Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/332886
Full metadata record
DC FieldValueLanguage
dc.coverage.spatial
dc.date.accessioned2021-07-20T10:42:39Z-
dc.date.available2021-07-20T10:42:39Z-
dc.identifier.urihttp://hdl.handle.net/10603/332886-
dc.description.abstractIn current lifestyle communication security is of extreme importance, computer, laptops, mobiles newlineand other communication device are the part of network. We share data through email, chat newlineapplication and various client server models. We use password, PINs and other methods to newlineprotect our communication. The communication medium is in control of hackers and it makes newlineour data valuable to various security attacks. Hacker wants to steal the important information of newlinevarious user and they want to misuse it. Cryptology has essential component: - Cryptography and newlineCryptanalysis .Cryptography provides data security through various encryption algorithms newlinemethods and authentication protocols. On the other side, cryptanalysis deals in breaking the newlineencryption method .Cryptanalysis is used by hacker while users and security expert uses newlinecryptography .The role of cryptography is to provide new and innovative methods to provide newlinecommunication. Security and hacker always try to find out various loop holes in these methods newlinein order to steal the sensitive information and use it dishonestly. Nation has their own newlinecryptography policies and nowadays all organization, small or big has their own security related newlinepolicies .Because they see information as an asset. Various well known agencies like ISO, NIST newlineetc. provides various security guidelines. Cryptanalyst are now more equipped with increasing newlinecomputing power, parallel computing and they try to crack all security methods. The increased newlinecomputing power poses high threat to all existing cryptographic algorithm. newlineSo in this thesis we discuss these details and provide some security methods in the form of newlineauthentication and key agreement protocol, which are fruitful for the security at large. newlinevi newline
dc.format.extent
dc.languageEnglish
dc.relation
dc.rightsself
dc.titleOptimized Authentication And Key Agreement Schemes For Communication Systems Using Cryptography
dc.title.alternative
dc.creator.researcherManoj Kumar Misra
dc.subject.keywordComputer Science
dc.subject.keywordComputer Science Software Engineering
dc.subject.keywordEngineering and Technology
dc.description.note
dc.contributor.guideSurya PrakashTripathi
dc.publisher.placeLucknow
dc.publisher.universityDr. A.P.J. Abdul Kalam Technical University
dc.publisher.institutiondean PG Studies and Research
dc.date.registered2013
dc.date.completed2020
dc.date.awarded2020
dc.format.dimensions
dc.format.accompanyingmaterialNone
dc.source.universityUniversity
dc.type.degreePh.D.
Appears in Departments:dean PG Studies and Research

Files in This Item:
File Description SizeFormat 
80_recommendation.pdfAttached File359.28 kBAdobe PDFView/Open
certificate.pdf345.23 kBAdobe PDFView/Open
chapter 1.pdf1.05 MBAdobe PDFView/Open
chapter 2.pdf312.94 kBAdobe PDFView/Open
chapter 3.pdf627.2 kBAdobe PDFView/Open
chapter 4.pdf650.5 kBAdobe PDFView/Open
chapter 5.pdf585.6 kBAdobe PDFView/Open
chapter 6.pdf665.15 kBAdobe PDFView/Open
prelimanary pages.pdf438.3 kBAdobe PDFView/Open
title.pdf36.86 kBAdobe PDFView/Open


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: