Implementation of Schnorr Digital Signature into Station-to-Station Protocol / Nurul Mahira Budin, Nor Hafikah Othman and Nur Izzatie Farhana Ahmad Fauzan
From our previous research, we found that Diffie-Hellman key exchange conceded two parties to share and build the common private key over an insecure channel. But it does not help in authenticate the communicating entities as it itself is a non-authenticated key agreement protocol and this will lead...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Student Project |
| Language: | en |
| Published: |
2018
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/50517/1/50517.pdf https://ir.uitm.edu.my/id/eprint/50517/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | From our previous research, we found that Diffie-Hellman key exchange conceded two parties to share and build the common private key over an insecure channel. But it does not help in authenticate the communicating entities as it itself is a non-authenticated key agreement protocol and this will lead to "man-in-the-middle" attack. Then, we upgrade Diffie-Hellman into Stationto- Station (STS) protocol. However, STS doesn't have complete element as it's only a procedure method. Thus, we implement Schnorr Digital Signature into STS protocol to use Schnorr elements in completing the key exchange process. This implementation can help in avoiding intruder-in-the-middle attack and provide authentication for both parties. To put it briefly, Schnorr Digital Signature can be implemented into Station-to-Station protocol by using numerical equations and have been proved in this project by using graphical user interface (GUI). As a recommendation, in order to improve this project, the researchers may provide data integrity by using Hashing algorithm. |
|---|
