SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 1 (Sep. - Oct. 2013), PP 18-21
www.iosrjournals.org
www.iosrjournals.org 18 | Page
Diffie-Hellman Algorithm and Anonymous Micropayments
Authentication in Mobile Data Network
Girija Srikanth1
1
(CSE, B.S.Anangpuria Institute of Technology and Management,, India)
Abstract: Communication is the important part in any type of network for making it possible to transfer data
from one node to another. Communication needs quality and security for better performance and for acceptance
of users and client companies. Data integrity is quite an issue in security and to maintain that integrity we tend
to improve as to provide the better encryption processes for security. In our proposed work, an innovative and
practical authentication system using Diffie-Hellman and AMA (Anonymous Micro payments Authentication)
are designed for micropayments in mobile data network. Through AMA the customer and the merchant can
authenticate each other indirectly, at the same time the merchant doesn’t know the customer’s real identity. A
customer can get fast micropayments not only from his local domain but also from a remote domain without
increasing any burden on his mobile phone/smartcard. Diffie-Hellman Encryption Algorithm adds more security
to the proposed work.
Keywords: AMA, Authentication, Diffie-Helman, Provate key, Public key
I. INTRODUCTION
The entire field of network security is vast and in an evolutionary stage. The range of study encompasses
a brief history dating back to internet’s beginnings and the current development in network security. In order to
understand the research being performed today, background knowledge of the internet, its vulnerabilities, attack
methods through the internet, and security technology is important and therefore they are reviewed.
Micropayments refer to low value financial transaction ranging from several pennies to a few dollars. At present,
a large portion of electronic commerce occurring in the mobile data network belong to the category of
micropayments, such as ringing tone download, news subscription, etc. Although the amount of each single
transaction in micropayments is small, the number of users and transactions is large. A small percentage loss due
to insecure transaction on fraud will be enlarged to a big sum. Thus, an important issue of micropayments is
security.
Many achievements on micropayment and its security are gained by researchers and cryptographers
[3]. All these can be classified into script-based, hashchain-based and macropayment-based categories. Millicent
[4][5], a scriptbased micropayment, introduces a kind of currency- scrip, which is digital money that is issued by
a single vendor. It uses no public-key cryptography and is optimized for repeated micropayments to the same
vendor. Its distributed approach allows a micropayment to be validated and double spending prevented without
the overhead of contacting the broker online during purchase.
Diffie-Hellman in SSL: Secure Sockets Layer (SSL) is a cryptographic protocol developed by Netscape
in 1995. SSL V3.0 has since become the predominant method and defacto standard for securing information flow
between web users and web servers.
Diffie-Hellman in SSH: Secure Shell (SSH) is a protocol and program used to encrypt traffic between
two computers. This is most commonly done as a secure replacement for tools like telnet, ftp and the Berkeley “r”
commands (rlogin, rsh, etc,)
II. DESIGN PRINCIPLES
1. Principles
The principles in the design of AMA are as following:
 Shifting as much computational effort as possible from the user side to the network side because the
customer represented by a mobile phone/smartcard has limited computational capabilities and storage.
 Allowing customer to get micropayment services from any domain at any place as soon as possible because
the response time of micropayment systems is important to the users in the business world.
 Allowing new users and new merchants to join at any time.
 Limited fairness in micropayments because the cost of complete fairness is very expensive.
Public Key Cryptography (PKC) is higher than that of symmetric key cryptography (SKC). This
combined authentication method is enough safe for mobile micropayments.
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile Data Network
www.iosrjournals.org 19 | Page
Fig 1: Three trust models for Authentication
The Authentication model for AMA is designed based on a trusted party, Credential center (CC). Model
Three is similar to Kerberos protocol [6]. Because there is the fewest interaction paths with the customer in model
one. Clearing and settlement Center (CS) is established to handle all fund transfers between customers and
merchants.
Although CC and CS are security bottlenecks and performance bottlenecks of the whole system, the
simplicity of trust model and debit model structure can reduce the transaction cost significantly.
2. Diffie-Hellman Key Exchange Algorithm
 Global Public Elements: Prime number q; α < q and α is a primitive root of q.
 User A Key Generation: User B Key Generation:
 Select private XA : XA < q
 Select private XB: XB < q
 Calculate public YA YA = α XA
mod q
 Calculate public YB : YB = α XB
mod q
 Calculation of Secret Key by User A: K = (YB) XA
mod q
 Calculation of Secret Key by User B: K= (YA) XB
mod q
Our Research proceeds with following algorithm
Sender Side
1. Xa < q (user can select any random number less than q)
2. Ya = a Xa
mod q (Ya is a public key of sender)
3. K = Yb Xa
mod q (where Yb is a public key of receiver and K is a private key)
4. pow = 2K
5. pow = pow + q
Encrypt every letter of plain text using pow.
Receiver Side
1. Xb < q (user can select any random number less than q)
2. Yb = a Xb
mod q (Yb is a public key of receiver)
3. K = Ya Xb
mod q (where Ya is a public key of sender and K is a private key)
4. pow = 2K
5. pow = pow + q
Decrypt every letter of Cipher text using pow.
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile Data Network
www.iosrjournals.org 20 | Page
Fig 2: Diffie Hellman Algorithm
III. LITERATURE SURVEY
Eun-Jun Yoon et al. [7] proposed an efficient Diffie-Hellman-MAC key exchange scheme providing
same securities as proposed by Jeong et al. who proposed a strong Diffie-Hellman- DSA key exchange scheme
providing security against session state reveal attacks as well as forward secrecy and key independence.
Emmanuel Bresson et al. [8] has investigated the Group Diffie-Hellman protocols for authenticated key
exchange (AKE) are designed to provide a pool of players with a shared secret key which may later be used, for
example, to achieve multicast message integrity.
F. Lynn Mcnulty [9] has drawn attention to the national and societal view of the role of encryption will
be one of the defining issues for our culture in the twenty-first century
SANS Institute Info Sec Reading Room [10] has investigated the overview of the Diffie-Hellman Key
Exchange algorithm and review several common cryptographic techniques in use on the Internet today that
incorporate diffie-Hellman.
Michel Abdalla [18] discussed a Diffie-Hellman based encryption scheme, DHIES (formerly named
DHES and DHAES), which is now in several (draft) standards. The scheme is as efficient as ElGamal encryption,
but has stronger security properties.
IV. AMA USING DIFFIE HELLMAN
1. Principles and Notations
All the parties involved in the micropayment systems are called principals. All principals communicate
through wireless and wired network. Basic principals in micropayment systems are merchant, customer,
credential center, clearing and settlement center.
The symbols C, M, CC and CS are used to denote the names of the principals Customer, Merchant,
Credential Center, Clearing and Settlement Center respectively.
 Global prime number : q,α < q and α is a primitive root of q
 Xa : Principal A’s private key
 Ya : Principal A’s public key ; Ya = α Xa
mod q
 Xb : Principal B’s private key
 Yb : Principal B’s public key ; Yb = α Xb
mod q
 Yc : Principal C’s concatenated values
 H(Yc) : Principal C’s hash value
 Sk : Principal D’s Session key
Fig 3: AMA Model
2. Protocol Explanation
As in figure 3, protocol is explained as follows,
 Step 1: Customer A calculates Ya and sends to the Merchant B.
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile Data Network
www.iosrjournals.org 21 | Page
 Step 2: Merchant B calculates Yb and sends (Ya, Yb) to Credential center C.
 Step 3: CC performs concatenation Yc and finds hash value H(Yc). CC sends Hash value to Clearing and
settlement center D.
 Step 4: CS creates Session key Sk and removes hash function. CS sends (Yc, Sk)
 Step 5: Merchant B checks Yc and(Ya, Yb). If equals confidentiality is properly maintained between customer
and merchant
V. EVALUATION OF DMA
1. Security
The following goals are to be achieved for secure micropayments in mobile data network after running these
proposed protocols successfully.
 Goal 1: Mutual Authentication between the customer and the merchant
 Goal 2: Anonymity
 Goal 3: Confidentiality
 Goal 4: Integrity
 Goal 5: Immune from key guessing attacks
 Goal 6: Secure micropayments on roaming
2. Feasibility
Practical protocols for secure mobile micropayments should suit mobile environment limitations, such as
limited bandwidth of mobile network, limited computational capability and storage of mobile phone/smart card,
etc. In AMA, most computational efforts are moved to wire network side without increasing communication
effort in the air.
3. Scalability
AMA can support mobile commerce with large value if asymmetric signature is used. At that time,
capabilities of mobile phone/smart card will be improved.
VI. Conclusion
A large portion of electronic commerce occurring in the mobile data network belong to the category of
micropayments, such as ringing tone download, news subscription, etc. Although the amount of each single
transaction in micropayments is small, the number of users and transactions is large. So, it is very useful for
both the users and also the merchants. Credential centre (CC) and Clearing and settlement centre (CS) will have
the possibility to leak information.
Acknowledgements
The Proposed algorithm with enhancement has come into shape in the form of algorithm. After shaping
up of proposed algorithm, implementation has been tested. Credential center, Clearing and settlement center are
performance bottlenecks of the whole system. The key management of Credential center is also an important
issue for secure mobile micropayments. These are common problems of authentication mechanism based on
symmetric key cryptography and should be improved in future work.
REFERENCES
[1] Zhi-Yuan Hu, Yao-Wei Liu, Xiao Hu, Jian Hua Li, “Anonymous micropayments authentication(AMA) in mobile data network”,IEEE
INFOCOM 2004.
[2] Vishal Garg, Rishu,” Improved Diffie-Hellman algorithm for network secuiryt enhancement”, IJCTA,vol 3(4),1327-1331
[3] Eun-Jun Yoon and Kee-Young Yoo, “ An Efficient Diffie-Hellman-MAC Key Exchange Scheme”, 2009 Fourth International
conference on Innovative computing, Information and Control.
[4] Emmanuel Bresson, Olivier Chevassut, David Pointcheva, Jean-Jacques Quisquater, “Authenticated Group Diffie-Hellman Key
Exchange”, Computer and Communication Security- proc of ACM CSS’01, Philadelphia, Pennsylvania, USA, Pages 255-264, ACM
Press, November 5-8, 2001.
[5] Mario Cagaljm, Srdjan Capkun and Jean-Pierre Hubaux,” Key agreement in peer-to-peer wireless networks”, Ecole Polytechnique
F´ed´erale de Lausanne (EPFL), CH-1015 Lausanne.
[6] T. Pedersen “Electronic payments of small amounts” In Fourth Cambridge Workshop on Security Protocols. Springer Verlag, Lecture
Notes in Computer Science, April 1996.
[7] P.M. Hallam-Baker. Micro Payment Transfer Protocol (MPTP) Version Novermber 1995. Http://www.w3.org/TR/WD-mptp-951122.
[8] M. Peirce, “Multi-party Micropayments for Mobile Communications”, PhD Thesis, Trinity College Dublin, Ireland, Oct. 2000
[9] G. Horn and B. Preneel, “Authentication and payment in future mobile systems” Computer Security - ESORICS'98, Lecture Notes in
Computer Science 1485, 1998, pp. 277-293.
[10] Mihir Bellare and Phillip Rogaway “Entity Authentication and key distribution” Extended abstract in Advances in Cryptology –
CRYPTO 93, Lecture Notes in Computer Science Vol. 773, D. Stinson ed, Springer-Verlag, 1994.

More Related Content

What's hot

Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsIJERD Editor
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codesMd. Hasibur Rashid
 
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...CSCJournals
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signaturesMazin Alwaaly
 
Smart contract development company blockchain developments
Smart contract development company   blockchain developmentsSmart contract development company   blockchain developments
Smart contract development company blockchain developmentsBlockchain Developments
 
Qr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online bankingQr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online bankingSnehith
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingHai Nguyen
 
The rise of cryptocurrency &amp; smart contract in blockchain industry
The rise of cryptocurrency &amp; smart contract in blockchain industryThe rise of cryptocurrency &amp; smart contract in blockchain industry
The rise of cryptocurrency &amp; smart contract in blockchain industryMoon Technolabs Pvt. Ltd.
 
Connect DApp Whitepaper v 1.0
Connect DApp Whitepaper v 1.0Connect DApp Whitepaper v 1.0
Connect DApp Whitepaper v 1.0Ahmed Omar
 
Alexander Shulgin, founder & CEO, Gruppa Kompaniy Familia - What do we mine n...
Alexander Shulgin, founder & CEO, Gruppa Kompaniy Familia - What do we mine n...Alexander Shulgin, founder & CEO, Gruppa Kompaniy Familia - What do we mine n...
Alexander Shulgin, founder & CEO, Gruppa Kompaniy Familia - What do we mine n...Techsylvania
 
3daysblcourseockchainbigdata
3daysblcourseockchainbigdata3daysblcourseockchainbigdata
3daysblcourseockchainbigdataAnne Starr
 
Digital signature by SSL Europa
Digital signature by SSL EuropaDigital signature by SSL Europa
Digital signature by SSL Europassleuropa
 
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...IJNSA Journal
 

What's hot (17)

Smart contract and smart contract oracles
Smart contract and smart contract oraclesSmart contract and smart contract oracles
Smart contract and smart contract oracles
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codes
 
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
 
H0342043046
H0342043046H0342043046
H0342043046
 
Information and data security digital signatures
Information and data security digital signaturesInformation and data security digital signatures
Information and data security digital signatures
 
Smart contract development company blockchain developments
Smart contract development company   blockchain developmentsSmart contract development company   blockchain developments
Smart contract development company blockchain developments
 
Qr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online bankingQr code based secure otp distribution scheme for Online banking
Qr code based secure otp distribution scheme for Online banking
 
Cryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for bankingCryptomathic white paper 2fa for banking
Cryptomathic white paper 2fa for banking
 
The rise of cryptocurrency &amp; smart contract in blockchain industry
The rise of cryptocurrency &amp; smart contract in blockchain industryThe rise of cryptocurrency &amp; smart contract in blockchain industry
The rise of cryptocurrency &amp; smart contract in blockchain industry
 
Connect DApp Whitepaper v 1.0
Connect DApp Whitepaper v 1.0Connect DApp Whitepaper v 1.0
Connect DApp Whitepaper v 1.0
 
Alexander Shulgin, founder & CEO, Gruppa Kompaniy Familia - What do we mine n...
Alexander Shulgin, founder & CEO, Gruppa Kompaniy Familia - What do we mine n...Alexander Shulgin, founder & CEO, Gruppa Kompaniy Familia - What do we mine n...
Alexander Shulgin, founder & CEO, Gruppa Kompaniy Familia - What do we mine n...
 
3daysblcourseockchainbigdata
3daysblcourseockchainbigdata3daysblcourseockchainbigdata
3daysblcourseockchainbigdata
 
Midata Thoughts No. 1
Midata Thoughts No. 1Midata Thoughts No. 1
Midata Thoughts No. 1
 
Advance itt
Advance ittAdvance itt
Advance itt
 
Digital signature by SSL Europa
Digital signature by SSL EuropaDigital signature by SSL Europa
Digital signature by SSL Europa
 
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
DEFEATING MITM ATTACKS ON CRYPTOCURRENCY EXCHANGE ACCOUNTS WITH INDIVIDUAL US...
 

Viewers also liked

Tipos de musica
Tipos de musicaTipos de musica
Tipos de musicaJyM1805
 
Integración de las tic en los procesos formativos
Integración de las tic en los procesos formativosIntegración de las tic en los procesos formativos
Integración de las tic en los procesos formativosISYED ZERAUS
 
TRABAJO DE MANTENIMIENTO CORRECTIVO......
TRABAJO DE MANTENIMIENTO CORRECTIVO......TRABAJO DE MANTENIMIENTO CORRECTIVO......
TRABAJO DE MANTENIMIENTO CORRECTIVO......Jose Rafha Padilla
 
Resolucion 973 tarjeta profesional
Resolucion 973 tarjeta profesionalResolucion 973 tarjeta profesional
Resolucion 973 tarjeta profesionalABBEY0106
 
Verification of areas of indian standard i sections with multiple unit weights
Verification of areas of indian standard i  sections with multiple unit weightsVerification of areas of indian standard i  sections with multiple unit weights
Verification of areas of indian standard i sections with multiple unit weightseSAT Journals
 
M. Frassine - S. De Francesco - S. Di Tonto, RAPTOR: verso l'apertura del sis...
M. Frassine - S. De Francesco - S. Di Tonto, RAPTOR: verso l'apertura del sis...M. Frassine - S. De Francesco - S. Di Tonto, RAPTOR: verso l'apertura del sis...
M. Frassine - S. De Francesco - S. Di Tonto, RAPTOR: verso l'apertura del sis...Patrimonio culturale FVG
 
Normas Oficiales Mexicanas - Interés Medico - abril 2014
Normas Oficiales Mexicanas - Interés Medico - abril 2014Normas Oficiales Mexicanas - Interés Medico - abril 2014
Normas Oficiales Mexicanas - Interés Medico - abril 2014Victor Tito
 
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...Relationship of Kabaddi Performance with Selected Coordinative Ability of the...
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...IOSR Journals
 
Objective function to Optimize Bending Stress at Critical Section of Asymmetr...
Objective function to Optimize Bending Stress at Critical Section of Asymmetr...Objective function to Optimize Bending Stress at Critical Section of Asymmetr...
Objective function to Optimize Bending Stress at Critical Section of Asymmetr...IOSR Journals
 

Viewers also liked (20)

Tipos de musica
Tipos de musicaTipos de musica
Tipos de musica
 
Integración de las tic en los procesos formativos
Integración de las tic en los procesos formativosIntegración de las tic en los procesos formativos
Integración de las tic en los procesos formativos
 
TRABAJO DE MANTENIMIENTO CORRECTIVO......
TRABAJO DE MANTENIMIENTO CORRECTIVO......TRABAJO DE MANTENIMIENTO CORRECTIVO......
TRABAJO DE MANTENIMIENTO CORRECTIVO......
 
Resolucion 973 tarjeta profesional
Resolucion 973 tarjeta profesionalResolucion 973 tarjeta profesional
Resolucion 973 tarjeta profesional
 
Ativismo coletivo
Ativismo coletivoAtivismo coletivo
Ativismo coletivo
 
Verification of areas of indian standard i sections with multiple unit weights
Verification of areas of indian standard i  sections with multiple unit weightsVerification of areas of indian standard i  sections with multiple unit weights
Verification of areas of indian standard i sections with multiple unit weights
 
Latihan ppt
Latihan pptLatihan ppt
Latihan ppt
 
M. Frassine - S. De Francesco - S. Di Tonto, RAPTOR: verso l'apertura del sis...
M. Frassine - S. De Francesco - S. Di Tonto, RAPTOR: verso l'apertura del sis...M. Frassine - S. De Francesco - S. Di Tonto, RAPTOR: verso l'apertura del sis...
M. Frassine - S. De Francesco - S. Di Tonto, RAPTOR: verso l'apertura del sis...
 
Dialogo 4ºpei
Dialogo 4ºpeiDialogo 4ºpei
Dialogo 4ºpei
 
Latihan
LatihanLatihan
Latihan
 
2016 todotgol
2016 todotgol2016 todotgol
2016 todotgol
 
Normas Oficiales Mexicanas - Interés Medico - abril 2014
Normas Oficiales Mexicanas - Interés Medico - abril 2014Normas Oficiales Mexicanas - Interés Medico - abril 2014
Normas Oficiales Mexicanas - Interés Medico - abril 2014
 
Proceso enfermero 2015
Proceso enfermero 2015Proceso enfermero 2015
Proceso enfermero 2015
 
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...Relationship of Kabaddi Performance with Selected Coordinative Ability of the...
Relationship of Kabaddi Performance with Selected Coordinative Ability of the...
 
Objective function to Optimize Bending Stress at Critical Section of Asymmetr...
Objective function to Optimize Bending Stress at Critical Section of Asymmetr...Objective function to Optimize Bending Stress at Critical Section of Asymmetr...
Objective function to Optimize Bending Stress at Critical Section of Asymmetr...
 
A017330108
A017330108A017330108
A017330108
 
C013132027
C013132027C013132027
C013132027
 
I017355767
I017355767I017355767
I017355767
 
B1803031217
B1803031217B1803031217
B1803031217
 
I010135760
I010135760I010135760
I010135760
 

Similar to Diffie-Hellman Authentication and Micropayments

An Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key AgreementAn Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key Agreementijtsrd
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy ExamLisa Olive
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...Dr. Amarjeet Singh
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerTELKOMNIKA JOURNAL
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerPutra Wanda
 
Blockchain point of view for the telco, media and entertainment industry
Blockchain point of view for the telco, media and entertainment industryBlockchain point of view for the telco, media and entertainment industry
Blockchain point of view for the telco, media and entertainment industryIBM Blockchain
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9muthulx
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisCSCJournals
 
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTIONROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTIONIJNSA Journal
 
Blockchain Trends & Business Cases
Blockchain Trends & Business CasesBlockchain Trends & Business Cases
Blockchain Trends & Business CasesSlava Buga
 
Machine learning presentation in using pyhton
Machine learning presentation in using pyhtonMachine learning presentation in using pyhton
Machine learning presentation in using pyhtonmasukmia.com
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Davide Cioccia
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
 
CRYPTOCURRENCY: TRADING MARKET
CRYPTOCURRENCY: TRADING MARKETCRYPTOCURRENCY: TRADING MARKET
CRYPTOCURRENCY: TRADING MARKETIRJET Journal
 
Secure ip payment networks what's available other than ssl - final
Secure ip payment networks   what's available other than ssl - finalSecure ip payment networks   what's available other than ssl - final
Secure ip payment networks what's available other than ssl - finalAlex Tan
 

Similar to Diffie-Hellman Authentication and Micropayments (20)

2
22
2
 
An Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key AgreementAn Identity-Based Mutual Authentication with Key Agreement
An Identity-Based Mutual Authentication with Key Agreement
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
 
Blockchain point of view for the telco, media and entertainment industry
Blockchain point of view for the telco, media and entertainment industryBlockchain point of view for the telco, media and entertainment industry
Blockchain point of view for the telco, media and entertainment industry
 
Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9Cryptographysecurity 1222867498937700-9
Cryptographysecurity 1222867498937700-9
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
 
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTIONROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTION
 
Blockchain Trends & Business Cases
Blockchain Trends & Business CasesBlockchain Trends & Business Cases
Blockchain Trends & Business Cases
 
kasodhan2019.pdf
kasodhan2019.pdfkasodhan2019.pdf
kasodhan2019.pdf
 
Machine learning presentation in using pyhton
Machine learning presentation in using pyhtonMachine learning presentation in using pyhton
Machine learning presentation in using pyhton
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
 
Enforcing Set and SSL Protocols in E-Payment
Enforcing Set and SSL Protocols in E-PaymentEnforcing Set and SSL Protocols in E-Payment
Enforcing Set and SSL Protocols in E-Payment
 
J017667582
J017667582J017667582
J017667582
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
E-BUSINESS
E-BUSINESSE-BUSINESS
E-BUSINESS
 
CRYPTOCURRENCY: TRADING MARKET
CRYPTOCURRENCY: TRADING MARKETCRYPTOCURRENCY: TRADING MARKET
CRYPTOCURRENCY: TRADING MARKET
 
Secure ip payment networks what's available other than ssl - final
Secure ip payment networks   what's available other than ssl - finalSecure ip payment networks   what's available other than ssl - final
Secure ip payment networks what's available other than ssl - final
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 

Recently uploaded (20)

IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 

Diffie-Hellman Authentication and Micropayments

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 1 (Sep. - Oct. 2013), PP 18-21 www.iosrjournals.org www.iosrjournals.org 18 | Page Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile Data Network Girija Srikanth1 1 (CSE, B.S.Anangpuria Institute of Technology and Management,, India) Abstract: Communication is the important part in any type of network for making it possible to transfer data from one node to another. Communication needs quality and security for better performance and for acceptance of users and client companies. Data integrity is quite an issue in security and to maintain that integrity we tend to improve as to provide the better encryption processes for security. In our proposed work, an innovative and practical authentication system using Diffie-Hellman and AMA (Anonymous Micro payments Authentication) are designed for micropayments in mobile data network. Through AMA the customer and the merchant can authenticate each other indirectly, at the same time the merchant doesn’t know the customer’s real identity. A customer can get fast micropayments not only from his local domain but also from a remote domain without increasing any burden on his mobile phone/smartcard. Diffie-Hellman Encryption Algorithm adds more security to the proposed work. Keywords: AMA, Authentication, Diffie-Helman, Provate key, Public key I. INTRODUCTION The entire field of network security is vast and in an evolutionary stage. The range of study encompasses a brief history dating back to internet’s beginnings and the current development in network security. In order to understand the research being performed today, background knowledge of the internet, its vulnerabilities, attack methods through the internet, and security technology is important and therefore they are reviewed. Micropayments refer to low value financial transaction ranging from several pennies to a few dollars. At present, a large portion of electronic commerce occurring in the mobile data network belong to the category of micropayments, such as ringing tone download, news subscription, etc. Although the amount of each single transaction in micropayments is small, the number of users and transactions is large. A small percentage loss due to insecure transaction on fraud will be enlarged to a big sum. Thus, an important issue of micropayments is security. Many achievements on micropayment and its security are gained by researchers and cryptographers [3]. All these can be classified into script-based, hashchain-based and macropayment-based categories. Millicent [4][5], a scriptbased micropayment, introduces a kind of currency- scrip, which is digital money that is issued by a single vendor. It uses no public-key cryptography and is optimized for repeated micropayments to the same vendor. Its distributed approach allows a micropayment to be validated and double spending prevented without the overhead of contacting the broker online during purchase. Diffie-Hellman in SSL: Secure Sockets Layer (SSL) is a cryptographic protocol developed by Netscape in 1995. SSL V3.0 has since become the predominant method and defacto standard for securing information flow between web users and web servers. Diffie-Hellman in SSH: Secure Shell (SSH) is a protocol and program used to encrypt traffic between two computers. This is most commonly done as a secure replacement for tools like telnet, ftp and the Berkeley “r” commands (rlogin, rsh, etc,) II. DESIGN PRINCIPLES 1. Principles The principles in the design of AMA are as following:  Shifting as much computational effort as possible from the user side to the network side because the customer represented by a mobile phone/smartcard has limited computational capabilities and storage.  Allowing customer to get micropayment services from any domain at any place as soon as possible because the response time of micropayment systems is important to the users in the business world.  Allowing new users and new merchants to join at any time.  Limited fairness in micropayments because the cost of complete fairness is very expensive. Public Key Cryptography (PKC) is higher than that of symmetric key cryptography (SKC). This combined authentication method is enough safe for mobile micropayments.
