Please use this identifier to cite or link to this item:
|Title:||Nonce: Life Cycle, Issues and Challenges in Cryptography|
|Citation:||Lecture Notes in Electrical Engineering , Vol. 698 , , p. 183 - 195|
|Abstract:||We all are living in the era of online processing, where the maximum of the information is available online. As the facilities of computer technology have increased, threats of losing personal and sensitive information have also increased. Cryptographic software and algorithms are good at some extent but as we all are seeing several attacks like Plaintext attack, Replay attack on Apply pay, Interleaving attack on PKMv2, etc. show us that our cryptographic software is less likely to be broken due to the weakness in the underlying deterministic cryptographic algorithms. A nonce is another attempt to improve security from these kinds of attacks. A nonce is an input value that will not repeat in a given context. Nonce use to prevent replay and interleaving attacks. Nonce also protects websites against malicious exploits that are based on Cross-Site Request Forgery (CSRF). The main aim of this paper is to introduce, What is Nonce, how it works and what are the issues and challenges in cryptography that we can solve with Nonce. © 2021, The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.|
|Appears in Collections:||2. Conference Papers|
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.