Abstract
We all are living in the era of online processing, where the maximum of the information is available online. As the facilities of computer technology have increased, threats of losing personal and sensitive information have also increased. Cryptographic software and algorithms are good at some extent but as we all are seeing several attacks like Plaintext attack, Replay attack on Apply pay, Interleaving attack on PKMv2, etc. show us that our cryptographic software is less likely to be broken due to the weakness in the underlying deterministic cryptographic algorithms.
A nonce is another attempt to improve security from these kinds of attacks. A nonce is an input value that will not repeat in a given context. Nonce use to prevent replay and interleaving attacks. Nonce also protects websites against malicious exploits that are based on Cross-Site Request Forgery (CSRF). The main aim of this paper is to introduce, What is Nonce, how it works and what are the issues and challenges in cryptography that we can solve with Nonce.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Margaret Rouse Cryptographic nonce. https://bit.ly/34ZCSHI
Kneusel RT (2018) Random numbers and computers. Springer International Publishing
Sheth M (2017) Cryptographically secure pseudo-random number generator (CSPRNG). https://bit.ly/32WojDD. Accessed 29 Mar 2017
Khatwani S (2019) Bitcoin block hashing. https://bit.ly/2QBNys8. 1 Feb 2019
Køien GM (2015) A brief survey of nonces and nonce usage. In: Securware 2015-the ninth international conference on emerging security information, systems and technologies”(SECURWARE 2015)
Website. https://cheatsheetseries.owasp.org
Elangovan U, Arputharaj K, Ramadoss R (2014) Cambridge CB2 3QG “lowcost dynamic random nonce generator for web services. In: 2nd international conference on emerging trends in engineering and technology (ICETET 2014), 30–31 May 2014, London (UK)
Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography
Clifford Neuman B, Stubblebine SG (1993) A Note on the Use of Timestamps as Nonces. Information Sciences Institute, University of Southern California
Website. https://on.tcs.com/2Qxywnn
Gennaro R (2006) Randomness in cryptography. IEEE Secur Priv 4(2):64–67
Adams C (2011) Replay Attack. In: van Tilborg HCA, Jajodia S (eds) Encyclopediaof cryptography and security. Springer, Boston
The Internet Society (2019) HTTP authentication: basic and digest access authentication. https://bit.ly/2r6J8im,section4.3. 4 May 2019
Stream ciphers. https://bit.ly/37knS9q. 18 Mar 2017
Green M: The Lamport One-Time Signature. https://bit.ly/346hfFM
Cryptographic hash function. https://bit.ly/2OuP8cB
Website. https://searchsecurity.techtarget.com/definition/nonce
Eremenko K (2019) How does Bitcoin/ Blockchain Mining work?. https://bit.ly/2r6J8im. 4 May2019
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sharma, S., Jain, S., Chandavarkar, B.R. (2021). Nonce: Life Cycle, Issues and Challenges in Cryptography. In: Kumar, A., Mozar, S. (eds) ICCCE 2020. Lecture Notes in Electrical Engineering, vol 698. Springer, Singapore. https://doi.org/10.1007/978-981-15-7961-5_18
Download citation
DOI: https://doi.org/10.1007/978-981-15-7961-5_18
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7960-8
Online ISBN: 978-981-15-7961-5
eBook Packages: EngineeringEngineering (R0)