New Transport Layer Security using Metaheuristics and New Key Exchange Protocol

被引:0
作者
Kaddouri, Mohamed [1 ]
Bouhdadi, Mohammed [1 ]
Kaddouri, Zakaria [2 ]
Guerchi, Driss [2 ]
Echandouri, Bouchra [2 ]
机构
[1] Mohammed V Univ, Fac Sci Rabat, LMPHE Lab, BP1014 RP, Rabat, Morocco
[2] Mohammed V Univ Abu Dhabi, Dept Comp Sci, PO 106621, Abu Dhabi, U Arab Emirates
关键词
Transport Layer Security (TLS); metaheuristic; symmetric ciphering algorithm; private key exchange; hash function;
D O I
10.14569/ijacsa.2019.0100877
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The easiness of data transmission is one of the information security flaws that needs to be handled rigorously. It makes eavesdropping, tampering and message forgery by malicious more simple. One of the protocols developed to secure communication between the client and the server consists of using Transport Layer Security (TLS). TLS is a cryptographic protocol that allows encryption using record protocol, authentication and data integrity. In this paper, a new TLS version is proposed, named Transport Layer Security with Metaheuristics (TLSM), which is based on a recently designed metaheuristic symmetric ciphering technique for data encryption, combined with hash function SHA-SBOX and a new method for private key exchange. Compared to the existing TLS versions, the suggested protocol outperform all of them in terms of level of security of the encrypted data, key management and execution time.
引用
收藏
页码:586 / 591
页数:6
相关论文
共 17 条
[1]  
Alfardan Nadem., 2013, USENIX Security
[2]  
[Anonymous], 2005, RFC 4279 (Standards Track)
[3]  
[Anonymous], 2015, SUMMARIZING KNOWN AT
[4]  
Aviram N, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P689
[5]   The strict avalanche criterion randomness test [J].
Castro, JCH ;
Sierra, JM ;
Seznec, A ;
Izquierdo, A ;
Ribagorda, A .
MATHEMATICS AND COMPUTERS IN SIMULATION, 2005, 68 (01) :1-7
[6]   Cable Capacitance Attack against the KLJN Secure Key Exchange [J].
Chen, Hsien-Pu ;
Gonzalez, Elias ;
Saez, Yessica ;
Kish, Laszlo B. .
INFORMATION, 2015, 6 (04) :719-732
[7]  
Gupta Vipul, 2005, SIZZLE STANDARDS BAS
[8]  
Handa A., 2009, System Engineering for IMS networks
[9]   A Computation-Efficient Group Key Distribution Protocol Based on a New Secret Sharing Scheme [J].
Jiao, Runhai ;
Ouyang, Hong ;
Lin, Yukun ;
Luo, Yaoming ;
Li, Gang ;
Jiang, Zaiyu ;
Zheng, Qian .
INFORMATION, 2019, 10 (05)
[10]  
Jonsson J, 2002, LECT NOTES COMPUT SC, V2442, P127