Digital Signature and Key Agreement
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2013, Vol 1, Issue 7
Abstract
Diffie Hellman key exchange protocol is the most commonly used protocol. This protocol is used to exchange keys in a network. But it has bit m to exchange keys over a network but it has some drawbacks. This is the first proposed algorithm through which parties can exchange information without knowing each other. This algorithm permits exchange even over a insecure networks. Hellman algorithm was introduced by Martin Hellman and Whitfield Diffie in 1976. It is useful over a large number of authenticated protocols. Moreover, it works on transport layers too. In this research efforts are being made to declare new agreement protocol based on key confirmation and Diffie Hellman algorithm as well. This work also ensures the digital signature standard (DSS) with the help of Diffie-Hellman key exchange protocol by making use of two integers randomly. This protocol also performs on the elliptic curve cryptography in asymmetric encryption.
Authors and Affiliations
Krishna Kant| Research Scholar, B. R. Ambedkar University, Muzaffarpur, India, natkhatkk@gmail.com, Fahim Iqbal| Fahim Iqbal, Department of I T, L N Mishra College of Business Management, Muzaffarpur, Md Irshad Alam| Md Irshad Alam, Research Scholar, MIT, Muzaffarpur, India
Providing Best Quality Of Video Streaming Using Ames Method
In wireless networks(mobile networks) the wireless link capacity cannot be stable with the demand of traffic over the networks. Due to the gap between the traffic demand and the link capacity it results in poor servic...
Maintain Data Integrity And Protection Of Private Label Information In Social Network Data
Perceptive information about users of the social networks should be protected. The confront is to plan methods to publish social network data in a form that affords usefulness without compromising privacy. Previous r...
A Novel Approach For Large-Scale D ata Processing Platform On Peer- To- Peer Based Bestpeer++
We introduce BestPeer++, a framework which conveys versatile information sharing administrations for corporate system applications in the cloud taking into account BestPeer—a distributed (P2P) based information adm...
Safety prerequisite for coal mine using Wireless Sensor Technique and Artificial Intelligence Technology
Coal mines are the great source of goods for which we are highly dependent. It plays a vital role for the development of growth of nation. Here in this paper we are focusing over the safety prerequisite for the coal...
A High Step Up Converter With A Voltage Multiplier Module For A Pv System
A novel high step-up high-efficiency interleaved converter with voltage multiplier module for renewable energy system, is proposed in this paper. A new voltage multiplier module composed which is having switched capa...