Noncommutative analogue of Diffie-Hellman protocol in matrix ring over the residue ring
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 11, Issue 10
Abstract
Abstract. Classical Diffie-Hellman protocol of the key establishment was the basis of the development of several key exchange protocols. But this protocol is not secure and it is not protected against the “man in the middle†attack. The purpose of this article is to offer a secure and practical noncommutative analogue of the Diffie–Hellman protocol that is reliably protected not only against “man in the middle†attack but also against the quantum computer attack
Authors and Affiliations
Semen Konstantin Rososhek, Evgeniy Gorbunov
ENCRYPTION METHOD USING PASCAL’S TRIANGLE BASED SUBSTITUTION AND SIERPINSKI TRIANGLE BASED PERMUTATION
Text messages are often created, shared and a person sends at least ten messages a day. Because of its frequent usage those messages are not been encrypted. Thus it is unable to send confidential messages via SMS service...
Performance Evaluation for VoIP on Campus
The VoIP Campus implementation is to make the existing VoIP technology become more beneficial for campus stake holder. This VoIP on Campus (VoC) technology make use of a web server, facilitating users to carry out VoIP r...
Genetic Algorithm for solving flow problems in a Stochastic-flow Network under Budget Constraints
The system reliability (Rd,c) calculation is based on the generation of all the lower boundary points for the given demand, d, such that the total transmission cost is less than or equal to c (budget). This generation of...
An Evaluation for Model Testability approaches
Design for testability is a very important issue in software engineering. It becomes crucial in the case of Model Based Testing where models are generally not tested before using as input of Model Based Testing. The qual...
Trusted Cloud Platform for Cloud Infrastructure
Reliability and trust Models are used to enhance secure , reliable scheduling , load balancing and QoS in cloud and Distributed environment. Trust models that are being used in Distributed and Grid environment, does not...