Sunday, July 30, 2017

A Public Key Encryption Algorithm for Network Security

Enhanced Public Key Encryption Algorithm for Security of Network

Abstract -- Network security has become more important to personal computer users, organizations, and the military. With the advent of the internet,
security became a major concern and the history of security allows a better understanding of the emergence of security technology. The internet
structure itself allowed for many security threats to occur. When the architecture of the internet is modified it can reduce the possible attacks that can be
sent across the network. Knowing the attack methods, allows for the appropriate security to emerge. By means of firewalls and encryption mechanisms
many businesses secure themselves from the internet. The businesses create an "intranet" to remain connected to the internet but secured from
possible threats. Data integrity is quite a issue in security and to maintain that integrity we tends to improve as to provides the better encryption
processes for security. In our proposed work we will make encryption harder with enhanced public key encryption protocol for security and will discuss
the applications for proposed work. We will enhance the hardness in security by improving the Diffie-Hellman encryption algorithm by making changes or
adding some more security codes in current algorithm.

REFERENCES
[1] Farhat, Farshid, Somayeh Salimi, and Ahmad Salahi. "Private
Identification, Authentication and Key Agreement Protocol with
Security Mode Setup." IACR Cryptology ePrint Archive 2011.
[2] Emmanuel Bresson, Olivier Chevassut, David
Pointcheva, Jean-Jacques Quisquater, "Authenticated
Group Diffie-Hellman Key Exchange", Computer and
Communication Security- proc of ACM CSS'01,
Philadelphia, Pennsylvania, USA, Pages 255-264, ACM Press,
November 5-8, 2001.
[3] Mario Cagaljm, Srdjan Capkun and Jean-Pierre
Hubaux," Key agreement in peer-to-peer wireless
networks", Ecole Polytechnique F´ed´erale de Lausanne
(EPFL), CH-1015 Lausanne.
[4] Michel Abdalla, Mihir Bellare, Phillip Rogaway,"
DHIES: An encryption scheme based on the Diffie-Hellman
Problem", September 18, 2001.
[5] Jean-Fran¸cois Raymond, Anton Stiglic," Security Issues
in the Diffie-Hellman Key Agreement Protocol".
[6] Whitfield Diffie and Martin E. Hellman," New Directions
in Cryptography", invited paper.
[7] F. Lynn Mcnulty," Encryption's importance to
economic and infrastructure security" in 2002.
[8] Tony Chung and Utz Roedig," Poster Abstract: DHBKEY -A Diffie-Hellman Key Distribution Protocol for
Wireless Sensor Networks", Infolab21, Lancaster University,
UK.
[9] A. Chandrasekar, V.R. Rajasekar, V. Vasudevan,"
Improved Authentication and Key Agreement Protocol
Using Elliptic Curve Cryptography" in 2006.
[10] SANS Institute Info Sec Reading Room," A Review of
the Diffie-Hellman Algorithm and its use in Secure
Internet Protocols".
*11+ Paul C. Kocher, "Timing Attacks on Implementations of
Diffie-Hellman, RSA, DSS, and Other Systems", Cryptography
Research, Inc. 607 Market Street, 5th Floor, San Francisco, CA
94105, USA.
[12] Brita Vesterås," Analysis of Key Agreement Protocols",
Mtech Thesis, Department of Computer Science and Media
Technology, Gjovik University College, 2006
[13] (2006) The YouTube website [online]. Available:
[14] (2008) The YouTube website [online]. Available:
[15] (2011) The Wikipedia website [online]. Available:
[16] (2009) The Wikipedia website [online]. Available:
xchange.

Monday, July 17, 2017

The children of the dream

فهرست نوشته ها