International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 107

Research Paper | Information Technology | India | Volume 4 Issue 2, February 2015


Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem

Fatima Joselyn Mystica | Gopalakrishnan Prakash


Abstract: Cryptography is the idea of protected communication. Security guaranteed by different crypto ways of encryption, decryption, secret key establishment, etc. One such way is Keyless Cryptosystem. This new technique of Cryptosystem uses the procedure where security is guaranteed by concealing the distinctiveness of the sender of the information by not using the usual crypto techniques. Keyless does not mean that there are no keys, it actually means the procedure of hiding the senders Identity by using the random secret key. The sender and receiver of the communication use a protocol that crafts a random key. These ambiguous keys do not allow the middle man to get an idea on the key imagining that the channel of communication is anonymous. This unidentified channel is ideal to hide the senders identity, without affecting the actual message passed between the sender and the receiver. This is a leap over in the findings of cryptography. By using very limited or no Crypto techniques the security of communication between the dispatcher and recipient of message. Many Algorithms stand as a proof to the efficient working of this novel technique. A study of this is elaborated in this research paper. This technique is efficiently used in smart phones running on iOS, Android for assuring at most security


Keywords: Third Party TTP, Public Key Cryptosystem PKC, Man in the Middle MitM attack, SHOT Protocol, Shave Method, Shack Method


Edition: Volume 4 Issue 2, February 2015,


Pages: 2030 - 2033


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Fatima Joselyn Mystica, Gopalakrishnan Prakash, "Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem", International Journal of Science and Research (IJSR), Volume 4 Issue 2, February 2015, pp. 2030-2033, https://www.ijsr.net/get_abstract.php?paper_id=SUB151640

Similar Articles with Keyword 'Third'

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E | Ajay.R | K. Durairaj [3]

Share this Article

Downloads: 17 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, India, Volume 11 Issue 4, April 2022

Pages: 201 - 229

Weiner Model

Binayaka Mishra

Share this Article
Top