ZKP protocol for safe Wi-Fi access (Record no. 6085)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02673nam a22001937a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20220107122839.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 180529b xxu||||| |||| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE | |
| Transcribing agency | IIITMK |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Athira Nair (93616009) |
| 9 (RLIN) | 14185 |
| 245 ## - TITLE STATEMENT | |
| Title | ZKP protocol for safe Wi-Fi access |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | MSC CS 2016-2018 |
| 500 ## - GENERAL NOTE | |
| General note | <br/>Wireless communication has recently evolved as a real time and high-rated data communication<br/>medium. It is the transfer of information between two or more points that are not connected by<br/>an electrical conductor or are not wired. The number of wireless devices being opted to carry out<br/>illicit cybercriminal activities such as system hacking, data forging, financial information threat,<br/>malicious attacks etc has been increased. Undoubtedly it causes a large amount of loss and<br/>therefore it is of paramount importance to improve the wireless communication security in order<br/>to fight back and secure the use of wireless networks. The importance of Cryptography in<br/>protecting the confidentiality of data transmission does improves the achievable communication<br/>security level along with the incorporation of multiple authentication approaches but still it needs<br/>to be enhanced. Thus, for user authentication, validation and data transfer Zero Knowledge Proof<br/>acts as a self-authenticated interactive protocol. ZKP eliminates the use of secure service<br/>infrastructures such as symmetric or asymmetric key encryption mechanisms also the central<br/>authority based authentication protocols. It proves to help mitigate the possible attacks while reauthentication<br/>and network service sharing.<br/><br/> Anything that may increase the danger of confidentiality of secret being revealed by an intruder<br/>has to be eliminated. Zero Knowledge Authentication is a protocol that takes place between two<br/>parties called the Prover and the Verifier. The Prover has to simply prove the other party called<br/>as Verifier that it knows the password for authentication without telling it. Such a interaction is<br/>designed not to give or reveal any secret and thus after a couple of messages getting interchanged<br/>the Verifier can only know that the Prover does or doesn't possess the password. It is often<br/>necessary to come up with a potentially difficult to break encryption mechanism to encrypt the<br/>messages. Hence the use of one such encryption and decryption algorithm for passwords in ZKP<br/>authentication protocol proves to be cryptographically strong and difficult to break. <br/><br/><br/> |
| 502 ## - DISSERTATION NOTE | |
| Degree type | MSC CS |
| Name of granting institution | 2016-2018 |
| Year degree granted | INT |
| -- | Dr. Elizabeth Sherly |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | ZKP PROTOCOL |
| 9 (RLIN) | 14186 |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | WIRELESS COMMUNICATION |
| 9 (RLIN) | 14187 |
| 650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | DATA TRANSMISSION |
| 9 (RLIN) | 14188 |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Non Fiction | IIITM-K | Kerala University of Digital Sciences, Innovation and Technology Knowledge Centre | 29/05/2018 | R-1383 | 29/05/2018 | 29/05/2018 | Project Reports |