Secret key distribution protocol using public key cryptography

  • Authors:
  • Amit Parnerkar;Dennis Guster;Jayantha Herath

  • Affiliations:
  • St Cloud State University;St Cloud State University;St Cloud State University

  • Venue:
  • Journal of Computing Sciences in Colleges
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents the description and analysis of a protocol, which uses hybrid crypto algorithms for key distribution. A triple DES with a 168-bit key is used to generate the secret key. This secret key is transferred with the help of public key cryptography. The authentication process is accomplished by using the message digest algorithm MD5. This protocol uses mutual authentication in which, both participants have to authenticate themselves via a third trusted certificate authority (CA). This process provides confidentiality, authentication and non-repudiation. To test the overhead difference between symmetric and asymmetric algorithms the CPU time is measured under each method. The results show that the symmetric algorithms are sixty times faster than the asymmetric algorithm tested in time to perform encryption/decryption on different sets of data with same key. To further enhance the security, simple wrapper classes were developed and implemented as part of the suggested protocol suite.