International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 79    Submit Your Rating     Cite This   Download        Certificate

A REVIEW OF DEFFIE-HELLMAN KEY DESIGNING BY SILC PROTOCOL

    1 Author(s):  PARUL

Vol -  4, Issue- 3 ,         Page(s) : 475 - 480  (2013 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

In today’s society most of the people rely upon chatting services for communication as it is convenient and easy but people are not aware of the security risks associated with their messages. SILC provides that security compared to other chat messengers’ .A Secure Internet Live Conferencing (SILC) protocol is a chat protocol which provides secure conferencing services over insecure network channel. The security of SILC protocol sessions are based on strong and secure key exchange protocol. The SILC Key Exchange protocol is described in [SILC3] along with connection authentication protocol and should be read to fully comprehend this document and protocol. The best feature of SILC is that it does not allow the secret key to travel the network and still the keys are symmetric for both the clients. Its key generation process is based on Deffie-Hellman algorithm of key designing. Index Terms—SILC, key, protocol, client, server

order online

  1. http://www.silcnet.org
  2. en.wikipedia.org/wiki/SILC_ (protocol)
  3. IETF website  (http://www.ietf.org/)
  4. For comprehensive introduction to cryptography refer to (http://www.ssh.com/tech/crypto/)
  5. [SILC2] Riikonen, P., "SILC Packet Protocol", Internet Draft, January 2007.
  6. [SILC3] Riikonen, P.,"SILC Key Exchange and Authentication Protocols", Internet Draft, January 2007.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details