期刊名称:International Journal of Security and Its Applications
印刷版ISSN:1738-9976
出版年度:2014
卷号:8
期号:3
页码:363-376
DOI:10.14257/ijsia.2014.8.3.36
出版社:SERSC
摘要:Diverse security measures are used to improve security entropy including the introduction of secure port services, better tunneling protocols and complex encryptions cryptography. Most of these do not address the fundamental of the security risk which is to avoid newly discovered exploits and protect credential from man-in-the-middle attack. In this study, experiments involving three types of existing environment, which include insecure connection as a basis, working against pre-shared key and public-key infrastructure (PKI), are being modeled. A new framework named SeDIC has been introduced to overcome the limitations and address the current security weaknesses. In this new implementation, forward secrecy is maintained since the key for authentication is only valid once and this will deny replay attack. This study proves that secure internet application is possible and the user can have the freedom to use the lowest cryptographic entropy to perform their on-line transactions. Having complex mathematical algorithms such as Elliptic Curve Cryptography (ECC) for tunneling, or even multilayer authentication system alone will not address the potential risk, besides prolonging the time for intruder in gaining unauthorized access.