When it comes to the subject of encryption of communication streams, two key exchange methods are widely used asymmetric and symmetric key algorithms. However, neither of these methods is perfect.… Click to show full abstract
When it comes to the subject of encryption of communication streams, two key exchange methods are widely used asymmetric and symmetric key algorithms. However, neither of these methods is perfect. This paper will an algorithm that changes keys periodically without exchanging them between parties of the communication, the paper will discuss how this algorithm will solve some of the drawbacks of the widely used asymmetric and symmetric key algorithms.
               
Click one of the above tabs to view related content.