Noncommutative analogue of Diffie-Hellman protocol in matrix ring over the residue ring
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 11, Issue 10
Abstract
Abstract. Classical Diffie-Hellman protocol of the key establishment was the basis of the development of several key exchange protocols. But this protocol is not secure and it is not protected against the “man in the middle†attack. The purpose of this article is to offer a secure and practical noncommutative analogue of the Diffie–Hellman protocol that is reliably protected not only against “man in the middle†attack but also against the quantum computer attack
Authors and Affiliations
Semen Konstantin Rososhek, Evgeniy Gorbunov
To investigate the effect of Mobile IP on the performance of VANET through realistic channel conditions.
Abstract Vehicular Ad hoc Network (VANET) is a specialized Ad hoc Network, which provides safety and comfort for passengers [1]. Due to the specific characteristic of VANET like high mobility and large scale node...
Forecasting the ranks of sites suitable for power plant installations
An increase in the number of decision parameters used for ranking of sites for a power plant installation using the soft computing techniques leads to complex formulations that are computationally expensive[41]. Amongst...
OPTIMIZATION OF CHANNEL ALLOCATION ALGORITHM FOR HOT SPOT CELLS IN WIRELESS NETWORKS
Dense deployment of cellular networks is leading to scarcity of communication bandwidth or what we call as channel. If compared to its wired counterparts, wireless cellular network have limited number of channels availab...
Image Steganography Based On Optimal LSB Pixel Adjustment Method
Now a days, internet becomes major channel for communicating information one place to other such as text, image, audio, video data. Steganography is a technique in which information can to be communicating secretly by hi...
CRYPTOGRAPHY
To prevent the dissemination of sensitive information from the database to unauthorized users or outside competitive or hostile agents, an organization must establish effective security policies. The art of protecting in...