ABSTRACT

In real-life scenario, physical keys are used to lock a room, a bag, or a cupboard. Only authorized persons are given copies of the key, which can open the lock. In this way, things inside lock are kept confidential from other users and only authenticated users can access inside the lock. The same concept is applied in the scenario of computer science and computer networks but in a different way.