ON A KEY EXCHANGE TECHNIQUE, AVOIDING MAN-IN-THE-MIDDLE-ATTACK
|Barun Biswas1, Krishnendu Basuli2*, Samar Sen Sarma2*
|Corresponding Author: Krishnendu Basuli, E-mail: [email protected]|
|Related article at Pubmed, Scholar Google|
Cryptography is a technique in which a data is transmitted through the medium without being hampered. It is not new subject. It was used far ago. This technique deals with many steps, such as: key generation, key transmission, key storage and key deletion. The most difficult part of the cryptography is the design of cipher; i.e. designing of the algorithm used to encrypt and decrypt plain text and cipher text respectively. A problem generally noticed is man-in-the-middle attack. We will try to eliminate or reduce the chance to occur this problem.