Please use this identifier to cite or link to this item:
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSharma S.
dc.contributor.authorJain S.
dc.contributor.authorChandavarkar B.R.
dc.identifier.citationLecture Notes in Electrical Engineering , Vol. 698 , , p. 183 - 195en_US
dc.description.abstractWe all are living in the era of online processing, where the maximum of the information is available online. As the facilities of computer technology have increased, threats of losing personal and sensitive information have also increased. Cryptographic software and algorithms are good at some extent but as we all are seeing several attacks like Plaintext attack, Replay attack on Apply pay, Interleaving attack on PKMv2, etc. show us that our cryptographic software is less likely to be broken due to the weakness in the underlying deterministic cryptographic algorithms. A nonce is another attempt to improve security from these kinds of attacks. A nonce is an input value that will not repeat in a given context. Nonce use to prevent replay and interleaving attacks. Nonce also protects websites against malicious exploits that are based on Cross-Site Request Forgery (CSRF). The main aim of this paper is to introduce, What is Nonce, how it works and what are the issues and challenges in cryptography that we can solve with Nonce. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.en_US
dc.titleNonce: Life Cycle, Issues and Challenges in Cryptographyen_US
dc.typeConference Paperen_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.