Meticulous Tasks of Various Cryptographic Techniques in Secure Communications

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - November Issue 2013 by IJCTT Journal
Volume-5 Issue-4                           
Year of Publication : 2013
Authors :Dr. P. Ramesh Babu , D. Nagamalleswara Rao , Hunde Merga Dugassa , Abebe Gemeda

MLA

Dr. P. Ramesh Babu , D. Nagamalleswara Rao , Hunde Merga Dugassa , Abebe Gemeda"Meticulous Tasks of Various Cryptographic Techniques in Secure Communications"International Journal of Computer Trends and Technology (IJCTT),V5(4):214-220 November Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:- Our main intention of writing this paper is to provide a understandable knowledge about cryptographic techniques. This paper deals with various Message Authentication Codes, Hash functions and encryption techniques and provides in-depth analysis of these techniques. This paper also provides a discussion of how the two related fields of encryption and hash functions are complementary, not replacement technologies for one another.

References

-
[1] Eastlake, Motorola, Jones. “RFC 3174 - US Secure Hash Algorithm 1 (SHA1)“, http://www.faqs.org/rfcs/rfc3174.html
[2] Frankel, S. “Internet Draft - The HMAC-SHA-256-128 Algorithm and Its Use With Ipsec”, http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ciphsha-256-01.txt
[3] IBM Press Release. “IBM Selected to Build World`s Most Powerful ComputingGrid”, August 2001. http://www- 916.ibm.com/press/prnews.nsf/jan/7613B7AF8EA527D385256AA3006EC06B
[4] Krawczyk, Bellare, Canetti. “RFC 2104- HMAC: Keyed-Hashing for Message Authentication”, http://www.ietf.org/rfc/rfc2104.txt
[5] Lynch, William. “Getting Started with Tripwire (Open Source Linux Edition)”, http://www.linuxsecurity.com/feature_stories/feature_story-81.html.
[6] Oehler, Glenn. “RFC 2085 - HMAC-MD5 IP Authentication with Replay Prevention”, http://www.cis.ohio-state.edu/cgibin/rfc/rfc2085.html
[7] Palmgren, Keith. “Diffie-Hellman Key Exchange - A Non-Mathematician`s Explanation”, http://networking.earthweb.com/netsecur/article.php/624441
[8] Prosise, Chris; Shahm Saumil. “Anatomy of a Hack”, January 2001. http://dotphoto.cnet.com/webbuilding/0-7532-8-4561014-2.html
[9] Rivest, R. “RFC 1321 - The MD5 Message-Digest Algorithm“, April 1992, http://www.cis.ohio-state.edu/rfc/rfc1321.txt
[10] RSA Laboratories. “What are MD2, MD4, and MD5?”, Date Unknown. http://www.rsasecurity.com/rsalabs/faq/3-6-6.html.
[11] RSA Laboratories. “What is a hash function?”, http://www.rsasecurity.com/rsalabs/faq/2-1-6.html
[12] RSA Laboratories. “What are Message Authentication Codes” http://www.rsasecurity.com/rsalabs/faq/2-1-7.html
[13] Sptizner, Lance. “What is MD5, and why do I care”, http://www.spitzner.net/md5.html
[14] Sun Microsystems. “JavaTM Secure Socket Extension (JSSE) Reference Guide”, http://java.sun.com/j2se/1.4.1/docs/guide/security/jsse/JSSERefGuide.html
[15] Wikipedia. “SHA-1”, http://www.wikipedia.org/wiki/SHA-1
[16] Network Security Essentials by William Stallings – Applications & Standards.
[17] Information Security-Reading room of United States of America.
[18] www.google.com for web resources.

Keywords :— Message, Security, Encryption, Hash Function, Supervisor and Data.