Abstract by anuja a sonalker on Asymmetric Key Distribution
Intention of the thesis and layout
Download 217.42 Kb. Pdf ko'rish
|
etd
1.2 Intention of the thesis and layout:
Asymmetric Key Distribution (AKD) is a scheme for certificate signing where one server has veto authority and that no transaction is successful unless it involves the Special Server. After giving an idea of the problem being tackled by this scheme, we discuss why present work is not enough to provide a satisfactory solution. Chapter 2 introduces the reader to the fundamental concepts in cryptography, which are extensively used throughout the development of the idea and this thesis. It introduces the RSA algorithm that we have used as the basis for our model and addresses the security concerns associated with RSA and other public key systems and the difficulty involved in breaking the algorithm through cryptanalysis. . 5 Chapter 3 introduces the AKD algorithm and provides details of the model, the mathematics involved and the proof for the algorithm. It follows with an example for easy understanding. The reader is made aware of security concerns related to AKD and key distribution and the modifications to overcome these concerns are briefly discussed. The Dual Threshold, which is a modification to the AKD to overcome a possible threat caused by imbalance of power, is discussed in detail in Chapter 5. Chapter 4 deals with implementation details of the algorithm, the method used for communication among the different entities, the test cases used to prove the validity of the algorithm, and an in-depth performance analysis. Chapter 5 deals with a limitation of the AKD algorithm and describes the Dual Threshold variant of AKD. Since there is a substantial threat to the scheme if the Special Server is compromised, more intrusion tolerance is added by further subdividing the Special Server’s share. Again, some fault tolerance can be incorporated into the Special Server by introducing a threshold here. This scheme is called the Dual Threshold Scheme since there are two independent thresholds in this system. Chapter 7 is a conclusion of what has been presented in the course of this thesis with a good analysis of the algorithm based on its performance metrics. A brief comparison with other similar algorithms is also made to highlight the effectiveness of the Asymmetric Key Distribution Algorithm. |
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling