Nt1330 Unit 3 Assignment 1

1070 Words5 Pages

In the architecture, there are different modules like- Prime number generation and test by Rabin-Miller module, initial key-exchange and authentication, secure communication initiation, peer to peer authentication, hybrid encryption and hybrid decryption module and third party module. Another new aspect is challenger module will only allow one client to securely communicate with the server so communication architecture is peer to peer only but multiple clients can try to connect, so they will be connected to server but will not be authenticated to start messaging they have to wait for authenticated communication clearance one by one. Here the flow diagrams are described in two parts –First in Fig. 1 the generic communication model and in Fig. …show more content…

Two Hybrid Clients are connected securely and reliably with Hybrid server but only one are able to start reliable, strong and efficient messaging Fig 7. Two Hybrid Clients are connected securely and reliably with Hybrid server but here which client was connected it is now about to be disconnected and which client was in queue that is now about to be connected-peer to peer communication one are able to start reliable, strong and efficient messaging Fig 8. Two Hybrid Clients are connected securely and reliably with Hybrid server but here which client was connected it is now disconnected and which client was in queue that is now connected to start reliable, strong and efficient messaging IV. RESULTS …show more content…

So in our Hybrid model - Strong, efficient and reliable personal messaging peer to peer architecture based on Hybrid RSA for an active networked environment, to tackle the Chosen cipher text attack when messaging is going on, Public Key Cryptography Standards (PKCS) version 5 is used. The basic RSA with Rabin-Miller strong Primality test with Efficient RSA with Euler Phi function variants integration and pohligHellmanEncipher with salt and padding integration makes it stronger and more reliable from the attacks like factorization of the RSA modulus n, message iteration attack, broadcast decryption by small exponent attack, broadcast decryption by common modulus attack, fault injection attack, the small difference between p and q attack and the finding eth root attack, Mathematical attacks and Timing attacks. Brute force attach is tackle by randomly changing the keys in synchronous time gap with 1024-bit value [13]. Also if somebody monitors pattern of the key so here as second layer and third layer reliable authentication between two parties key exchanging are there from the beginning. As in the instant messaging we generally cannot message for so long, so within these short time it’s quite impossible to do any brute force in our architecture with

More about Nt1330 Unit 3 Assignment 1