43 research outputs found

    An Efficient Two-Party Identity-Based Key Exchange Protocol based on ECDLP

    Get PDF
    This paper presents an efficient identity-based key exchange protocol based on the difficulty of computing a Elliptic Curve Discrete Lgarithm Problem. As compared with the previously proposed protocols, it has better performance in terms of the computational cost and the communication steps. Key exchange protocols allow two parties communicating over a public network to establish a common secret key called session key to encrypt the communication data. Due to their significance by in building a secure communication channel, a number of key exchange protocols have been suggested over the years for a variety of settings.The proposed key exchange protocol provides implicit key authentication as well as the desired security attributes of an authenticated key exchange protocol

    Set Down Study of Projectile in Flight Through Imaging

    Get PDF
    Deformation study of projectile immediately after firing is essential for its successful impact. A projectile that undergoes more than the tolerated amount of deformation in the barrel may not produce the requisite results. The study of projectile deformation before its impact requires it to be imaged in flight and perform some computation on the acquired image. Often the deformation tolerance is of the order of tens of micrometer and the acquired image cannot produce image with such accuracy because of photographic limitations. Therefore, it demands sub-pixel manipulation of the captured projectile image. In this work the diameter of a projectile is estimated from its image which became blur because of slow shutter speed. First the blurred image is restored and then various interpolation methods are used for sub-pixel measurement. Two adaptive geometrical texture based interpolation schemes are also proposed in this research. The proposed methods produce very good results as compared to the existing methods.Science Journal, Vol. 64, No. 6, November 2014, pp.530-535, DOI:http://dx.doi.org/10.14429/dsj.64.811

    A secure deniable authentication protocol based on Bilinear Diffie Hellman algorithm, Cryptology eprint Archive

    Get PDF
    Abstract. This paper describes a new deniable authentication protocol whose security is based Diffe-Hellman (CDH) Problem of type Decisional Diffie-Hellman(DDH) and the Hash Diffie-Hellman (HDDH) problem.This protocol can be implemented in low power and small processor mobile devices such as smart card, PDA etc which work in low power and small processor. A deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation over the internet. Our proposed protocol will be achieving the most three security requirement like deniable authentication, Confidentialities and also it is resistant against Man-in middle Attack
    corecore