نتایج جستجو برای: Diffie-Hellman Key exchange protocol

تعداد نتایج: 950569  

Journal: :The Open Cybernetics & Systemics Journal 2015

Journal: :IACR Cryptology ePrint Archive 2005
Ayan Mahalanobis

Author: Ayan Mahalanobis Title: Diffie-Hellman Key Exchange Protocol, its Generalization and Nilpotent Groups Dissertation Advisor: Dr. Spyros Magliveras Degree: Doctor of Philosophy Year: 2005 This dissertation has two chapters. In the first chapter we talk about the discrete logarithm problem, more specifically we concentrate on the Diffie-Hellman key exchange protocol. We survey the current ...

Journal: :Informatica, Lith. Acad. Sci. 2010
Yuh-Min Tseng Tsu-Yang Wu

In 2008, based on the two-party Diffie–Hellman technique, Biswas proposed a contributory group key exchange protocol called the Group-DH protocol. This contributory property is an important one of group key agreement. Unfortunately, in this paper we show that the proposed Group-DH protocol is not a contributory group key exchange protocol. Therefore, we propose an improved group key exchange pr...

Journal: :Indian Scientific Journal Of Research In Engineering And Management 2022

Abstract—RSA cryptography is an asymmetric communication protocol, and, AES the most used symmetric-key both are facing cryptanalysis attacks.. The famous key exchange protocol Diffie-Hellman; but it has issue of Logjam attack that allows man-in-middle in Diffie-Hellman. Thus, we combine RSA, AES, and Diffie-Hellman algorithm to provide security on called next generationDH or ngDH. Our objectiv...

2006
M Friedl Friedl

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This memo describes a new key ex...

2007
Arnab Roy Anupam Datta John C. Mitchell

We present axioms and inference rules for reasoning about Diffie-Hellman-based key exchange protocols and use these rules to prove authentication and secrecy properties of two important protocol standards, the Diffie-Hellman variant of Kerberos, and IKEv2, the revised standard key management protocol for IPSEC. The new proof system is sound for an accepted semantics used in cryptographic studie...

Journal: :RFC 2006
Markus Friedl Niels Provos William Allen Simpson

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This memo describes a new key ex...

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2021

<span>Nowadays, with the advences in ICT and rapid development of mobile internet; media information shared on various communication networks requires existence adequate security measures. Cryptography becoming an effective way to meet these requirements for maintain confidentiality. However, communicating encrypted messages secret key exchange, which is a part complex protocol. In this p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید