Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{146351,
author = {SHALINI PARASHAR and Dr. Dinesh Chaudhary},
title = {A SURVEY ON KEY EXCHANGE MECHANISM USING MOBILE AGENT},
journal = {International Journal of Innovative Research in Technology},
year = {},
volume = {4},
number = {12},
pages = {206-209},
issn = {2349-6002},
url = {https://ijirt.org/article?manuscript=146351},
abstract = {The spectacular growth of the Internet has spawned an increased awareness of an interest in security issues. Although security has been considered in the design of the basic Internet protocols, many applications have been and are being designed with minimal attention paid to issues of confidentiality, authentication, and privacy. Often cryptographic algorithms and protocols are necessary to keep a system secure, particularly when communicating through an untrusted network such as the Internet. Where possible, use cryptographic techniques to authenticate information and keep the information private (but don’t assume that simple encryption automatically authenticates as well). Generally you’ll need to use a suite of available tools to secure your application. Cryptographic protocols and algorithms are difficult to get right, so do not create your own. Instead, where you can, use protocols and algorithms that are widely-used, heavily analyzed, and accepted as secure. When you must create anything, give the approach wide public review and make sure that professional security analysts examine it for problems. In particular, do not create your own encryption algorithms unless you are an expert in cryptology. Key exchanges any method in cryptography by which cryptographic keys are exchanged between two parties, allowing use of a cryptographic algorithm. This paper’s objective is to study proposed key exchange protocols for mobile environment. Mobile agent is a software object that migrates through many nodes of a heterogeneous network of computers under its own control in order to perform task using resources of these nodes, during the past several years; mobile agent has received significant attention. In this paper, we compare the computational efficiency of various authentication protocols and implement RSA using mobile agents},
keywords = {Key Exchange, Cryptography, RSA algorithm, Mobile agent, AGLET},
month = {},
}
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry