DSpace Repository

A Key Distribution Technique with Strong Authentication

Show simple item record

dc.contributor.author Tasnim, Saba
dc.date.accessioned 2020-12-28T07:07:57Z
dc.date.available 2020-12-28T07:07:57Z
dc.date.issued 2020-07-09
dc.identifier.uri http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/5421
dc.description.abstract In current correspondence age, security of electronic message exchange is the excitement of time. It is usually head in different edges. Right now a huge amount of secure information is transmitted over the open system or web or other correspondence channels typically. Without solid check, we can't shield this fragile data from toxic ambushes. Starting at now, it is principal stress to compel additional security organizations to the passing on message, correspondence channel and granting individuals. For this, an unmatched framework for electronic message exchange structure has been made C# programming language. It performs electronic message exchanges with all the key flow security necessities, which are secret, unwavering quality, attestation and non-renouncement for both offering message and passing on people. To do this, unmistakable cryptographic encryption and unraveling systems are utilized to the passing on messages. From the earliest starting point message is scrambles with the private key of sender PRa and the yield is again encodes with a shared puzzle key Ks that makes cipherext, this normal riddle key Ks that makes a code that fills in as message authenticator known as MAC, which is interfaces with the ciphertext and again encodes them with shared secret key Ks that fabricates the new cphertext, which is again scrambles with the finder's open key PUb to last ciphertext that will be send to the intendent recipient. In the not actually alluring end, to recover the message, beneficiary from the earliest starting point unravels the got data with his private key PRb and again unscrambles with the normal riddle key Ks that gives the ciphertext and MAC of the ciphertext, and affirmation just unwinds the MAC to make another ciphertext′ and multifaceted nature the new ciphertext′ and they got ciphertext that guarantees the ciphertext endorsement comparably as message check; on the off chance that ciphertexts are discovered same, by then interprets the ciphertext with shared secret key Ks and again translates with the sender open key PUa and recover the message; in any case dispose of it. This system can be applied any place of electronic exchanges an ensured way. en_US
dc.language.iso en en_US
dc.publisher Daffodil International University en_US
dc.subject Programming Language en_US
dc.subject Information Exchange en_US
dc.title A Key Distribution Technique with Strong Authentication en_US
dc.type Other en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account

Statistics