首页    期刊浏览 2025年06月16日 星期一
登录注册

文章基本信息

  • 标题:Authentication key Exchange by Using Privacy Preserving over the Internet
  • 本地全文:下载
  • 作者:Priyanka A. Wankhade ; Dinesh Datar
  • 期刊名称:International Journal of Electronics, Communication and Soft Computing Science and Engineering
  • 印刷版ISSN:2277-9477
  • 出版年度:2015
  • 卷号:4
  • 期号:Special 3
  • 出版社:IJECSCSE
  • 摘要:How to make people keep both security and privacy in communication networks has been a hot topic in recent years. Due to advances in technology and communication, it requires more effort to ensure security. It is essential that every organization has the right level of security. In recent communication systems, as there is more and more use of internet, the security services have become essential. Authentication in security had emerged to be an essential factor in the key establishment over internet. It seems that recently Yang et.al propose provably secure 3PAKA protocol for secure exchange and similarly Key-exchange in Diffie¨CHellman key- exchange (DHKE) is among the core cryptographic mechanisms to ensure network security .The DIKE (Deniable Internet Key Exchange) was the family of privacy preserving authenticated DHKE protocol, both in the traditional PKI setting and in the identity based setting. There are lots of mechanism are provided for key exchange mechanism in recent year as given, but these mechanism only secure the message or key which is share by both trusted party over the internet, but if the intruder authenticate the message which is send by the sender and when that message will receive by receiver without knowing that this message is already accessed by the intruder then what. There will be no use of that accessed message or key. So in this project there is a database in which the key sent by sender to receiver will be stored already, so that when receiver receives the valid key only that key will match with the key which is stored in the database and the message or the document which is sent by sender can be accessed by the receiver ,as well as if the intruder knows the secret key then also he cannot accessed the message For that, the concept of Internet key exchange(IKE),and REA Algorithm are used
国家哲学社会科学文献中心版权所有