32U2OZW1dsZaCLfRW8oRC2ZY-BP-9ye7aInjxFkJIYIbJzCTzfQPAIzdMOMcuEJE4RiQWsbM5jlHEdShxqFmkVdFsIhkM2GTChzXwtMPCGGOK4jPT8sPiL18v1NY_lbU5ZS76JQfgkBISBiVaq4L94oC3X9LOiHpKcpf3hbhVLf_VN6VwG73T_x14Bpp7_B0c7jzLOaiZvAHG6Z6oG_5wicCFhZ3uB-qmKRS5rsbPGcy-PBQL-lZn8zV0kSkUMJ178CPy14NZwZKrvAnGve4ozVDVFAHNXC6wQVIlVpAYC0tjwbGJiBWJIkwKyRTRieScWipc1ialC00Ej7BVRAY0TCylMoouQD1f5OYSQBzGWjPGNXG7KO6pAZ0JW-UpYQIryRVoeJFMlyXvxbSSxvXf0w_gOBu996f918HbDTjxGiiL3m5BfbPamjtwpD43s_XqvlDbN8Val9U
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2021+2nd+Global+Conference+for+Advancement+in+Technology+%28GCAT%29&rft.atitle=Comparative+Analysis+of+AES-ECC+and+AES-ECDH+Hybrid+Models+for+a+Client-Server+System&rft.au=Sharma%2C+Samiksha&rft.au=Pokharana%2C+Anchal&rft.date=2021-10-01&rft.pub=IEEE&rft.spage=1&rft.epage=7&rft_id=info:doi/10.1109%2FGCAT52182.2021.9587474&rft.externalDocID=9587474