Digital Signature and Key Agreement
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2013, Vol 1, Issue 7
Abstract
Diffie Hellman key exchange protocol is the most commonly used protocol. This protocol is used to exchange keys in a network. But it has bit m to exchange keys over a network but it has some drawbacks. This is the first proposed algorithm through which parties can exchange information without knowing each other. This algorithm permits exchange even over a insecure networks. Hellman algorithm was introduced by Martin Hellman and Whitfield Diffie in 1976. It is useful over a large number of authenticated protocols. Moreover, it works on transport layers too. In this research efforts are being made to declare new agreement protocol based on key confirmation and Diffie Hellman algorithm as well. This work also ensures the digital signature standard (DSS) with the help of Diffie-Hellman key exchange protocol by making use of two integers randomly. This protocol also performs on the elliptic curve cryptography in asymmetric encryption.
Authors and Affiliations
Krishna Kant| Research Scholar, B. R. Ambedkar University, Muzaffarpur, India, natkhatkk@gmail.com, Fahim Iqbal| Fahim Iqbal, Department of I T, L N Mishra College of Business Management, Muzaffarpur, Md Irshad Alam| Md Irshad Alam, Research Scholar, MIT, Muzaffarpur, India
A New Clustering Technique On Text In Sentence For Text Mining
Clustering is a commonly considered data mining problem in the text domains. The problem finds numerous applications in customer segmentation, classification, collaborative filtering, visualization, document organizat...
Combustion Analysis on HCCI Engine By Using Blended Fuel With Varying Injection Timing Of PCCI
There are two sorts of inside burning motors in particular the sparkle ignition (SI) and the pressure ignition (CI). Petrol and diesel are at present rule powers for SI and CI motors. These energizes are very nearly...
Implementation Of “Bloom Filter†Using Cam Based Structure
Content addressable memory (CAM) utilizing a novel algorithm for associativity between the inputtag and the relating location of the output data. The proposed design depends on an as of late created meager bunched ar...
Switching Activity Reduction Technique In Soc Testing
This paper discusses the generation Pseudo Random number generation using Low Power Linear Feedback Shift Resister (LFSR) which is more suitable for Built-In-Test (BIT) structures used for testing of VLSI circuits. B...
A Novel Security Scheme against Spyware using Sequence Selection of CAPTCHA as Graphical Password
our proposed work will be founded on Click-based graphical secret word plans require a client to tap on an arrangement of focuses on one or more exhibited foundation pictures. With Pass Points, clients make a secret...