000 02673nam a22001937a 4500
003 OSt
005 20220107122839.0
008 180529b xxu||||| |||| 00| 0 eng d
040 _cIIITMK
100 _aAthira Nair (93616009)
_914185
245 _aZKP protocol for safe Wi-Fi access
300 _aMSC CS 2016-2018
500 _a Wireless communication has recently evolved as a real time and high-rated data communication medium. It is the transfer of information between two or more points that are not connected by an electrical conductor or are not wired. The number of wireless devices being opted to carry out illicit cybercriminal activities such as system hacking, data forging, financial information threat, malicious attacks etc has been increased. Undoubtedly it causes a large amount of loss and therefore it is of paramount importance to improve the wireless communication security in order to fight back and secure the use of wireless networks. The importance of Cryptography in protecting the confidentiality of data transmission does improves the achievable communication security level along with the incorporation of multiple authentication approaches but still it needs to be enhanced. Thus, for user authentication, validation and data transfer Zero Knowledge Proof acts as a self-authenticated interactive protocol. ZKP eliminates the use of secure service infrastructures such as symmetric or asymmetric key encryption mechanisms also the central authority based authentication protocols. It proves to help mitigate the possible attacks while reauthentication and network service sharing. Anything that may increase the danger of confidentiality of secret being revealed by an intruder has to be eliminated. Zero Knowledge Authentication is a protocol that takes place between two parties called the Prover and the Verifier. The Prover has to simply prove the other party called as Verifier that it knows the password for authentication without telling it. Such a interaction is designed not to give or reveal any secret and thus after a couple of messages getting interchanged the Verifier can only know that the Prover does or doesn't possess the password. It is often necessary to come up with a potentially difficult to break encryption mechanism to encrypt the messages. Hence the use of one such encryption and decryption algorithm for passwords in ZKP authentication protocol proves to be cryptographically strong and difficult to break.
502 _bMSC CS
_c2016-2018
_dINT
_eDr. Elizabeth Sherly
650 _aZKP PROTOCOL
_914186
650 _aWIRELESS COMMUNICATION
_914187
650 _aDATA TRANSMISSION
_914188
942 _2ddc
_cPR
999 _c6085
_d6085