Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 107

Research Paper | Information Technology | India | Volume 4 Issue 2, February 2015

Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem

Fatima Joselyn Mystica, Gopalakrishnan Prakash

Cryptography is the idea of protected communication. Security guaranteed by different crypto ways of encryption, decryption, secret key establishment, etc. One such way is Keyless Cryptosystem. This new technique of Cryptosystem uses the procedure where security is guaranteed by concealing the distinctiveness of the sender of the information by not using the usual crypto techniques. Keyless does not mean that there are no keys, it actually means the procedure of hiding the senders Identity by using the random secret key. The sender and receiver of the communication use a protocol that crafts a random key. These ambiguous keys do not allow the middle man to get an idea on the key imagining that the channel of communication is anonymous. This unidentified channel is ideal to hide the senders identity, without affecting the actual message passed between the sender and the receiver. This is a leap over in the findings of cryptography. By using very limited or no Crypto techniques the security of communication between the dispatcher and recipient of message. Many Algorithms stand as a proof to the efficient working of this novel technique. A study of this is elaborated in this research paper. This technique is efficiently used in smart phones running on iOS, Android for assuring at most security

Keywords: Third Party TTP, Public Key Cryptosystem PKC, Man in the Middle MitM attack, SHOT Protocol, Shave Method, Shack Method

Edition: Volume 4 Issue 2, February 2015

Pages: 2030 - 2033

Share this Article

How to Cite this Article?

Fatima Joselyn Mystica, Gopalakrishnan Prakash, "Establishing Secret Key in Wireless Environment by Using Techniques of Keyless Cryptosystem", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB151640, Volume 4 Issue 2, February 2015, 2030 - 2033

Enter Your Email Address




Similar Articles with Keyword 'Third'

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Downloads: 99

Research Paper, Information Technology, India, Volume 3 Issue 3, March 2014

Pages: 138 - 141

Impact of Family Media Environment on Childrens Leisure Time Activities

B. N. Neelima

Share this Article

Similar Articles with Keyword 'Party'

Downloads: 2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Downloads: 2

Research Paper, Information Technology, Vietnam, Volume 10 Issue 4, April 2021

Pages: 798 - 803

Enhancing the Legal Awareness of Vietnamese Basic Officers

Tran Thuy Linh

Share this Article

Similar Articles with Keyword 'Public'

Downloads: 6

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Downloads: 86

Research Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1896 - 1909

Users Experience with E-Journal Features: A Research Survey of Aerospace Scientists and Engineers of Bangalore

R. Guruprasad, P. Marimuthu

Share this Article

Similar Articles with Keyword 'Key'

Downloads: 0

Survey Paper, Information Technology, Iraq, Volume 10 Issue 7, July 2021

Pages: 1341 - 1348

Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study

Zainab Dalaf Katheeth, Bashar Dheyaa Noor, Ammar Dheyaa Noor

Share this Article

Downloads: 57

Research Paper, Information Technology, Malaysia, Volume 10 Issue 1, January 2021

Pages: 889 - 896

Usage of Predictive Analytics during COVID-19 Pandemic to Support Administrative Decision Making in Health Care

Fatimetou Zahra Mohamed Mahmoud, Noor Azizah Mohamadali

Share this Article

Similar Articles with Keyword 'Cryptosystem'

Downloads: 109

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 1285 - 1288

Key Aggregate Cryptosystem for Data Sharing in Cloud Computing

Rohit Tate, Jyoti Pingalkar

Share this Article

Downloads: 110

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1984 - 1987

Lossless and Reversible Data Hiding in Asymmetric Cryptography

Prashant Gholve, H. A. Hingoliwala

Share this Article

Similar Articles with Keyword 'Man'

Downloads: 136

Research Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 24 - 27

An Approach for Canny Edge Detection Algorithm on Face Recognition

A. D. Chitra, Dr. P. Ponmuthuramalingam

Share this Article

Downloads: 0

Survey Paper, Information Technology, Iraq, Volume 10 Issue 7, July 2021

Pages: 1341 - 1348

Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study

Zainab Dalaf Katheeth, Bashar Dheyaa Noor, Ammar Dheyaa Noor

Share this Article

Similar Articles with Keyword 'Middle'

Downloads: 109

Survey Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 991 - 996

Survey of Optimized CSP Migration

Kadlag R A, Devikar R N

Share this Article

Downloads: 114

Research Paper, Information Technology, Nigeria, Volume 4 Issue 3, March 2015

Pages: 1998 - 2006

Cloud Based E-Learning Model for Open and Distance Learning in Nigerian Universities

D. R Aremu, Babatunde Peter JACOB, Peter M Ogedebe

Share this Article

Similar Articles with Keyword 'attack'

Downloads: 6

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 307 - 310

CCTV Cameras Hacking and Prevention Techniques

Preeti Rana

Share this Article

Downloads: 7

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 369 - 371

Performing Attacks on Radio Frequency and Embedded based Systems

Preeti Rana

Share this Article

Similar Articles with Keyword 'Protocol'

Downloads: 86

Survey Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 1315 - 1318

SIP Over NON-TLS vs TLS Environment

Prapti Priya Nayak, G. Sujatha

Share this Article

Downloads: 97

Survey Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2568 - 2570

Survey on NMS Supporting Network Elements implementing Heterogeneous Protocols

Sheik Nousheen Taj, Dr. Sagar B M

Share this Article

Similar Articles with Keyword 'Method'

Downloads: 178

Research Paper, Information Technology, Afghanistan, Volume 8 Issue 9, September 2019

Pages: 235 - 240

IT Based Land Suitability Modeling for Urban Development Using GIS: A Case Study of Kabul City, Afghanistan

Hazrat Mohammad Wahdaty

Share this Article

Downloads: 136

Research Paper, Information Technology, India, Volume 4 Issue 11, November 2015

Pages: 24 - 27

An Approach for Canny Edge Detection Algorithm on Face Recognition

A. D. Chitra, Dr. P. Ponmuthuramalingam

Share this Article



Top