Digital Signature and Key Agreement
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2013, Vol 1, Issue 7
Abstract
Diffie Hellman key exchange protocol is the most commonly used protocol. This protocol is used to exchange keys in a network. But it has bit m to exchange keys over a network but it has some drawbacks. This is the first proposed algorithm through which parties can exchange information without knowing each other. This algorithm permits exchange even over a insecure networks. Hellman algorithm was introduced by Martin Hellman and Whitfield Diffie in 1976. It is useful over a large number of authenticated protocols. Moreover, it works on transport layers too. In this research efforts are being made to declare new agreement protocol based on key confirmation and Diffie Hellman algorithm as well. This work also ensures the digital signature standard (DSS) with the help of Diffie-Hellman key exchange protocol by making use of two integers randomly. This protocol also performs on the elliptic curve cryptography in asymmetric encryption.
Authors and Affiliations
Krishna Kant| Research Scholar, B. R. Ambedkar University, Muzaffarpur, India, natkhatkk@gmail.com, Fahim Iqbal| Fahim Iqbal, Department of I T, L N Mishra College of Business Management, Muzaffarpur, Md Irshad Alam| Md Irshad Alam, Research Scholar, MIT, Muzaffarpur, India
Role of Cloud Computing in Health Monitoring System
Patient care is the focus of many clinical disciplines application but it is very complex as patient care is the essential information for direct patient care is defined on the applications. The present applications...
Deduplication Systems Using The Ramp Secret Sharing Scheme
Deduplication systems are ensured as far as the definitions specific in the security display, document level deduplication, which discover redundancies flanked by various records and take these redundancies to declin...
A Novel Approach to Naturally Mine Equivalent Elements from Relative Questions
An examination action generally contains hunt down material web pages containing data about the focused on items, find contending items, read audits and recognize upsides and downsides. In this paper we concentrate o...
Proficient Authentication Mechanism for Mobile and Pervasive Computing
Mobile Computing is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link. With today’s technology...
Verification Of Scalable Distributed Service Integrity For SoftwareAs-A-Service Clouds
Cloud is providing 3 types of services IaaS, PaaS and SaaS. Software as a Service (SaaS) is a software distribution model in which applications are hosted by a vendor or service provider and made available to customer...