A cryptographically secure protocol for key exchange

M.Sc. (Computer Science) === Since the emergence of electronic communication, scientists have strived to make these communication systems as secure as possible. Classical cryptographical methods provided secrecy, with the proviso that the courier delivering the keys could be trusted. This method of...

Full description

Bibliographic Details
Main Author: Herdan, David Errol
Published: 2014
Subjects:
Online Access:http://hdl.handle.net/10210/12037
id ndltd-netd.ac.za-oai-union.ndltd.org-uj-uj-12274
record_format oai_dc
spelling ndltd-netd.ac.za-oai-union.ndltd.org-uj-uj-122742017-09-16T04:02:25ZA cryptographically secure protocol for key exchangeHerdan, David ErrolCryptography - Data processingM.Sc. (Computer Science)Since the emergence of electronic communication, scientists have strived to make these communication systems as secure as possible. Classical cryptographical methods provided secrecy, with the proviso that the courier delivering the keys could be trusted. This method of key distribution proved to be too inefficient and costly. 'Cryptographical renaissance' was brought about with the advent of public key cryptography, in which the message key consists of a pair of mathematically complementary keys, instead of the symmetric keys of its forerunner. Classical cryptographical techniques were by no means obsolete, as the idea of using 'hybrid' systems proved to be very effective, by using the tedious public key techniques to allow both parties to share a secret, and the more efficient symmetric algorithms to actually encrypt the message. New technology leads, however, to new difficulties and the problems of key management now arose. Various protocols started emerging as solutions to the key distribution problem, each with their own advantages and disadvantages. The aim of this work is to critically review these protocols, analyse the shortfalls and attempt to design a protocol which will overcome these shortfalls. The class of protocol reviewed are the so-called 'strong authentication' protocols, whereby interaction between the message sender and recipient is required.2014-09-11Thesisuj:12274http://hdl.handle.net/10210/12037University of Johannesburg
collection NDLTD
sources NDLTD
topic Cryptography - Data processing
spellingShingle Cryptography - Data processing
Herdan, David Errol
A cryptographically secure protocol for key exchange
description M.Sc. (Computer Science) === Since the emergence of electronic communication, scientists have strived to make these communication systems as secure as possible. Classical cryptographical methods provided secrecy, with the proviso that the courier delivering the keys could be trusted. This method of key distribution proved to be too inefficient and costly. 'Cryptographical renaissance' was brought about with the advent of public key cryptography, in which the message key consists of a pair of mathematically complementary keys, instead of the symmetric keys of its forerunner. Classical cryptographical techniques were by no means obsolete, as the idea of using 'hybrid' systems proved to be very effective, by using the tedious public key techniques to allow both parties to share a secret, and the more efficient symmetric algorithms to actually encrypt the message. New technology leads, however, to new difficulties and the problems of key management now arose. Various protocols started emerging as solutions to the key distribution problem, each with their own advantages and disadvantages. The aim of this work is to critically review these protocols, analyse the shortfalls and attempt to design a protocol which will overcome these shortfalls. The class of protocol reviewed are the so-called 'strong authentication' protocols, whereby interaction between the message sender and recipient is required.
author Herdan, David Errol
author_facet Herdan, David Errol
author_sort Herdan, David Errol
title A cryptographically secure protocol for key exchange
title_short A cryptographically secure protocol for key exchange
title_full A cryptographically secure protocol for key exchange
title_fullStr A cryptographically secure protocol for key exchange
title_full_unstemmed A cryptographically secure protocol for key exchange
title_sort cryptographically secure protocol for key exchange
publishDate 2014
url http://hdl.handle.net/10210/12037
work_keys_str_mv AT herdandaviderrol acryptographicallysecureprotocolforkeyexchange
AT herdandaviderrol cryptographicallysecureprotocolforkeyexchange
_version_ 1718536667055259648