Please use this identifier to cite or link to this item:
https://idr.l1.nitk.ac.in/jspui/handle/123456789/6554
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Shetty, S. | - |
dc.contributor.author | Hegde, S. | - |
dc.contributor.author | Tahiliani, M.P. | - |
dc.date.accessioned | 2020-03-30T09:45:52Z | - |
dc.date.available | 2020-03-30T09:45:52Z | - |
dc.date.issued | 2011 | - |
dc.identifier.citation | Communications in Computer and Information Science, 2011, Vol.157 CCIS, , pp.226-232 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/6554 | - |
dc.description.abstract | Sharing of symmetric key between the sender and receiver for encryption and decryption is considered to be one of the major issues in the communication networks. It is due to the fact that the strength of cryptosystem depends not only on the strength of the key, but also on the underlying key exchange protocol. In this paper, we propose a Robust Two-way Locking Protocol which overcomes the drawback of Diffie-Hellman key exchange protocol in terms of flexibility provided to the sender for selecting the desired key. Moreover we demonstrate the applicability of the proposed protocol in TCP handshake and compare it with Secure TCP which is based on Diffie-Hellman (DH) key exchange protocol. Based on the simulation results it is observed that Robust Two-way Locking (RoToLo) Protocol incurs negligible overhead in the network while providing greater flexibility of key selection to the sender as compared to Secure TCP. � Springer-Verlag 2011. | en_US |
dc.title | Robust two-way locking protocol for key exchange | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.