REVIEW OF CRYPTOGRAPHY AND KEY EXCHANGE
Keywords:
Key Exchange, Protocol, Cryptography, Authentication, Confidential.Abstract
Cryptography is the science of converting the simple text into cipher text using various methods. The basic requirement of cryptography is need of secure data which satisfy the main principles like confidentiality, integrity, non repudiation etc. We will study the basics of cryptography and its type’s symmetric and asymmetric cryptography along with the key exchange problem with the conventional methods. We will also review the work related to the key exchange based on private key method in our paper.
References
Cryptography concepts, URL: http://en.wikipedia.org/wiki/private_key_crptography.
Key exchange problem, URL: http://en.wikipedia.org/wiki/keyagreement.
William Stalling, “Network security and cryptography “, secondedition, PHI publications, page 25-58, 2007.
Atul Kahate, “Cryptography and network security” second edition, Tata McGraw- Hill, page 21-103, 2009.
Diffie, W., Oorschot, P.C.V., Wiener, M.J., 1992, Authentication and authenticated key exchanges, Des. Codes Cryptography, 2, pp. 107-125.
[14] Tseng, Y.M., 2005, Weakness in simple authenticated key agreement scheme, Electronics. Letters 36 (1) pp. 48–49.
Seo, D.H., Sweeney, P., 1999, Simple authenticated key agreement algorithm, Electronics. Letters 35 (13) pp. 1073–1079.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.