IMPLEMENTATION OF ADHOC NETWORK TO ENABLE CENTRALIZED AND DISTRIBUTED COMPUTING AND RESOLVING SECURITY ISSUES USING PASSWORD AUTHENTICATED KEY EXCHANGE BY JUGGLING
Keywords:
Centralized System, Distributed systems, security, Brute-force attackAbstract
In this Research we have made implementation of distributed and centralized systems and the security issues associated with those systems. Four commonly used distributed systems were considered for detailed analysis in terms of technologies involved, security issues faced by them and solution proposed to circumvent those issues. Finally the security issues and the solutions were summarized and compared with each other. When systems work in this collaborative fashion with other systems that are geographically scattered over wide distance it is commonly known as a distributed system.
References
Boyko, V.; P. MacKenzie; S. Patel (2000). "Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman". Advances in Cryptology -- Eurocrypt 2000, LNCS. Lecture Notes in Computer Science (Springer-Verlag) 1807: 156. doi:10.1007/3-540-45539-6_12. ISBN 978-3-540-67517-4.
Abdalla, M.; D. Pointcheval (2005). "Simple Password-Based Encrypted Key Exchange Protocols" (PDF). Topics in Cryptology – CT-RSA 2005. Lecture Notes in Computer Science (Springer Berlin Heidelberg) 3376: 191–208. doi:10.1007/978-3-540-30574-3_14. ISBN 978-3-540-24399-1.
Bellare, M.; D. Pointcheval; P. Rogaway (2000). "Authenticated Key Exchange Secure against Dictionary Attacks". Advances in Cryptology -- Eurocrypt 2000 LNCS. Lecture Notes in Computer Science (Springer-Verlag) 1807: 139. doi:10.1007/3-540-45539-6_11. ISBN 978-3-540-67517-4.
Bellovin, S. M.; M. Merritt (May 1992). "Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks". Proceedings of the I.E.E.E. Symposium on Research in Security and Privacy (Oakland): 72. doi:10.1109/RISP.1992.213269. ISBN 0-8186-2825-1.
Ford, W.; B. Kaliski (14–16 June 2000). "Server-Assisted Generation of a Strong Secret from a Password". Proceedings of the IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (Gaithersburg MD: NIST): 176. doi:10.1109/ENABL.2000.883724. ISBN 0-7695-0798-0.
Goldreich, O.; Y. Lindell (2001). "Session-Key Generation Using Human Passwords Only". Advances in Cryptology -- Crypto 2001 LNCS (Springer-Verlag) 2139.
"IEEE Std 1363.2-2008: IEEE Standard Specifications for Password-Based Public-Key Cryptographic Techniques". IEEE. 2009.
Katz, J.; R. Ostrovsky; M. Yung (2001). "Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords" 2045. Springer-Vergal.
T. Wu. The SRP-3 Secure Remote Password Protocol. IETF RFC 2945.
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 International Journal for Research Publication and Seminar
This work is licensed under a Creative Commons Attribution 4.0 International License.
Re-users must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. This license allows for redistribution, commercial and non-commercial, as long as the original work is properly credited.