Title :
Key Sharing Technique to Preserve Integrity and Confidentiality
Author :
Vaibhav Sharma;Kamal Kumar Gola;Gulista Khan;Rahul Rathore
fDate :
5/1/2015 12:00:00 AM
Abstract :
Cryptography is way to ensure security for information. It is used to provide secure communication between two entities i.e. Two persons or two organizations. "Cryptography provides hundred percent security" is an objectionable statement. The anarchists of computer world (i.e. Attacker, hacker) always try to break the magic of cryptosystems, and when they got lucky somehow they find a way to crack the code. History is full of examples where cryptographic approaches that were once considered invincible, were cracked with the small loopholes in their design. As cryptographers tries their best as per the knowledge & belief they have to design a cryptosystem, even then there remains some weakness. It may be because cryptographers are limited with their imaginations. In conjugation of data security key security is one of the critical issue. Sometimes in Cryptography we need to transfer the keys (i.e. Secret key or private key). Till date no such techniques is made to secure Key transmission which is free from any attack. So the objective of the proposed technique is to provide about to perfect or risk-free security. This Paper is proposing an algorithm to secure the secret key during transmission. This technique when properly implemented and used will reduced the attacks on key transmission. It will ensure that key transferred will be secure as well as integrated. This paper contains proposed algorithm as well as the implementation on test data.
Keywords :
"Receivers","Ciphers","Encryption","Public key","Computer hacking"
Conference_Titel :
Advances in Computing and Communication Engineering (ICACCE), 2015 Second International Conference on
Print_ISBN :
978-1-4799-1733-4
DOI :
10.1109/ICACCE.2015.48