Key Exchange Technique in Cryptography Using Diffie-Hellman Algorithm

Authors

  • Vinothini V Department of computer science, Idhaya College for women, Kumbakonam, India
  • Muthukumaran C Department of computer science, Arasu engineering college, Kumbakonam, India

Keywords:

Visio, Challenges, Applications, Architecture

Abstract

Internet of Things is a new pattern which provides a set of new services for the next form of technological development. IOT in the sense, it is a “universal global neural network” in the cloud which connects various things. The form of communication that is either human-device, or human-human but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-machine (M2M). This paper aims to provide a future vision , IoT Architecture , Applications and its Challenges

References

Y. Amir, Y.Kim, C. Nita-Rotaru, “Secure communication using contributory key agreement”, IEEE Transactions on Parallel and Distributed systems, pp. 468-480,2009.

M. Bellare, D. Pointcheval, P. Rogaway, ” Authenticated Key exchange secure against dictionary attacks”, IN Proc. Of Eurocrypt, pp. 139-155.2010

S. Blakke Wilson, A. Menezes, “ Entity authentication and authenticated transport protocols employing asymmetric techniques”, SPRINGER 1997

Downloads

Published

2025-11-24

How to Cite

[1]
V. Vinothini and C. Muthukumaran, “Key Exchange Technique in Cryptography Using Diffie-Hellman Algorithm”, Int. J. Comp. Sci. Eng., vol. 7, no. 4, pp. 151–152, Nov. 2025.