• No results found

Diffie-Hellman algorithm

Enhancing Bluetooth Authentication using Diffie Hellman Algorithm

Enhancing Bluetooth Authentication using Diffie Hellman Algorithm

... Bluetooth is a technology for connecting devices wirelessly to achieve data transfer at the rate of 720 kbps within a range of 10 to 100 meters. In existing authentication procedure for Bluetooth networks, four levels of ...

5

Improving the Security in Cloud Computing using Diffie- Hellman Algorithm

Improving the Security in Cloud Computing using Diffie- Hellman Algorithm

... The Diffie-Hellman algorithm depends for its effectiveness on the difficulty of computing discrete logarithms. We can define the discrete logarithm in the following way. First, we define a primitive ...

6

Enhance the Security in Cloud Computing  Using Diffie-Hellman Algorithm

Enhance the Security in Cloud Computing Using Diffie-Hellman Algorithm

... Cloud security is the main issue over the wide area network. Cloud computing provide various types of services like software, platform and application as a service. These services are accessed through internet. Cloud ...

5

Removing Security Issues Of Ipv6 Using Diffie Hellman Algorithm

Removing Security Issues Of Ipv6 Using Diffie Hellman Algorithm

... We introduce the simple solution with the less over head and it‟s very difficult almost impossible for the intruder to break the security of the network. First we are generating the random IP addresses of all the nodes, ...

7

Enhanced Diffie-Hellman Algorithm and its Applications

Enhanced Diffie-Hellman Algorithm and its Applications

... To make a more simple description we shall imagine two people – Alice and Bob[16] who want to securely exchange data.Suppose Alice and Bob want to agree on a shared secret key using the Diffie-Hellman key ...

9

Data Security in Cloud Using Aggregate Key and Diffie-Hellman Algorithm

Data Security in Cloud Using Aggregate Key and Diffie-Hellman Algorithm

... In this paper, proposed system is found to be very efficient for sharing the data on cloud. For this we have used Key aggregate encryption algorithm which support delegation of secret keys for different ciphertext ...

18

Implementation of DNA Cryptography in Cloud Computing and using Socket Programming

Implementation of DNA Cryptography in Cloud Computing and using Socket Programming

... Firstly Diffie-Hellman algorithm is used to generate keys for key exchange ...encryption algorithm is used to encrypt or decrypt user’s data file. Diffie- Hellman key exchange ...

5

Replay Attack Prevention by Using a Key with Random Number in Kerberos Authentication Protocol

Replay Attack Prevention by Using a Key with Random Number in Kerberos Authentication Protocol

... the Diffie-Hellman algorithm, and put the password in the token, then take the key which has added the dynamic factor as the sharing key between client and authentication server, this improvement can ...

7

Authentication using Secure Node Signature Verification Algorithm with Quantum Cryptography

Authentication using Secure Node Signature Verification Algorithm with Quantum Cryptography

... The development of computer system starts from resistor and transistor to IC (Integrated chip). Today advance techniques are applied to create chips of size fraction of micron wide [13]. Now research is going on to ...

5

Vol 1, No 7 (2013)

Vol 1, No 7 (2013)

... Diffie Hellman key exchange protocol is the most commonly used ...proposed algorithm through which parties can exchange information without knowing each ...This algorithm permits exchange even ...

5

MODIFIED HOMOMORPHIC ENCRYPTION ALGORITHM TO SECURE DATA IN CLOUD COMPUTING

MODIFIED HOMOMORPHIC ENCRYPTION ALGORITHM TO SECURE DATA IN CLOUD COMPUTING

... encryption algorithm is used in the virtual ...this algorithm, the safety of the network is on the risk ...this algorithm. To solve this problem in the virtual machine, the ...

8

Title: DEFENDING AGAINST VAMPIRE ATTACKS IN WIRELESS SENSOR NETWORKS

Title: DEFENDING AGAINST VAMPIRE ATTACKS IN WIRELESS SENSOR NETWORKS

... ABSTRACT: Wireless sensor network is a one main issue in wireless ad-hoc sensor network is wastage of energy at each sensor nodes. Energy is the one most important factor while considering sensor nodes. Wireless sensor ...

12

Pre-   and  post-quantum  Diffie--Hellman  from  groups,  actions,   and  isogenies

Pre- and post-quantum Diffie--Hellman from groups, actions, and isogenies

... about DiffieHellman and its ...group DiffieHellman oracles create black- box field structures on prime-order groups, while HHS DiffieHellman oracles create a black-box group ...

40

A Survey on New Image Encryption Algorithm Based on Diffie-Hellman and Singular Value Decomposition

A Survey on New Image Encryption Algorithm Based on Diffie-Hellman and Singular Value Decomposition

... on Diffie-Hellman Key Exchange, these keys used to encrypt the diagonal matrix which created by Singular-Value-Decomposition (SVD) in third ...with Diffie-Hellman Key ...

5

The ZRTP Protocol   Analysis on the Diffie Hellman mode

The ZRTP Protocol Analysis on the Diffie Hellman mode

... a Diffie-Hellman exchange to generate SRTP ses- sion parameters, providing confidentiality and protecting against Man-in-the-Middle attacks even without a public key infrastructure or endpoint ...

22

On  the  Bit  Security  of  Elliptic  Curve  Diffie--Hellman

On the Bit Security of Elliptic Curve Diffie--Hellman

... curve DiffieHellman key exchange that will lead to improvements either in the number of hardcore bits or in the required success probability for computing ...

31

Prevention of Collaborative Attacks using Elliptic Curve Diffie-Hellman in MANET

Prevention of Collaborative Attacks using Elliptic Curve Diffie-Hellman in MANET

... ABSTRACT : In past few decades, the migration of communication occurs from wired networks to wireless networks because of its mobility and scalability and MANET (Mobile Ad hoc Network) is a unique and significant ...

9

ON KEY EXCHANGE METHOD VIA TOPOLOGICAL CONCEPTS

ON KEY EXCHANGE METHOD VIA TOPOLOGICAL CONCEPTS

... Diffie-Hellman key exchange is a special method used to exchange cryptographic keys. This is one of the first practical key exchange examples applied in the field of cryptography. The ...

8

Choosing Secure Remote Access Technologies.

Choosing Secure Remote Access Technologies.

... Hashing algorithms have evolved into HMACs, which combine the proven security of hashing algorithms with additional cryptographic functions. The hash produced is encrypted with the sender’s private key, resulting in a ...

38

Secure Group Key Agreement Algorithm for Mobile Adhoc Networks

Secure Group Key Agreement Algorithm for Mobile Adhoc Networks

... hash algorithm. Our proposed scheme of the generalization group Diffie-Hellman key agreement algorithm is designed to avoid neighbor communication problem where the rekeying time, storage ...

11

Show all 10000 documents...

Related subjects