High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Enhancement of Security in Message Confidentiality Algorithm for Data Transmission in Next Generation Networks using TLS 1.0

Author(s):

SHRUTI MISHRA , THAKUR COLLEGE OF ENGINEERING AND TECHNOLOGY; SAYALI GOVILKAR, THAKUR COLLEGE OF ENGINEERING AND TECHNOLOGY; DILASHA JAIN, THAKUR COLLEGE OF ENGINEERING AND TECHNOLOGY

Keywords:

Confidentiality, TLS, Cryptography

Abstract

TLS is a standardized network layer protocol designed to provide communication security over the internet. Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the Internet. TLS 1.0 provides confidentiality, authentication and key exchange. It achieves message confidentiality by means of secure encryption algorithms. The current algorithm that is widely used is AES-128 encryption algorithm. Though it is one of the most trusted and most efficient techniques, it is prone to numerous linear attacks. This project proposes an improvement in the current AES algorithm by means of a new design of the algorithm. The AES algorithm in use presently has an entirely linear structure which makes it easier for the attacker to break it down. The improved design contains the Feistel Network incorporated in AES algorithm along with certain key changes incorporated in each operation of the AES algorithm, which are further modified. This makes it non-linear and prevents it from various algebraic and linear attacks. An attempt is further made to compare the performance of improved AES algorithm with the existing one which proves that the modified AES algorithm is more efficient. The main objective of this project is to enhance the message confidentiality algorithm in TLS 1.0 which is the AES-128 bit block algorithm. The prime focus is to remove the pre-existing vulnerabilities in the present AES algorithm and make it more attack resistant. The project also tries to accomplish the goals of the TLS protocol which include cryptographic security, interoperability, extensibility, and relative efficiency.

Other Details

Paper ID: IJSRDV2I2358
Published in: Volume : 2, Issue : 2
Publication Date: 01/05/2014
Page(s): 939-944

Article Preview

Download Article