T R A C K       P A P E R
ISSN:2394-3661 | Crossref DOI | SJIF: 5.138 | PIF: 3.854

International Journal of Engineering and Applied Sciences

(An ISO 9001:2008 Certified Online and Print Journal)

Analysis on Secure Key Agreement Protocol Using Trusted Third Party Information Sensitivity Systems

( Volume 6 Issue 12,December 2019 ) OPEN ACCESS
Author(s):

Gnanasekaran P, Umadevi V

Abstract:

The study of security models for sensitive data systems has been taken on for years. Throughout this century, the thought of seeking the system security to the supply of system development lifecycle received Brobdingnagian improvement within the system and software system assurance domain. This paper expounds the understanding security by illustrating information security study development progress since pre-computer age and presents an outline of Internet and cyberization security by summarizing the established order of cyberization. Then a security model referred to as PDRL, which incorporates six core security attributes of sensitive data systems, is planned to safeguard the protection of sensitive data systems within the whole system life-cycle. Within the past, many key agreement protocols square measure planned on watchword based mostly mechanism. These protocols square measure prone to wordbook attacks. Storing plain text version of watchword on server isn't secure continuously. During this paper we have a tendency to utilize the service of a trustworthy third party, i.e., the Key Distribution server (KDS) for key agreement between the hosts. Now-a-days in massive operating environments 2 party key agreement protocols square measure being seldom used. During this planned theme, rather than storing plain text version of watchword we have a tendency to store a technique hash of the watchword at the server. Each host and server agrees upon family of independent unidirectional hash functions, victimization that host authentication is completed once a bunch applies for session key with KDS. Host establishes just once key with server victimization that server authentication is completed. Thanks to this man-in-the middle attacks square measure defeated. The planned protocol relies on Diffie-Hellman key exchange protocol.

DOI DOI :

https://dx.doi.org/10.31873/IJEAS.6.12.01

Paper Statistics:

Total View : 664 | Downloads : 655 | Page No: 1-5 |

Cite this Article:
Click here to get all Styles of Citation using DOI of the article.