Call For Paper Volume:5 Issue:8 Aug'2018 |

Authenticating Secret Key-Exchange Between Two Parties

Publication Date : 31/03/2015

Author(s) :


Volume/Issue :
Volume 2
Issue 3
(03 - 2015)

Abstract :

Key-exchange, in particular Diffie–Hellman key exchange (DHKE), is among the core cryptographic mechanisms for ensuring network security. For key-exchange, both security and privacy are desired. The proposed scheme is used to exchange the secret key by implementing the Shamir secret sharing scheme. The secret can be splitted into shares based on the threshold values, it refers to way for distributing a secret amongst a discussion of sender and receiver and the other parties include in transaction. The secret key will be reconstructed solely through equal number of shares. Individual shares are of no use on their own. Using Shamir Secret sharing, we have been enhance the approach for this present work, that it will reconstruct the secret key through the procedure of dividing into parts that is given into the each specified participants on own unique part, and some of the parts are need that to be reconstruct the secret key only the receiver verified based on their unique identity. Then the receiver receives the key of all the parts and decryption is made to message. In this work, introduce an new approach of sharing message in the way of authentication, it will produce more authentication than other secret sharing methods, because the reconstruction of key is determined and the message authentication is undetermined to hackers or illegal users.

No. of Downloads :



Web Design MymensinghPremium WordPress ThemesWeb Development

Authenticating Secret Key-Exchange Between Two Parties

March 8, 2015