We all are living in the era of online processing, where the maximum of the information is available online. As the facilities of computer technology have increased, threats of losing personal and sensitive information have also increased. Cryptographic software and algorithms are good at some extent but as we all are seeing several attacks like Plaintext attack, Replay attack on Apply pay, Interleaving attack on PKMv2, etc. show us that our cryptographic software is less likely to be broken due to the weakness in the underlying deterministic cryptographic algorithms. A nonce is another attempt to improve security from these kinds of attacks. A nonce is an input value that will not repeat in a given context. Nonce use to prevent replay and interleaving attacks. Nonce also protects websites against malicious exploits that are based on Cross-Site Request Forgery (CSRF). The main aim of this paper is to introduce, What is Nonce, how it works and what are the issues and challenges in cryptography that we can solve with Nonce.
CITATION STYLE
Sharma, S., Jain, S., & Chandavarkar, B. R. (2021). Nonce: Life Cycle, Issues and Challenges in Cryptography. In Lecture Notes in Electrical Engineering (Vol. 698, pp. 183–195). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-15-7961-5_18
Mendeley helps you to discover research relevant for your work.