Nonce: Life Cycle, Issues and Challenges in Cryptography

5Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We all are living in the era of online processing, where the maximum of the information is available online. As the facilities of computer technology have increased, threats of losing personal and sensitive information have also increased. Cryptographic software and algorithms are good at some extent but as we all are seeing several attacks like Plaintext attack, Replay attack on Apply pay, Interleaving attack on PKMv2, etc. show us that our cryptographic software is less likely to be broken due to the weakness in the underlying deterministic cryptographic algorithms. A nonce is another attempt to improve security from these kinds of attacks. A nonce is an input value that will not repeat in a given context. Nonce use to prevent replay and interleaving attacks. Nonce also protects websites against malicious exploits that are based on Cross-Site Request Forgery (CSRF). The main aim of this paper is to introduce, What is Nonce, how it works and what are the issues and challenges in cryptography that we can solve with Nonce.

Cite

CITATION STYLE

APA

Sharma, S., Jain, S., & Chandavarkar, B. R. (2021). Nonce: Life Cycle, Issues and Challenges in Cryptography. In Lecture Notes in Electrical Engineering (Vol. 698, pp. 183–195). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-15-7961-5_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free