A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security

0Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.

Abstract

In an era characterized by digital pervasiveness and rapidly expanding datasets, ensuring the integrity and reliability of information is paramount. As cyber threats evolve in complexity, traditional cryptographic methods face increasingly sophisticated challenges. This article initiates an exploration into these challenges, focusing on key exchanges (encompassing their variety and subtleties), scalability, and the time metrics associated with various cryptographic processes. We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering. Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity, foundational pillars of information security. Our method employs a phased strategy, beginning with a detailed examination of traditional cryptographic processes, including Elliptic Curve Diffie-Hellman (ECDH) key exchanges. We also delve into encrypt/decrypt paradigms, signature generation modes, and the hashes used for Message Authentication Codes (MACs). Each process is rigorously evaluated for performance and reliability. To gain a comprehensive understanding, a meticulously designed simulation was conducted, revealing the strengths and potential improvement areas of various techniques. Notably, our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs, marking a significant advancement over existing methods. Furthermore, with integrity metrics at 9.35, the protocol’s resilience is further affirmed. These metrics, derived from stringent testing, underscore the protocol’s efficacy in enhancing data security.

References Powered by Scopus

Wind power forecasting considering data privacy protection: A federated deep reinforcement learning approach

169Citations
N/AReaders
Get full text

Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

97Citations
N/AReaders
Get full text

Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives

90Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Fauziyah, Wang, Z., & Tabassum, M. (2024). A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security. Computers, Materials and Continua, 78(3), 4417–4452. https://doi.org/10.32604/cmc.2024.046797

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 3

43%

Lecturer / Post doc 2

29%

Researcher 2

29%

Readers' Discipline

Tooltip

Computer Science 3

43%

Engineering 3

43%

Business, Management and Accounting 1

14%

Article Metrics

Tooltip
Mentions
News Mentions: 1

Save time finding and organizing research with Mendeley

Sign up for free