INTERNATIONAL JOURNAL OF INNOVATIONS IN APPLIED SCIENCES & ENGINEERING

International Peer Reviewed (Refereed), Open Access Research Journal

(By Aryavart International University, India)

E-ISSN:2454-9258 | P-ISSN:2454-809X | Estd Year: 2015

Impact Factor(2021): 5.246 | Impact Factor(2022): 5.605

ABSTRACT


AN IN-DEPTH ANALYSIS OF PICPASS ALGORITHM IN PROVIDING AN EFFECTIVE SOLUTION FOR ‘KEY EXCHANGE PROBLEM’

Muskaan Juneja

Vol. 2, Jan-Dec 2016

Page Number: 476 - 480

Abstract:

This paper proposes a PicPass calculation to take care of the Key Exchange issue utilizing Symmetric and Asymmetric key cryptography. Diffie and Hellman proposed a calculation for key exchange. However, this calculation experiences a Man-in centre assault. So to defeat this issue, Seo proposed one more calculation that involves text passwords for the understanding between two gatherings. Be that as it may, the secret phrase experiences a disconnected word reference assault once more. For example, a Picasso Protocol is utilized as a secret phrase to concur with two gatherings. The convention contains two capacities, for example, picture capacity and mutilation work, which is utilized to take pictures in a minimized size and afterwards, it is shipped off the beneficiary. Initially, the source encodes the Plain Text utilizing Secret Picture and makes the Cipher Text utilizing Symmetric key cryptography. Then, at that point, the Secret Picture will be encoded by a canvassed picture bringing about an Encrypted Picture. Presently will put the Cipher Text and Encrypted Picture into a computerized envelope and afterwards send the envelope to the beneficiary. The receiver will get the advanced notification, open it, and decrypt the Encrypted Picture utilizing his Key Picture. This will bring about the collector getting the Secret Picture. The recipient will open the Cipher Text utilizing the Secret Picture and get the Plain Text. To anticipate the Encrypted Picture, he can't figure that the image might be decoded utilizing the Secret Key, just with the receiver. So in this paper, an image is used as a secret word to confirm the key exchange, which gives a pragmatic arrangement against disconnected word reference attacks simply by utilizing private and public-key cryptography.

References

Back Download