2 research outputs found

    Study and Analysis of End-to-End Encryption Message Security Using Diffie-Hellman Key Exchange Encryption

    Get PDF
    The development of the field of communication has progressed rapidly. One example is a message exchange application like Whatsapp. The advancement of technology and innovation in the field of communication has allowed us to connect with people around the world in an easier and faster way. However, with advances in communication technology, new challenges arise related to information security and privacy of messages that have been sent. One solution to overcome this problem is to apply Cryptographic Techniques. In cryptography, data sent over the network will be disguised in such a way with encryption techniques so that even if the data can be read, it cannot be understood by unauthorized parties. The data to be sent without being encoded is known as plaintext, and after being disguised in an encoding way, this plaintext will turn into ciphertext. The method chosen for this journal is the Diffie-Hellman Key Exchange. In this journal, an analysis will be carried out regarding the end-to-end process of securing encrypted messages using the Python programming language

    Efficient Security Protocols for Fast Handovers in Wireless Mesh Networks

    Get PDF
    Wireless mesh networks (WMNs) are gaining popularity as a flexible and inexpensive replacement for Ethernet-based infrastructures. As the use of mobile devices such as smart phones and tablets is becoming ubiquitous, mobile clients should be guaranteed uninterrupted connectivity and services as they move from one access point to another within a WMN or between networks. To that end, we propose a novel security framework that consists of a new architecture, trust models, and protocols to offer mobile clients seamless and fast handovers in WMNs. The framework provides a dynamic, flexible, resource-efficient, and secure platform for intra-network and inter-network handovers in order to support real-time mobile applications in WMNs. In particular, we propose solutions to the following problems: authentication, key management, and group key management. We propose (1) a suite of certificate-based authentication protocols that minimize the authentication delay during handovers from one access point to another within a network (intra-network authentication). (2) a suite of key distribution and authentication protocols that minimize the authentication delay during handovers from one network to another (inter-network authentication). (3) a new implementation of group key management at the data link layer in order to reduce the group key update latency from linear time (as currently done in IEEE 802.11 standards) to logarithmic time. This contributes towards minimizing the latency of the handover process for mobile members in a multicast or broadcast group
    corecore