Survey on Public key Encryption for Two Server Password only Authenticated Key Exchange
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064


Amazon Sale


Survey Paper | Computer Science & Engineering | India | Volume 3 Issue 12, December 2014

Survey on Public key Encryption for Two Server Password only Authenticated Key Exchange

Nishikant Burande, Gumaste S.V.

By using cryptographic key client and server establishes a connection in between them and authenticate each other. In other words they use password to authenticate that is Password-authenticated key exchange (PAKE). The password necessary to authenticate are stored in a single server. If server is hacked or due to insider attack it is compromised then all password may stole by hacker and they may misuse it. In this paper find a way to overcome this problem by using two servers to authenticate in which two servers cooperate to each other. If one server is compromised then attacker still cannot hack the passwords stored in server. For the said purpose two ways are there symmetric & asymmetric, in symmetric two servers equally contribute and in asymmetric one server authenticates the client with the help of another server. This paper presents a symmetric solution for two-server PAKE, where client can establish different cryptographic keys with two servers resp. Proposed protocol runs in parallel and is more efficient than existing symmetric two-server PAKE protocol.

Keywords: Cryptography, password only authenticated exchange, Diffie-Hellman key exchange, ElGamal encryption

Edition: Volume 3 Issue 12, December 2014

Pages: 252 - 255

Share this Article

How to Cite this Article?

Nishikant Burande, Gumaste S.V., "Survey on Public key Encryption for Two Server Password only Authenticated Key Exchange", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB14345, Volume 3 Issue 12, December 2014, 252 - 255

62 PDF Views | 51 PDF Downloads

Download Article PDF


Amazon Sale


Similar Articles with Keyword 'Cryptography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANET'S

Pranita Prakash Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1948 - 1954

A New Security Business Frame work for Resource Attestation in cloud Environment

Vallabhaneni. Hema Latha, Kolluru. Suresh Babu

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Similar Articles with Keyword 'Diffie-Hellman key exchange'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 252 - 255

Survey on Public key Encryption for Two Server Password only Authenticated Key Exchange

Nishikant Burande, Gumaste S.V.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 1758 - 1764

Data Transfer Based on Between the Node Coverge Area Using Diffe-Hellman Key Algorithm in Adhoc Network

T. Sankar, M. Prakash

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1235 - 1237

Single Sign-on Secure Password Mechanism for Distributed Computer Networks

Deepali M. Devkate, N. D. Kale

Share this Article

Similar Articles with Keyword 'ElGamal encryption'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 252 - 255

Survey on Public key Encryption for Two Server Password only Authenticated Key Exchange

Nishikant Burande, Gumaste S.V.

Share this Article

Dissertation Chapters, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1716 - 1720

To Secure Efficient Two-Server Password and Authenticate Key Exchange using Transaction Processing System against Dictionary Attack

Sonal Chandrakant Pansare, V. S. Nandedkar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 12 - 16

Secure e-Commerce Transactions using ElGamal Elliptic Curve Cryptosystem

Srishti Sharma

Share this Article
Top