Please use this identifier to cite or link to this item:
Title: Parallel message transmission technique for three party encrypted key exchange protocol
Researcher: Rajkumar P
Guide(s): Manoharan C
Keywords: Information and communication engineering
Key exchange protocol
Upload Date: 27-Aug-2014
University: Anna University
Completed Date: 01/11/2013
Abstract: Password authenticated key agreement is an interactive method for two or more parties to communicate The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using the session key The session key which is exchanged between two users assures the secure communication for later sessions In the line of key exchange protocol development password based key exchange mechanism achieved attention due to its simplicity and wide range of applicability as it requires the users to remember the password Such protocol should not be vulnerable to any type of off line undetectable or detectable on line password guessing attacks since the passwords are of low entropy Password guessing attacks are undesirable in communication network and it reduces the network efficiency Encrypted key exchange protocol was a viable technique for the exchange of session key between the communicating parties Since the passwords are of low entropy these protocols are vulnerable to detectable and undetectable online password guessing attacks The existing protocol consist of client A B C and a trusted server S In the undetectable online password guessing attacks initially client A sends the authentication request to the newlineserver to begin communication with another client C Before the message reaches the server Client B retrieves the message decrypts it by guessing a password and guesses the value of random function where random function is calculated based on the random number chosen the generator number and large prime number Client B then encrypts the value of guessed random function using the session key of the server and retrieves the secret key between server and client B Then it encrypts the value using the password of client B The client then computes secret key and sends it to the server newline newline
Pagination: xvi, 160p.
Appears in Departments:Faculty of Information and Communication Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File25.86 kBAdobe PDFView/Open
02_certificate.pdf692.75 kBAdobe PDFView/Open
03_abstract.pdf11.99 kBAdobe PDFView/Open
04_acknowledgement.pdf8.17 kBAdobe PDFView/Open
05_contents.pdf30.14 kBAdobe PDFView/Open
06_chapter1.pdf220.05 kBAdobe PDFView/Open
07_chapter2.pdf169.03 kBAdobe PDFView/Open
08_chapter3.pdf230.38 kBAdobe PDFView/Open
09_chapter4.pdf159.34 kBAdobe PDFView/Open
10_chapter5.pdf1.08 MBAdobe PDFView/Open
11_chapter6.pdf15.83 kBAdobe PDFView/Open
12_referecnes.pdf228.25 kBAdobe PDFView/Open
13_publications.pdf21.34 kBAdobe PDFView/Open
14_vitae.pdf7.57 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: