Cryptographic protocol to data exchange in hostile machines

Cryptography database security XML secure data exchange

Authors

Vol. 9 No. 05 (2021)
Engineering and Computer Science
May 24, 2021

Downloads

The technology continuous advancement, especially of Internet, has allowed the evolution of the computers usage from a situation that it was used just for simple and isolated tasks to the current global integration level, in which it wants to join the diverse points of generation and use of the information inside and outside of an institution. This has created several possibilities to improve the service quality and information access. On the other hand, new challenges like information heterogeneity and secure appear. This paper presents a new XML-based cryptographic protocol to access and manipulate encrypted data in machines that are susceptible to intruder’s attacks. Following the RSA algorithm, this new protocol defines rules in which the encrypted data are handled independent from the user keys and without access of intruders in the others encryption keys and plain text.