ZKP protocol for safe Wi-Fi access (Record no. 6085)

MARC details
000 -LEADER
fixed length control field 02673nam a22001937a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220107122839.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180529b xxu||||| |||| 00| 0 eng d
040 ## - CATALOGING SOURCE
Transcribing agency IIITMK
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Athira Nair (93616009)
9 (RLIN) 14185
245 ## - TITLE STATEMENT
Title ZKP protocol for safe Wi-Fi access
300 ## - PHYSICAL DESCRIPTION
Extent MSC CS 2016-2018
500 ## - GENERAL NOTE
General note <br/>Wireless communication has recently evolved as a real time and high-rated data communication<br/>medium. It is the transfer of information between two or more points that are not connected by<br/>an electrical conductor or are not wired. The number of wireless devices being opted to carry out<br/>illicit cybercriminal activities such as system hacking, data forging, financial information threat,<br/>malicious attacks etc has been increased. Undoubtedly it causes a large amount of loss and<br/>therefore it is of paramount importance to improve the wireless communication security in order<br/>to fight back and secure the use of wireless networks. The importance of Cryptography in<br/>protecting the confidentiality of data transmission does improves the achievable communication<br/>security level along with the incorporation of multiple authentication approaches but still it needs<br/>to be enhanced. Thus, for user authentication, validation and data transfer Zero Knowledge Proof<br/>acts as a self-authenticated interactive protocol. ZKP eliminates the use of secure service<br/>infrastructures such as symmetric or asymmetric key encryption mechanisms also the central<br/>authority based authentication protocols. It proves to help mitigate the possible attacks while reauthentication<br/>and network service sharing.<br/><br/> Anything that may increase the danger of confidentiality of secret being revealed by an intruder<br/>has to be eliminated. Zero Knowledge Authentication is a protocol that takes place between two<br/>parties called the Prover and the Verifier. The Prover has to simply prove the other party called<br/>as Verifier that it knows the password for authentication without telling it. Such a interaction is<br/>designed not to give or reveal any secret and thus after a couple of messages getting interchanged<br/>the Verifier can only know that the Prover does or doesn't possess the password. It is often<br/>necessary to come up with a potentially difficult to break encryption mechanism to encrypt the<br/>messages. Hence the use of one such encryption and decryption algorithm for passwords in ZKP<br/>authentication protocol proves to be cryptographically strong and difficult to break. <br/><br/><br/>
502 ## - DISSERTATION NOTE
Degree type MSC CS
Name of granting institution 2016-2018
Year degree granted INT
-- Dr. Elizabeth Sherly
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element ZKP PROTOCOL
9 (RLIN) 14186
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element WIRELESS COMMUNICATION
9 (RLIN) 14187
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element DATA TRANSMISSION
9 (RLIN) 14188
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Total Checkouts Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Non Fiction IIITM-K Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre   29/05/2018   R-1383 29/05/2018 29/05/2018 Project Reports