REVIEW OF CRYPTOGRAPHY AND KEY EXCHANGE

Authors

  • Ishu Saini M. tech. student, CBS group of institution, Jhajjar, Haryana
  • Rajiv Mishra A.P. in CSE deptt,CBS group of institution, Jhajjar, Haryana

Keywords:

Key Exchange, Protocol, Cryptography, Authentication, Confidential.

Abstract

Cryptography is the science of converting the simple text into cipher text using various methods. The basic requirement of cryptography is need of secure data which satisfy the main principles like confidentiality, integrity, non repudiation etc. We will study the basics of cryptography and its type’s symmetric and asymmetric cryptography along with the key exchange problem with the conventional methods. We will also review the work related to the key exchange based on private key method in our paper.

References

Cryptography concepts, URL: http://en.wikipedia.org/wiki/private_key_crptography.

Key exchange problem, URL: http://en.wikipedia.org/wiki/keyagreement.

William Stalling, “Network security and cryptography “, secondedition, PHI publications, page 25-58, 2007.

Atul Kahate, “Cryptography and network security” second edition, Tata McGraw- Hill, page 21-103, 2009.

Diffie, W., Oorschot, P.C.V., Wiener, M.J., 1992, Authentication and authenticated key exchanges, Des. Codes Cryptography, 2, pp. 107-125.

[14] Tseng, Y.M., 2005, Weakness in simple authenticated key agreement scheme, Electronics. Letters 36 (1) pp. 48–49.

Seo, D.H., Sweeney, P., 1999, Simple authenticated key agreement algorithm, Electronics. Letters 35 (13) pp. 1073–1079.

Downloads

Published

30-06-2015

How to Cite

Ishu Saini, & Rajiv Mishra. (2015). REVIEW OF CRYPTOGRAPHY AND KEY EXCHANGE. International Journal for Research Publication and Seminar, 6(2), 1–7. Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/1396

Issue

Section

Original Research Article