A cryptographically secure protocol for key exchange
M.Sc. (Computer Science) === Since the emergence of electronic communication, scientists have strived to make these communication systems as secure as possible. Classical cryptographical methods provided secrecy, with the proviso that the courier delivering the keys could be trusted. This method of...
Main Author: | |
---|---|
Published: |
2014
|
Subjects: | |
Online Access: | http://hdl.handle.net/10210/12037 |
id |
ndltd-netd.ac.za-oai-union.ndltd.org-uj-uj-12274 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-netd.ac.za-oai-union.ndltd.org-uj-uj-122742017-09-16T04:02:25ZA cryptographically secure protocol for key exchangeHerdan, David ErrolCryptography - Data processingM.Sc. (Computer Science)Since the emergence of electronic communication, scientists have strived to make these communication systems as secure as possible. Classical cryptographical methods provided secrecy, with the proviso that the courier delivering the keys could be trusted. This method of key distribution proved to be too inefficient and costly. 'Cryptographical renaissance' was brought about with the advent of public key cryptography, in which the message key consists of a pair of mathematically complementary keys, instead of the symmetric keys of its forerunner. Classical cryptographical techniques were by no means obsolete, as the idea of using 'hybrid' systems proved to be very effective, by using the tedious public key techniques to allow both parties to share a secret, and the more efficient symmetric algorithms to actually encrypt the message. New technology leads, however, to new difficulties and the problems of key management now arose. Various protocols started emerging as solutions to the key distribution problem, each with their own advantages and disadvantages. The aim of this work is to critically review these protocols, analyse the shortfalls and attempt to design a protocol which will overcome these shortfalls. The class of protocol reviewed are the so-called 'strong authentication' protocols, whereby interaction between the message sender and recipient is required.2014-09-11Thesisuj:12274http://hdl.handle.net/10210/12037University of Johannesburg |
collection |
NDLTD |
sources |
NDLTD |
topic |
Cryptography - Data processing |
spellingShingle |
Cryptography - Data processing Herdan, David Errol A cryptographically secure protocol for key exchange |
description |
M.Sc. (Computer Science) === Since the emergence of electronic communication, scientists have strived to make these communication systems as secure as possible. Classical cryptographical methods provided secrecy, with the proviso that the courier delivering the keys could be trusted. This method of key distribution proved to be too inefficient and costly. 'Cryptographical renaissance' was brought about with the advent of public key cryptography, in which the message key consists of a pair of mathematically complementary keys, instead of the symmetric keys of its forerunner. Classical cryptographical techniques were by no means obsolete, as the idea of using 'hybrid' systems proved to be very effective, by using the tedious public key techniques to allow both parties to share a secret, and the more efficient symmetric algorithms to actually encrypt the message. New technology leads, however, to new difficulties and the problems of key management now arose. Various protocols started emerging as solutions to the key distribution problem, each with their own advantages and disadvantages. The aim of this work is to critically review these protocols, analyse the shortfalls and attempt to design a protocol which will overcome these shortfalls. The class of protocol reviewed are the so-called 'strong authentication' protocols, whereby interaction between the message sender and recipient is required. |
author |
Herdan, David Errol |
author_facet |
Herdan, David Errol |
author_sort |
Herdan, David Errol |
title |
A cryptographically secure protocol for key exchange |
title_short |
A cryptographically secure protocol for key exchange |
title_full |
A cryptographically secure protocol for key exchange |
title_fullStr |
A cryptographically secure protocol for key exchange |
title_full_unstemmed |
A cryptographically secure protocol for key exchange |
title_sort |
cryptographically secure protocol for key exchange |
publishDate |
2014 |
url |
http://hdl.handle.net/10210/12037 |
work_keys_str_mv |
AT herdandaviderrol acryptographicallysecureprotocolforkeyexchange AT herdandaviderrol cryptographicallysecureprotocolforkeyexchange |
_version_ |
1718536667055259648 |