Academia.eduAcademia.edu

Outline

A novel process for key exchange avoiding man-inmiddle attack

2012

Abstract

For the security porpoise in the internet cryptography is one of the most important subjects nowadays. Designing a cypher for data exchange between two nodes or receiver and sender deals with one of the troubleshoot jobs. In our proposed algorithm we try to introduce a new technique in the field of cryptography. We are hopeful that this new technique will sure reduces the overhead of data or key exchange between nodes. Here we will discuss the symmetric key exchange between nodes.

References (14)

  1. Liddell and Scott's Greek-English Lexicon. Oxford University Press. (1984)
  2. Rivest, Ronald L. (1990). "Cryptology". In J. Van Leeuwen. Handbook of Theoretical Computer Science.
  3. Bellare, Mihir; Rogaway, Phillip (21 September 2005). "Introduction". Introduction to Modern Cryptography. p. 10.
  4. Menezes, PC van Oorschot, and SA Vanstone, Handbook of Applied Cryptography ISBN 0-8493- 8523-7.
  5. Behour A. Forouzan, Sophia Chung Fegan -Data Communication and Networking‖, Fourth Edition 2009.
  6. Berti, Hansche, Hare (2003). Official (ISC)² Guide to the CISSP Exam. Auerbach Publications. pp. 379. ISBN 0-8493-1707-X.
  7. Whitfield Diffie and Martin Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, vol. IT-22, Nov. 1976, pp: 644- 654
  8. Whitfield Diffie and Martin Hellman, "Multi-user cryptographic techniques",[Diffie and Hellman, AFIPS Proceedings 45, pp109-112, June 8, 1976].
  9. David Kahn, "Cryptology Goes Public", 58
  10. Foreign Affairs 141, 151 (fall 1979), p. 153.
  11. Dieter Gollmann -Computer Security Second Edition" West Sussex, England: John Wiley & Sons, Ltd. 2006.
  12. Diffie, W., Van Oorschot, P.C., Wiener, M.J. Authentication and authenticated key exchanges. Des. Codes Cryptography 2(2), 107-125, 1992.
  13. Frier, A., K.P., Kocher, P.. The secure socket layer. Technical report, Netscape Communications Corp,1996.
  14. Younglove, R.. Public key infrastructure. how it works. Computing & Control Engineering Journal 12, 99-102, 2001.