Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/333004
Title: Optimized Authentication And Key Agreement Schemes For Communication Systems Using Cryptography
Researcher: Manoj Kumar Misra
Guide(s): Surya PrakashTripathi Atul Chaturvedi
Keywords: Computer Science
Computer Science Hardware and Architecture
Engineering and Technology
University: Dr. A.P.J. Abdul Kalam Technical University
Completed Date: 2020
Abstract: In current lifestyle communication security is of extreme importance, computer, laptops, mobiles newlineand other communication device are the part of network. We share data through email, chat newlineapplication and various client server models. We use password, PINs and other methods to newlineprotect our communication. The communication medium is in control of hackers and it makes newlineour data valuable to various security attacks. Hacker wants to steal the important information of newlinevarious user and they want to misuse it. Cryptology has essential component: - Cryptography and newlineCryptanalysis .Cryptography provides data security through various encryption algorithms newlinemethods and authentication protocols. On the other side, cryptanalysis deals in breaking the newlineencryption method .Cryptanalysis is used by hacker while users and security expert uses newlinecryptography .The role of cryptography is to provide new and innovative methods to provide newlinecommunication. Security and hacker always try to find out various loop holes in these methods newlinein order to steal the sensitive information and use it dishonestly. Nation has their own newlinecryptography policies and nowadays all organization, small or big has their own security related newlinepolicies .Because they see information as an asset. Various well known agencies like ISO, NIST newlineetc. provides various security guidelines. Cryptanalyst are now more equipped with increasing newlinecomputing power, parallel computing and they try to crack all security methods. The increased newlinecomputing power poses high threat to all existing cryptographic algorithm. newlineSo in this thesis we discuss these details and provide some security methods in the form of newlineauthentication and key agreement protocol, which are fruitful for the security at large. newlinevi newline
Pagination: 
URI: http://hdl.handle.net/10603/333004
Appears in Departments:dean PG Studies and Research

Files in This Item:
File Description SizeFormat 
80_recommendation.pdfAttached File359.28 kBAdobe PDFView/Open
certificate.pdf345.23 kBAdobe PDFView/Open
chapter 1.pdf1.05 MBAdobe PDFView/Open
chapter 2.pdf312.94 kBAdobe PDFView/Open
chapter 3.pdf627.2 kBAdobe PDFView/Open
chapter 4.pdf650.5 kBAdobe PDFView/Open
chapter 5.pdf585.6 kBAdobe PDFView/Open
chapter 6.pdf665.15 kBAdobe PDFView/Open
prelimanary pages.pdf438.3 kBAdobe PDFView/Open
title.pdf36.86 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: