Font Size: a A A

Secure key transfer protocol using Goldbach sequences

Posted on:2014-12-07Degree:M.SType:Thesis
University:Oklahoma State UniversityCandidate:Kanchu, Krishnama RajuFull Text:PDF
GTID:2458390005993871Subject:Computer Science
Abstract/Summary:
Cryptography has been most successfully deployed in protocols where a client-server relationship exists, such as Secure Socket Layer (SSL) and Transport Layer security (TSL). A data can be encrypted using an encryption algorithm along with a public key. This encrypted data could be read by the node which has the private key of this encrypted data which can decrypt the message. A signature is formed together with a message digest and a private key. It makes it impossible to detect the message digest given a key and also it would be impossible to detect the key given a message digest. Other variations are given in [13],[14].;In this thesis we consider a new way to develop a key distribution protocol using the standard Goldbach conjecture and its constrained forms. According to this conjecture any even number can be represented as a sum of two prime numbers. We have looked at random sequences obtained from the count of partitions of different even numbers and we have derived new variant sequences of this partition random sequence. Random sequences can be good candidates for cryptographic keys [15]-[18] and they have other applications in cryptography. When random sequences from different sources are used, their independence may be checked by a cross correlation analysis [19]-[21].;Goldbach partitions will be shown to have excellent cross correlation properties. We also present the use of Goldbach partitions for a key exchange protocol.
Keywords/Search Tags:Key, Protocol, Goldbach, Sequences, Using
Related items