Debasis Gountia, Ranjita Champati, A. Pradhan, B. Mohanta
{"title":"Towards Security Aspects of Secret Key Transmission","authors":"Debasis Gountia, Ranjita Champati, A. Pradhan, B. Mohanta","doi":"10.1109/ICIT.2018.00023","DOIUrl":null,"url":null,"abstract":"On increasing more unreliable computer networks day by day, technological shifts in the fields of secret key communication for different applications among different parties and security are now converging. This paper is a contribution to the ongoing research in the design of security aspects of a secret key, and important field used to protect the confidentiality of secret key data from the man-in-the-middle-attack. Comparative study with traditional encryption schemes demonstrate the superiority of the proposed scheme without overhead of the encryption and decryption time.","PeriodicalId":221269,"journal":{"name":"2018 International Conference on Information Technology (ICIT)","volume":"286 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Information Technology (ICIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIT.2018.00023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
On increasing more unreliable computer networks day by day, technological shifts in the fields of secret key communication for different applications among different parties and security are now converging. This paper is a contribution to the ongoing research in the design of security aspects of a secret key, and important field used to protect the confidentiality of secret key data from the man-in-the-middle-attack. Comparative study with traditional encryption schemes demonstrate the superiority of the proposed scheme without overhead of the encryption and decryption time.