Abstract by anuja a sonalker on Asymmetric Key Distribution


Intention of the thesis and layout


Download 217.42 Kb.
Pdf ko'rish
bet7/43
Sana19.04.2023
Hajmi217.42 Kb.
#1365410
1   2   3   4   5   6   7   8   9   10   ...   43
Bog'liq
etd

1.2 Intention of the thesis and layout: 
Asymmetric Key Distribution (AKD) is a scheme for certificate signing where one server 
has veto authority and that no transaction is successful unless it involves the Special 
Server.  After giving an idea of the problem being tackled by this scheme, we discuss 
why present work is not enough to provide a satisfactory solution. 
Chapter 2 introduces the reader to the fundamental concepts in cryptography, which are 
extensively used throughout the development of the idea and this thesis. It introduces the 
RSA algorithm that we have used as the basis for our model and addresses the security 
concerns associated with RSA and other public key systems and the difficulty involved in 
breaking the algorithm through cryptanalysis. 




Chapter 3 introduces the AKD algorithm and provides details of the model, the 
mathematics involved and the proof for the algorithm. It follows with an example for 
easy understanding. The reader is made aware of security concerns related to AKD and 
key distribution and the modifications to overcome these concerns are briefly discussed. 
The Dual Threshold, which is a modification to the AKD to overcome a possible threat 
caused by imbalance of power, is discussed in detail in Chapter 5. 
Chapter 4 deals with implementation details of the algorithm, the method used for 
communication among the different entities, the test cases used to prove the validity of 
the algorithm, and an in-depth performance analysis.
Chapter 5 deals with a limitation of the AKD algorithm and describes the Dual Threshold 
variant of AKD. Since there is a substantial threat to the scheme if the Special Server is 
compromised, more intrusion tolerance is added by further subdividing the Special 
Server’s share. Again, some fault tolerance can be incorporated into the Special Server by 
introducing a threshold here. This scheme is called the Dual Threshold Scheme since 
there are two independent thresholds in this system.
Chapter 7 is a conclusion of what has been presented in the course of this thesis with a 
good analysis of the algorithm based on its performance metrics. A brief comparison with 
other similar algorithms is also made to highlight the effectiveness of the Asymmetric Key 
Distribution Algorithm. 




Download 217.42 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   10   ...   43




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling