Open Access iconOpen Access

ARTICLE

A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security

Fauziyah1, Zhaoshun Wang1,*, Mujahid Tabassum2

1 School of Computer and Communication Engineering, University of Science and Technology, Beijing, 100000, China
2 Noroff School of Technology and Digital Media (Noroff Accelerate), Noroff University College, Kristiansand, 4612, Norway

* Corresponding Author: Zhaoshun Wang. Email: email

(This article belongs to the Special Issue: Cybersecurity for Cyber-attacks in Critical Applications in Industry)

Computers, Materials & Continua 2024, 78(3), 4417-4452. https://doi.org/10.32604/cmc.2024.046797

Abstract

In an era characterized by digital pervasiveness and rapidly expanding datasets, ensuring the integrity and reliability of information is paramount. As cyber threats evolve in complexity, traditional cryptographic methods face increasingly sophisticated challenges. This article initiates an exploration into these challenges, focusing on key exchanges (encompassing their variety and subtleties), scalability, and the time metrics associated with various cryptographic processes. We propose a novel cryptographic approach underpinned by theoretical frameworks and practical engineering. Central to this approach is a thorough analysis of the interplay between Confidentiality and Integrity, foundational pillars of information security. Our method employs a phased strategy, beginning with a detailed examination of traditional cryptographic processes, including Elliptic Curve Diffie-Hellman (ECDH) key exchanges. We also delve into encrypt/decrypt paradigms, signature generation modes, and the hashes used for Message Authentication Codes (MACs). Each process is rigorously evaluated for performance and reliability. To gain a comprehensive understanding, a meticulously designed simulation was conducted, revealing the strengths and potential improvement areas of various techniques. Notably, our cryptographic protocol achieved a confidentiality metric of 9.13 in comprehensive simulation runs, marking a significant advancement over existing methods. Furthermore, with integrity metrics at 9.35, the protocol’s resilience is further affirmed. These metrics, derived from stringent testing, underscore the protocol’s efficacy in enhancing data security.

Keywords


Cite This Article

APA Style
Fauziyah, , Wang, Z., Tabassum, M. (2024). A holistic secure communication mechanism using a multilayered cryptographic protocol to enhanced security. Computers, Materials & Continua, 78(3), 4417-4452. https://doi.org/10.32604/cmc.2024.046797
Vancouver Style
Fauziyah , Wang Z, Tabassum M. A holistic secure communication mechanism using a multilayered cryptographic protocol to enhanced security. Comput Mater Contin. 2024;78(3):4417-4452 https://doi.org/10.32604/cmc.2024.046797
IEEE Style
Fauziyah, Z. Wang, and M. Tabassum, “A Holistic Secure Communication Mechanism Using a Multilayered Cryptographic Protocol to Enhanced Security,” Comput. Mater. Contin., vol. 78, no. 3, pp. 4417-4452, 2024. https://doi.org/10.32604/cmc.2024.046797



cc Copyright © 2024 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 430

    View

  • 210

    Download

  • 0

    Like

Share Link