Pranav Vyas - Academia.edu (original) (raw)

Uploads

Papers by Pranav Vyas

Research paper thumbnail of An alternative technique to thwart multiplicity  attack in Denning-Sacco protocol using  timestamps

Cryptographic protocols are used to encrypt information and thus securing them while they are bei... more Cryptographic protocols are used to encrypt information and thus securing them while they are being transferred from one host
to another. However to understand information they need to be decrypted. Decryption process needs a key by which sender earlier
encrypted information. So, the exchange of this key is very crucial to security of communication session. One of protocol which facilitates
secure key exchange is Denning-Sacco protocol. The original Denning-Sacco protocol however is vulnerable to multiplicity There is an
existing method which solves this problem with use of nonce. In this paper we present an alternative technique to solve the problem
without using nonce and thus reducing number of steps of algorithm resulting in faster execution of algorithm.
Index Terms

Research paper thumbnail of Simulation Analysis of Session Key Exchange Protocols  based on Key Parameters

As the internet grows rapidly, role of security of information of users gain more importanc... more As the internet grows rapidly, role of security of information
of users gain more importance than ever. Key exchange
protocols are important in this regard. In this paper we
evaluate performance of well known key exchange
algorithms. In this paper we analyze their encryption speed
and their power consumption on different platforms. We
analyze algorithms on both traditional PC and mobile phones.
Experiment result shows that protocols which are less
computationally intensive and less power consuming but not
very secure. We select the protocol which is most suitable for
mobile computers.

Research paper thumbnail of An Analysis Of Session Key Exchange Protocols

Information security has been one of the most important aspects in today’s technology driv... more Information security has been one of the most
important aspects in today’s technology driven world.
By encrypting information we can secure information
from unauthorized access, even in case where use has
information he/she can not make out meaning of
message unless they have a key to decrypt information.
We review different techniques to exchange keys
between different computers and try to find best
suitable technique for mobile computers which have
limited processing power and battery capacity while
efficiently working on wireless network.

Research paper thumbnail of Analysis of Key Exchange Protocols using Session Keys

Security of information flowing through insecure network is becoming complicated with a... more Security of information flowing through insecure network is
becoming complicated with advent of internet and its usage.
Encrypting information is one way of securing it from
unauthorized access. This paper analyze techniques of
exchanging key through which encryption is performed. We
review the techniques on various parameters and find which
technique is best suitable for use in mobile computers with
limited processing power and battery capacity while
efficiently working on wireless networks.

Research paper thumbnail of An alternative technique to thwart multiplicity  attack in Denning-Sacco protocol using  timestamps

Cryptographic protocols are used to encrypt information and thus securing them while they are bei... more Cryptographic protocols are used to encrypt information and thus securing them while they are being transferred from one host
to another. However to understand information they need to be decrypted. Decryption process needs a key by which sender earlier
encrypted information. So, the exchange of this key is very crucial to security of communication session. One of protocol which facilitates
secure key exchange is Denning-Sacco protocol. The original Denning-Sacco protocol however is vulnerable to multiplicity There is an
existing method which solves this problem with use of nonce. In this paper we present an alternative technique to solve the problem
without using nonce and thus reducing number of steps of algorithm resulting in faster execution of algorithm.
Index Terms

Research paper thumbnail of Simulation Analysis of Session Key Exchange Protocols  based on Key Parameters

As the internet grows rapidly, role of security of information of users gain more importanc... more As the internet grows rapidly, role of security of information
of users gain more importance than ever. Key exchange
protocols are important in this regard. In this paper we
evaluate performance of well known key exchange
algorithms. In this paper we analyze their encryption speed
and their power consumption on different platforms. We
analyze algorithms on both traditional PC and mobile phones.
Experiment result shows that protocols which are less
computationally intensive and less power consuming but not
very secure. We select the protocol which is most suitable for
mobile computers.

Research paper thumbnail of An Analysis Of Session Key Exchange Protocols

Information security has been one of the most important aspects in today’s technology driv... more Information security has been one of the most
important aspects in today’s technology driven world.
By encrypting information we can secure information
from unauthorized access, even in case where use has
information he/she can not make out meaning of
message unless they have a key to decrypt information.
We review different techniques to exchange keys
between different computers and try to find best
suitable technique for mobile computers which have
limited processing power and battery capacity while
efficiently working on wireless network.

Research paper thumbnail of Analysis of Key Exchange Protocols using Session Keys

Security of information flowing through insecure network is becoming complicated with a... more Security of information flowing through insecure network is
becoming complicated with advent of internet and its usage.
Encrypting information is one way of securing it from
unauthorized access. This paper analyze techniques of
exchanging key through which encryption is performed. We
review the techniques on various parameters and find which
technique is best suitable for use in mobile computers with
limited processing power and battery capacity while
efficiently working on wireless networks.

Log In