Implementation of Lamport Digital Signature Scheme in Station-to-station Protocol / Nur Ainaa Mat Abu ... [et al.]
Cryptography is a method that guarantees the authenticity and integrity of a message between the communication parties. There are two types of cryptography, private key, and public key cryptography. In public key cryptography, a pair of keys will be used, public key to encrypt the message and privat...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Monograph |
Language: | English |
Published: |
UiTM Cawangan Negeri Sembilan
2021
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/65245/1/65245.pdf https://ir.uitm.edu.my/id/eprint/65245/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uitm.ir.65245 |
---|---|
record_format |
eprints |
spelling |
my.uitm.ir.652452022-08-18T04:23:30Z https://ir.uitm.edu.my/id/eprint/65245/ Implementation of Lamport Digital Signature Scheme in Station-to-station Protocol / Nur Ainaa Mat Abu ... [et al.] Mat Abu, Nur Ainaa Mohamad Sarif, Siti Nurfazliana Mohammad Zuki, Intan Nur Athirah Udin, Md Nizam AP Periodicals PN Literature (General) Mathematical statistics. Probabilities Data processing Cryptography is a method that guarantees the authenticity and integrity of a message between the communication parties. There are two types of cryptography, private key, and public key cryptography. In public key cryptography, a pair of keys will be used, public key to encrypt the message and private key to decrypt the message. In the cryptography process, it involved the key exchange protocol in which both parties will exchange their keys for the encryption and decryption process. One of the methods to securely exchange the keys is Diffie-Hellman Key Exchange (DHKE) protocol. DHKE allows both parties to safely exchange their keys over the insecure public channel (Paar & Pelzl, 2010). However, DHKE protocol has a problem in the algorithm part where it does not provide the authentication for the message, and this will make it easily exposed to third party interruption like Man-in-the-Middle (MitM) attack (Nan Li, 2010). Thus, in this paper propose the new algorithm in Station to Station (STS) protocol by implementing Lamport digital signature to provide the authentication in DHKE protocol. UiTM Cawangan Negeri Sembilan 2021-11 Monograph NonPeerReviewed text en https://ir.uitm.edu.my/id/eprint/65245/1/65245.pdf Implementation of Lamport Digital Signature Scheme in Station-to-station Protocol / Nur Ainaa Mat Abu ... [et al.]. (2021) Bulletin. UiTM Cawangan Negeri Sembilan. |
institution |
Universiti Teknologi Mara |
building |
Tun Abdul Razak Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Mara |
content_source |
UiTM Institutional Repository |
url_provider |
http://ir.uitm.edu.my/ |
language |
English |
topic |
AP Periodicals PN Literature (General) Mathematical statistics. Probabilities Data processing |
spellingShingle |
AP Periodicals PN Literature (General) Mathematical statistics. Probabilities Data processing Mat Abu, Nur Ainaa Mohamad Sarif, Siti Nurfazliana Mohammad Zuki, Intan Nur Athirah Udin, Md Nizam Implementation of Lamport Digital Signature Scheme in Station-to-station Protocol / Nur Ainaa Mat Abu ... [et al.] |
description |
Cryptography is a method that guarantees the authenticity and integrity of a message between the communication parties. There are two types of cryptography, private key, and public key cryptography. In public key cryptography, a pair of keys will be used, public key to encrypt the message and private key to decrypt the message. In the cryptography process, it involved the key exchange protocol in which both parties will exchange their keys for the encryption and decryption process. One of the methods to securely exchange the keys is Diffie-Hellman Key Exchange (DHKE) protocol. DHKE allows both parties to safely exchange their keys over the insecure public channel (Paar & Pelzl, 2010). However, DHKE protocol has a problem in the algorithm part where it does not provide the authentication for the message, and this will make it easily exposed to third party interruption like Man-in-the-Middle (MitM) attack (Nan Li, 2010). Thus, in this paper propose the new algorithm in Station to Station (STS) protocol by implementing Lamport digital signature to provide the authentication in DHKE protocol. |
format |
Monograph |
author |
Mat Abu, Nur Ainaa Mohamad Sarif, Siti Nurfazliana Mohammad Zuki, Intan Nur Athirah Udin, Md Nizam |
author_facet |
Mat Abu, Nur Ainaa Mohamad Sarif, Siti Nurfazliana Mohammad Zuki, Intan Nur Athirah Udin, Md Nizam |
author_sort |
Mat Abu, Nur Ainaa |
title |
Implementation of Lamport Digital Signature Scheme in Station-to-station Protocol / Nur Ainaa Mat Abu ... [et al.] |
title_short |
Implementation of Lamport Digital Signature Scheme in Station-to-station Protocol / Nur Ainaa Mat Abu ... [et al.] |
title_full |
Implementation of Lamport Digital Signature Scheme in Station-to-station Protocol / Nur Ainaa Mat Abu ... [et al.] |
title_fullStr |
Implementation of Lamport Digital Signature Scheme in Station-to-station Protocol / Nur Ainaa Mat Abu ... [et al.] |
title_full_unstemmed |
Implementation of Lamport Digital Signature Scheme in Station-to-station Protocol / Nur Ainaa Mat Abu ... [et al.] |
title_sort |
implementation of lamport digital signature scheme in station-to-station protocol / nur ainaa mat abu ... [et al.] |
publisher |
UiTM Cawangan Negeri Sembilan |
publishDate |
2021 |
url |
https://ir.uitm.edu.my/id/eprint/65245/1/65245.pdf https://ir.uitm.edu.my/id/eprint/65245/ |
_version_ |
1743110435463233536 |
score |
13.211869 |