Study of Three Pass Protocol on Data Security
Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 11)Publication Date: 2016-11-05
Authors : Robbi Rahim; Ali Ikhwan;
Page : 102-104
Keywords : Cryptography; Symetric And Asymmetric; Protocol Cryptography; Three Pass Protocol;
Abstract
Cryptography is a field that has developed very rapidly with the number of algorithms that keep popping up with this type of symmetric and asymmetric which has advantages and disadvantages of each, one of the problems that arise in cryptography type of symmetric is the key distribution should be given sender to the receiver's tackle the key distribution process used a cryptographic protocol three pass protocol has a way of working in which the sender and receiver do not need to exchange keys
Other Latest Articles
- Secure Communication Algorithm in Web-Services
- Comparative Analysis of Algoflora of Fergana Valley Water Reservoirs
- A Comprehensive Floristic Study of Jabalpur District with Special Emphasis to Dominant Family
- A Case Study on Financial Stability of Nestle India Ltd.
- Non-Equilibrium Two Dimensional Electron-Lattice Interaction at Low Temperature
Last modified: 2021-07-01 14:47:12