{"title":"3 B (Block Byte Bit) Cipher Algorithm for Secure Socket Layer","authors":"Y. Geum","doi":"10.1109/SERA57763.2023.10197799","DOIUrl":null,"url":null,"abstract":"This paper proposes an ECSSL(Elliptic Curve Secure Socket Layer) protocol that provides more securities and faster processing speed than an existing SSL(Secure Socket Layer) protocol. An ECSSL protocol consists of ECC(Elliptic Curve Cryptography), ThreeB(Block Byte Bit Cipher) algorithm to prevent from being eavesdropped, HMAC(Hash Message Authentication Code) algorithm to create digital signature using a shared secret key. In particular, as ThreeB uses byte exchange by using random technique. and bit-xor operation, compared with DES using fixed index table, the security and processing time of it are improved much better.","PeriodicalId":211080,"journal":{"name":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE/ACIS 21st International Conference on Software Engineering Research, Management and Applications (SERA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SERA57763.2023.10197799","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper proposes an ECSSL(Elliptic Curve Secure Socket Layer) protocol that provides more securities and faster processing speed than an existing SSL(Secure Socket Layer) protocol. An ECSSL protocol consists of ECC(Elliptic Curve Cryptography), ThreeB(Block Byte Bit Cipher) algorithm to prevent from being eavesdropped, HMAC(Hash Message Authentication Code) algorithm to create digital signature using a shared secret key. In particular, as ThreeB uses byte exchange by using random technique. and bit-xor operation, compared with DES using fixed index table, the security and processing time of it are improved much better.