Nonce: Life Cycle, Issues and Challenges in Cryptography

dc.contributor.authorSharma S.
dc.contributor.authorJain S.
dc.contributor.authorChandavarkar B.R.
dc.date.accessioned2021-05-05T10:16:05Z
dc.date.available2021-05-05T10:16:05Z
dc.date.issued2021
dc.description.abstractWe all are living in the era of online processing, where the maximum of the information is available online. As the facilities of computer technology have increased, threats of losing personal and sensitive information have also increased. Cryptographic software and algorithms are good at some extent but as we all are seeing several attacks like Plaintext attack, Replay attack on Apply pay, Interleaving attack on PKMv2, etc. show us that our cryptographic software is less likely to be broken due to the weakness in the underlying deterministic cryptographic algorithms. A nonce is another attempt to improve security from these kinds of attacks. A nonce is an input value that will not repeat in a given context. Nonce use to prevent replay and interleaving attacks. Nonce also protects websites against malicious exploits that are based on Cross-Site Request Forgery (CSRF). The main aim of this paper is to introduce, What is Nonce, how it works and what are the issues and challenges in cryptography that we can solve with Nonce. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.en_US
dc.identifier.citationLecture Notes in Electrical Engineering , Vol. 698 , , p. 183 - 195en_US
dc.identifier.urihttps://doi.org/10.1007/978-981-15-7961-5_18
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/14963
dc.titleNonce: Life Cycle, Issues and Challenges in Cryptographyen_US
dc.typeConference Paperen_US

Files