Header menu link for other important links
X
A study on yak-public key authentication protocoland its analysis
S.K. Shaw, J. Shaw,
Published in International Journal of Pharmacy and Technology
2016
Volume: 8
   
Issue: 4
Pages: 26551 - 26559
Abstract
It has become very important nowadays to incorporate some encryption algorithm in all types of applications and digital media in order to safeguard them from illegal access and guarantee the trustworthiness and privacy of the data. Many encryption algorithms have been proposed till now and each of them has their own advantages and disadvantages and its own approach for encryption and decryption. As public key cryptography is common nowadays and is used in all secured transactions so we have set forth to study YAK, which is a public key authenticated key exchange protocol (PK-AKE). At present YAK is not known widely by many people. Its main working concept is based on Diffie–Hellman key exchange. This algorithm can be used for securing transactions that involve theexchange of information. In this paper, we give a detail description of YAK and discuss its working principle and suggest a theoretical enhancement by incorporating a factorization problem public key cryptosystem, such as RSA, in the first pass of the static public key in order to further improve the security of this protocol. © 2016, International Journal of Pharmacy and Technology. All rights reserved.
About the journal
JournalInternational Journal of Pharmacy and Technology
PublisherInternational Journal of Pharmacy and Technology
ISSN0975766X