نتایج جستجو برای: Diffie-Hellman Key exchange protocol
تعداد نتایج: 950569 فیلتر نتایج به سال:
Author: Ayan Mahalanobis Title: Diffie-Hellman Key Exchange Protocol, its Generalization and Nilpotent Groups Dissertation Advisor: Dr. Spyros Magliveras Degree: Doctor of Philosophy Year: 2005 This dissertation has two chapters. In the first chapter we talk about the discrete logarithm problem, more specifically we concentrate on the Diffie-Hellman key exchange protocol. We survey the current ...
In 2008, based on the two-party Diffie–Hellman technique, Biswas proposed a contributory group key exchange protocol called the Group-DH protocol. This contributory property is an important one of group key agreement. Unfortunately, in this paper we show that the proposed Group-DH protocol is not a contributory group key exchange protocol. Therefore, we propose an improved group key exchange pr...
Abstract—RSA cryptography is an asymmetric communication protocol, and, AES the most used symmetric-key both are facing cryptanalysis attacks.. The famous key exchange protocol Diffie-Hellman; but it has issue of Logjam attack that allows man-in-middle in Diffie-Hellman. Thus, we combine RSA, AES, and Diffie-Hellman algorithm to provide security on called next generationDH or ngDH. Our objectiv...
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This memo describes a new key ex...
We present axioms and inference rules for reasoning about Diffie-Hellman-based key exchange protocols and use these rules to prove authentication and secrecy properties of two important protocol standards, the Diffie-Hellman variant of Kerberos, and IKEv2, the revised standard key management protocol for IPSEC. The new proof system is sound for an accepted semantics used in cryptographic studie...
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This memo describes a new key ex...
<span>Nowadays, with the advences in ICT and rapid development of mobile internet; media information shared on various communication networks requires existence adequate security measures. Cryptography becoming an effective way to meet these requirements for maintain confidentiality. However, communicating encrypted messages secret key exchange, which is a part complex protocol. In this p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید