Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/332886
Title: | Optimized Authentication And Key Agreement Schemes For Communication Systems Using Cryptography |
Researcher: | Manoj Kumar Misra |
Guide(s): | Surya PrakashTripathi |
Keywords: | Computer Science Computer Science Software Engineering Engineering and Technology |
University: | Dr. A.P.J. Abdul Kalam Technical University |
Completed Date: | 2020 |
Abstract: | In current lifestyle communication security is of extreme importance, computer, laptops, mobiles newlineand other communication device are the part of network. We share data through email, chat newlineapplication and various client server models. We use password, PINs and other methods to newlineprotect our communication. The communication medium is in control of hackers and it makes newlineour data valuable to various security attacks. Hacker wants to steal the important information of newlinevarious user and they want to misuse it. Cryptology has essential component: - Cryptography and newlineCryptanalysis .Cryptography provides data security through various encryption algorithms newlinemethods and authentication protocols. On the other side, cryptanalysis deals in breaking the newlineencryption method .Cryptanalysis is used by hacker while users and security expert uses newlinecryptography .The role of cryptography is to provide new and innovative methods to provide newlinecommunication. Security and hacker always try to find out various loop holes in these methods newlinein order to steal the sensitive information and use it dishonestly. Nation has their own newlinecryptography policies and nowadays all organization, small or big has their own security related newlinepolicies .Because they see information as an asset. Various well known agencies like ISO, NIST newlineetc. provides various security guidelines. Cryptanalyst are now more equipped with increasing newlinecomputing power, parallel computing and they try to crack all security methods. The increased newlinecomputing power poses high threat to all existing cryptographic algorithm. newlineSo in this thesis we discuss these details and provide some security methods in the form of newlineauthentication and key agreement protocol, which are fruitful for the security at large. newlinevi newline |
Pagination: | |
URI: | http://hdl.handle.net/10603/332886 |
Appears in Departments: | dean PG Studies and Research |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
80_recommendation.pdf | Attached File | 359.28 kB | Adobe PDF | View/Open |
certificate.pdf | 345.23 kB | Adobe PDF | View/Open | |
chapter 1.pdf | 1.05 MB | Adobe PDF | View/Open | |
chapter 2.pdf | 312.94 kB | Adobe PDF | View/Open | |
chapter 3.pdf | 627.2 kB | Adobe PDF | View/Open | |
chapter 4.pdf | 650.5 kB | Adobe PDF | View/Open | |
chapter 5.pdf | 585.6 kB | Adobe PDF | View/Open | |
chapter 6.pdf | 665.15 kB | Adobe PDF | View/Open | |
prelimanary pages.pdf | 438.3 kB | Adobe PDF | View/Open | |
title.pdf | 36.86 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: