DocumentCode :
3677870
Title :
Key Sharing Technique to Preserve Integrity and Confidentiality
Author :
Vaibhav Sharma;Kamal Kumar Gola;Gulista Khan;Rahul Rathore
fYear :
2015
fDate :
5/1/2015 12:00:00 AM
Firstpage :
504
Lastpage :
509
Abstract :
Cryptography is way to ensure security for information. It is used to provide secure communication between two entities i.e. Two persons or two organizations. "Cryptography provides hundred percent security" is an objectionable statement. The anarchists of computer world (i.e. Attacker, hacker) always try to break the magic of cryptosystems, and when they got lucky somehow they find a way to crack the code. History is full of examples where cryptographic approaches that were once considered invincible, were cracked with the small loopholes in their design. As cryptographers tries their best as per the knowledge & belief they have to design a cryptosystem, even then there remains some weakness. It may be because cryptographers are limited with their imaginations. In conjugation of data security key security is one of the critical issue. Sometimes in Cryptography we need to transfer the keys (i.e. Secret key or private key). Till date no such techniques is made to secure Key transmission which is free from any attack. So the objective of the proposed technique is to provide about to perfect or risk-free security. This Paper is proposing an algorithm to secure the secret key during transmission. This technique when properly implemented and used will reduced the attacks on key transmission. It will ensure that key transferred will be secure as well as integrated. This paper contains proposed algorithm as well as the implementation on test data.
Keywords :
"Receivers","Ciphers","Encryption","Public key","Computer hacking"
Publisher :
ieee
Conference_Titel :
Advances in Computing and Communication Engineering (ICACCE), 2015 Second International Conference on
Print_ISBN :
978-1-4799-1733-4
Type :
conf
DOI :
10.1109/ICACCE.2015.48
Filename :
7306737
Link To Document :
بازگشت