A Secure Cryptographic Puzzle based Approach Ensuring TotalSecurity for transmitted Information with IP Tracing

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: Today internet is extremely affected by several attacks such as Denial-of-Service attacks. The source IP address in a packet can be falsified. Thus IP Protocol fails to determine the originator. The attacker performs IP Spoofing and creates attacks. Thus for determining the real source of the attacker several IP Traceback schemes come forward. The available schemes have their own advantages and disadvantages. Computational Complexity is considered as common drawback. With the aim of overcoming the drawback an IP Traceback Digital Signature Algorithm is used for ensuring security for the transmitted data using Socketcommunication As all the available methodologies for IP Traceback, the current approach also focuses only on tracing attacker. With the aim of ensuring a Total security, a Cryptographic puzzle based scheme is also incorporated along with the new approach for preventing Hackers. Here certain puzzles are also used for encrypting the message along with the available methodology. Here the opponent cannot solve the puzzle until the encrypted packet reaches the destination. . The scheme is implemented based on a share market based application. The security of the scheme is also analyzed

Authors and Affiliations

Sruthy R. S.

Keywords

Related Articles

Visual GDML, an open-source software for building and visualizing Geant4 geometry based on the GDML markup language

Background and Objective: An open-source software called VisualGDML which is dedicated for geometrical and material specifications using the GDML markup language has been developed for Monte Carlo Geant4 code. Methods: T...

 Teneur: A LINUX based offline content management system

 Abstract: This technical section provides a brief synopsis about our offline content management system. The main purpose of this system is to manage the resources such as text files, images in a more synchronized m...

Automatic Text Extraction System for Complex Images

Abstract : The Intelligent text extraction system automatically identifies and extracts the text present in different types of images. The growth of digital world Detection and Extraction of text regions in an image are...

 Cryptanalysis of Efficient Unlinkable Secret Handshakes forAnonymous Communications

 Abstract: Several unlinkable secret handshakes schemes have been proposed in recent years. As performingthe successful secret handshakes is essentially equivalent to computing a common key between two interactiveme...

Network Layer Attacks: Analysis & Solutions, A Survey

Abstract - An ever-existing concern is the lack of security due to the very fact that the technology is wireless and is vulnerable to security threats & attacks. Also, among the wide-spread characteristics of a CR, s...

Download PDF file
  • EP ID EP126890
  • DOI -
  • Views 136
  • Downloads 0

How To Cite

Sruthy R. S. (2014).  A Secure Cryptographic Puzzle based Approach Ensuring TotalSecurity for transmitted Information with IP Tracing. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 27-32. https://www.europub.co.uk/articles/-A-126890