2004
DOI: 10.1109/lcomm.2004.825705
|View full text |Cite
|
Sign up to set email alerts
|

Integrating Diffie–Hellman Key Exchange into the Digital Signature Algorithm (DSA)

Abstract: Abstract-The

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2005
2005
2021
2021

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 45 publications
(23 citation statements)
references
References 6 publications
(7 reference statements)
0
23
0
Order By: Relevance
“…Our framework uses an agent-based technique that relies on the ACO metaheuristics to find out the optimal path during routing, along with security is provided using digital signatures [23], watchdog and pathratermechanism [24] to prevent external and internal black-hole attacks respectively during communication. Initially during network setup each mobile node registers itself with the network and assigned a private key, shared public key pair which is used by the individual mobile nodes for generation of digital signatures.…”
Section: Our Proposalmentioning
confidence: 99%
“…Our framework uses an agent-based technique that relies on the ACO metaheuristics to find out the optimal path during routing, along with security is provided using digital signatures [23], watchdog and pathratermechanism [24] to prevent external and internal black-hole attacks respectively during communication. Initially during network setup each mobile node registers itself with the network and assigned a private key, shared public key pair which is used by the individual mobile nodes for generation of digital signatures.…”
Section: Our Proposalmentioning
confidence: 99%
“…The resulting variable (referred to as a key-share) is then communicated by both nodes, facilitating the calculation of a symmetric key that is identical at both ends, without the need to communicate sensitive data at any point. This allows the discreet and secure establishment of node-to-node confidentiality between specific node pairs [27].…”
Section: Secure Communicationmentioning
confidence: 99%
“…JAVA is chosen because it supports a set of standard security interfaces. Examples of these interfaces include the hash functions such as SHA-256 [22] and MD-5 [23], the symmetric encryption algorithms such as AES [24] and 3DES [25] and the asymmetric encryption algorithms such as RSA [26] and DSA [27].…”
Section: Implementation and Performance Evaluationmentioning
confidence: 99%