Open Access
ARTICLE
A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security
1 School of Computer and Communication Engineering, University of Science and Technology, Beijing, 100000, China
2 Noroff School of Technology and Digital Media (Noroff Accelerate), Noroff University College, Kristiansand, 4612, Norway
* Corresponding Author: Zhaoshun Wang. Email:
(This article belongs to the Special Issue: Cybersecurity for Cyber-attacks in Critical Applications in Industry)
Computers, Materials & Continua 2024, 78(3), 4417-4452. https://doi.org/10.32604/cmc.2024.046797
Received 15 October 2023; Accepted 17 January 2024; Issue published 26 March 2024
Abstract
In an era characterized by digital pervasiveness and rapidly expanding datasets, ensuring the integrity and reliability of information is paramount. As cyber threats evolve in complexity, traditional cryptographic methods face increasingly sophisticated challenges. This article initiates an exploration into these challenges, focusing on key exchanges (encompassing their variety and subtleties), scalability, and the time metrics associated with various cryptographic processes. We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering. Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity, foundational pillars of information security. Our method employs a phased strategy, beginning with a detailed examination of traditional cryptographic processes, including Elliptic Curve Diffie-Hellman (ECDH) key exchanges. We also delve into encrypt/decrypt paradigms, signature generation modes, and the hashes used for Message Authentication Codes (MACs). Each process is rigorously evaluated for performance and reliability. To gain a comprehensive understanding, a meticulously designed simulation was conducted, revealing the strengths and potential improvement areas of various techniques. Notably, our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs, marking a significant advancement over existing methods. Furthermore, with integrity metrics at 9.35, the protocol’s resilience is further affirmed. These metrics, derived from stringent testing, underscore the protocol’s efficacy in enhancing data security.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.