IMPLEMENTATION OF ADHOC NETWORK TO ENABLE CENTRALIZED AND DISTRIBUTED COMPUTING AND RESOLVING SECURITY ISSUES USING PASSWORD AUTHENTICATED KEY EXCHANGE BY JUGGLING

Authors

  • Savita Sheoran Research Scholar, Department. Of CSE, PPIMT Hissar
  • Gagandeep Department of CSE, PPIMT Hissar

Keywords:

Centralized System, Distributed systems, security, Brute-force attack

Abstract

In this Research we have made implementation of distributed and centralized systems and the security issues associated with those systems. Four commonly used distributed systems were considered for detailed analysis in terms of technologies involved, security issues faced by them and solution proposed to circumvent those issues. Finally the security issues and the solutions were summarized and compared with each other. When systems work in this collaborative fashion with other systems that are geographically scattered over wide distance it is commonly known as a distributed system.

References

Boyko, V.; P. MacKenzie; S. Patel (2000). "Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman". Advances in Cryptology -- Eurocrypt 2000, LNCS. Lecture Notes in Computer Science (Springer-Verlag) 1807: 156. doi:10.1007/3-540-45539-6_12. ISBN 978-3-540-67517-4.

Abdalla, M.; D. Pointcheval (2005). "Simple Password-Based Encrypted Key Exchange Protocols" (PDF). Topics in Cryptology – CT-RSA 2005. Lecture Notes in Computer Science (Springer Berlin Heidelberg) 3376: 191–208. doi:10.1007/978-3-540-30574-3_14. ISBN 978-3-540-24399-1.

Bellare, M.; D. Pointcheval; P. Rogaway (2000). "Authenticated Key Exchange Secure against Dictionary Attacks". Advances in Cryptology -- Eurocrypt 2000 LNCS. Lecture Notes in Computer Science (Springer-Verlag) 1807: 139. doi:10.1007/3-540-45539-6_11. ISBN 978-3-540-67517-4.

Bellovin, S. M.; M. Merritt (May 1992). "Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks". Proceedings of the I.E.E.E. Symposium on Research in Security and Privacy (Oakland): 72. doi:10.1109/RISP.1992.213269. ISBN 0-8186-2825-1.

Ford, W.; B. Kaliski (14–16 June 2000). "Server-Assisted Generation of a Strong Secret from a Password". Proceedings of the IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (Gaithersburg MD: NIST): 176. doi:10.1109/ENABL.2000.883724. ISBN 0-7695-0798-0.

Goldreich, O.; Y. Lindell (2001). "Session-Key Generation Using Human Passwords Only". Advances in Cryptology -- Crypto 2001 LNCS (Springer-Verlag) 2139.

"IEEE Std 1363.2-2008: IEEE Standard Specifications for Password-Based Public-Key Cryptographic Techniques". IEEE. 2009.

Katz, J.; R. Ostrovsky; M. Yung (2001). "Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords" 2045. Springer-Vergal.

T. Wu. The SRP-3 Secure Remote Password Protocol. IETF RFC 2945.

Published

30-06-2016

How to Cite

Savita Sheoran, & Gagandeep. (2016). IMPLEMENTATION OF ADHOC NETWORK TO ENABLE CENTRALIZED AND DISTRIBUTED COMPUTING AND RESOLVING SECURITY ISSUES USING PASSWORD AUTHENTICATED KEY EXCHANGE BY JUGGLING. International Journal for Research Publication and Seminar, 7(2). Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/776

Issue

Section

Original Research Article