Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4774
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChaudhari, Narendra S.en_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:27Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:27Z-
dc.date.issued2012-
dc.identifier.citationSaxena, N., & Chaudhari, N. S. (2012). Analysis of el-gamal with diffie-hellman scheme using hash-function for message security. Paper presented at the 2012 Students Conference on Engineering and Systems, SCES 2012, , 2012-January 55-60.en_US
dc.identifier.isbn9781467304559-
dc.identifier.otherEID(2-s2.0-84983474722)-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4774-
dc.description.abstractThe security of SMS is important when a secret code or one-time password is used while send a message from one mobile to another like in m-commerce, m-banking, for bank account details etc. in GSM network. Whenever this kind of data is moved through wireless mobile system, it must be encrypted with one-time password so that even mobile operator couldn't access it. Password based system provides a secure secret key by exchanging the public keys between sender and receiver over the communication channel. This secret key is used to encrypt or decrypt the message. The Diffie-Hellman key exchange scheme and El-Gamal scheme are suitable for this kind of operation to be performed. After exchanging the public keys, sender and receiver both generate the secret key. This key can be used as a secure secret key. In this paper we'll see the key exchange operation by both the schemes. One more property Integrity must be maintained while the data is transferred over the channel or in air. The security of these schemes can be increased by using hash functions. Next, a comparative analysis shows that El-Gamal key exchange with hash function scheme is more secure than Diffie-Hellman key exchange with hash function scheme. At the end, the proposed approach based on both the schemes, is successfully implemented and able to prevent from some attacks like man-in-middle attack, reply attack, message disclosure attack etc. ©2012 IEEE.en_US
dc.language.isoenen_US
dc.publisherIEEE Computer Societyen_US
dc.source2012 Students Conference on Engineering and Systems, SCES 2012en_US
dc.subjectAuthenticationen_US
dc.subjectCryptographyen_US
dc.subjectGlobal system for mobile communicationsen_US
dc.subjectHash functionsen_US
dc.subjectMobile commerceen_US
dc.subjectNetwork securityen_US
dc.subjectPublic key cryptographyen_US
dc.subjectSamariumen_US
dc.subjectDiffie-Hellman key exchangeen_US
dc.subjectDiscrete logarithmsen_US
dc.subjectMan-in-middle attacksen_US
dc.subjectPassworden_US
dc.subjectPassword-based systemsen_US
dc.subjectPrime numberen_US
dc.subjectSecret keyen_US
dc.subjectWireless mobile systemsen_US
dc.subjectMobile securityen_US
dc.titleAnalysis of El-Gamal with Diffie-Hellman scheme using Hash-function for message securityen_US
dc.typeConference Paperen_US
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: