Meticulous Tasks of Various Cryptographic Techniques in Secure Communications
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - November Issue 2013 by IJCTT Journal|
|Volume-5 Issue-4 |
|Year of Publication : 2013|
|Authors :Dr. P. Ramesh Babu , D. Nagamalleswara Rao , Hunde Merga Dugassa , Abebe Gemeda|
Dr. P. Ramesh Babu , D. Nagamalleswara Rao , Hunde Merga Dugassa , Abebe Gemeda"Meticulous Tasks of Various Cryptographic Techniques in Secure Communications"International Journal of Computer Trends and Technology (IJCTT),V5(4):214-220 November Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract:- Our main intention of writing this paper is to provide a understandable knowledge about cryptographic techniques. This paper deals with various Message Authentication Codes, Hash functions and encryption techniques and provides in-depth analysis of these techniques. This paper also provides a discussion of how the two related fields of encryption and hash functions are complementary, not replacement technologies for one another.
 Eastlake, Motorola, Jones. “RFC 3174 - US Secure Hash Algorithm 1 (SHA1)“, http://www.faqs.org/rfcs/rfc3174.html
 Frankel, S. “Internet Draft - The HMAC-SHA-256-128 Algorithm and Its Use With Ipsec”, http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ciphsha-256-01.txt
 IBM Press Release. “IBM Selected to Build World`s Most Powerful ComputingGrid”, August 2001. http://www- 916.ibm.com/press/prnews.nsf/jan/7613B7AF8EA527D385256AA3006EC06B
 Krawczyk, Bellare, Canetti. “RFC 2104- HMAC: Keyed-Hashing for Message Authentication”, http://www.ietf.org/rfc/rfc2104.txt
 Lynch, William. “Getting Started with Tripwire (Open Source Linux Edition)”, http://www.linuxsecurity.com/feature_stories/feature_story-81.html.
 Oehler, Glenn. “RFC 2085 - HMAC-MD5 IP Authentication with Replay Prevention”, http://www.cis.ohio-state.edu/cgibin/rfc/rfc2085.html
 Palmgren, Keith. “Diffie-Hellman Key Exchange - A Non-Mathematician`s Explanation”, http://networking.earthweb.com/netsecur/article.php/624441
 Prosise, Chris; Shahm Saumil. “Anatomy of a Hack”, January 2001. http://dotphoto.cnet.com/webbuilding/0-7532-8-4561014-2.html
 Rivest, R. “RFC 1321 - The MD5 Message-Digest Algorithm“, April 1992, http://www.cis.ohio-state.edu/rfc/rfc1321.txt
 RSA Laboratories. “What are MD2, MD4, and MD5?”, Date Unknown. http://www.rsasecurity.com/rsalabs/faq/3-6-6.html.
 RSA Laboratories. “What is a hash function?”, http://www.rsasecurity.com/rsalabs/faq/2-1-6.html
 RSA Laboratories. “What are Message Authentication Codes” http://www.rsasecurity.com/rsalabs/faq/2-1-7.html
 Sptizner, Lance. “What is MD5, and why do I care”, http://www.spitzner.net/md5.html
 Sun Microsystems. “JavaTM Secure Socket Extension (JSSE) Reference Guide”, http://java.sun.com/j2se/1.4.1/docs/guide/security/jsse/JSSERefGuide.html
 Wikipedia. “SHA-1”, http://www.wikipedia.org/wiki/SHA-1
 Network Security Essentials by William Stallings – Applications & Standards.
 Information Security-Reading room of United States of America.
 www.google.com for web resources.
Keywords :— Message, Security, Encryption, Hash Function, Supervisor and Data.