  • 2. Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile Data Network www.iosrjournals.org 19 | Page Fig 1: Three trust models for Authentication The Authentication model for AMA is designed based on a trusted party, Credential center (CC). Model Three is similar to Kerberos protocol [6]. Because there is the fewest interaction paths with the customer in model one. Clearing and settlement Center (CS) is established to handle all fund transfers between customers and merchants. Although CC and CS are security bottlenecks and performance bottlenecks of the whole system, the simplicity of trust model and debit model structure can reduce the transaction cost significantly. 2. Diffie-Hellman Key Exchange Algorithm  Global Public Elements: Prime number q; α < q and α is a primitive root of q.  User A Key Generation: User B Key Generation:  Select private XA : XA < q  Select private XB: XB < q  Calculate public YA YA = α XA mod q  Calculate public YB : YB = α XB mod q  Calculation of Secret Key by User A: K = (YB) XA mod q  Calculation of Secret Key by User B: K= (YA) XB mod q Our Research proceeds with following algorithm Sender Side 1. Xa < q (user can select any random number less than q) 2. Ya = a Xa mod q (Ya is a public key of sender) 3. K = Yb Xa mod q (where Yb is a public key of receiver and K is a private key) 4. pow = 2K 5. pow = pow + q Encrypt every letter of plain text using pow. Receiver Side 1. Xb < q (user can select any random number less than q) 2. Yb = a Xb mod q (Yb is a public key of receiver) 3. K = Ya Xb mod q (where Ya is a public key of sender and K is a private key) 4. pow = 2K 5. pow = pow + q Decrypt every letter of Cipher text using pow.
  • 3. Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile Data Network www.iosrjournals.org 20 | Page Fig 2: Diffie Hellman Algorithm III. LITERATURE SURVEY Eun-Jun Yoon et al. [7] proposed an efficient Diffie-Hellman-MAC key exchange scheme providing same securities as proposed by Jeong et al. who proposed a strong Diffie-Hellman- DSA key exchange scheme providing security against session state reveal attacks as well as forward secrecy and key independence. Emmanuel Bresson et al. [8] has investigated the Group Diffie-Hellman protocols for authenticated key exchange (AKE) are designed to provide a pool of players with a shared secret key which may later be used, for example, to achieve multicast message integrity. F. Lynn Mcnulty [9] has drawn attention to the national and societal view of the role of encryption will be one of the defining issues for our culture in the twenty-first century SANS Institute Info Sec Reading Room [10] has investigated the overview of the Diffie-Hellman Key Exchange algorithm and review several common cryptographic techniques in use on the Internet today that incorporate diffie-Hellman. Michel Abdalla [18] discussed a Diffie-Hellman based encryption scheme, DHIES (formerly named DHES and DHAES), which is now in several (draft) standards. The scheme is as efficient as ElGamal encryption, but has stronger security properties. IV. AMA USING DIFFIE HELLMAN 1. Principles and Notations All the parties involved in the micropayment systems are called principals. All principals communicate through wireless and wired network. Basic principals in micropayment systems are merchant, customer, credential center, clearing and settlement center. The symbols C, M, CC and CS are used to denote the names of the principals Customer, Merchant, Credential Center, Clearing and Settlement Center respectively.  Global prime number : q,α < q and α is a primitive root of q  Xa : Principal A’s private key  Ya : Principal A’s public key ; Ya = α Xa mod q  Xb : Principal B’s private key  Yb : Principal B’s public key ; Yb = α Xb mod q  Yc : Principal C’s concatenated values  H(Yc) : Principal C’s hash value  Sk : Principal D’s Session key Fig 3: AMA Model 2. Protocol Explanation As in figure 3, protocol is explained as follows,  Step 1: Customer A calculates Ya and sends to the Merchant B.
  • 4. Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile Data Network www.iosrjournals.org 21 | Page  Step 2: Merchant B calculates Yb and sends (Ya, Yb) to Credential center C.  Step 3: CC performs concatenation Yc and finds hash value H(Yc). CC sends Hash value to Clearing and settlement center D.  Step 4: CS creates Session key Sk and removes hash function. CS sends (Yc, Sk)  Step 5: Merchant B checks Yc and(Ya, Yb). If equals confidentiality is properly maintained between customer and merchant V. EVALUATION OF DMA 1. Security The following goals are to be achieved for secure micropayments in mobile data network after running these proposed protocols successfully.  Goal 1: Mutual Authentication between the customer and the merchant  Goal 2: Anonymity  Goal 3: Confidentiality  Goal 4: Integrity  Goal 5: Immune from key guessing attacks  Goal 6: Secure micropayments on roaming 2. Feasibility Practical protocols for secure mobile micropayments should suit mobile environment limitations, such as limited bandwidth of mobile network, limited computational capability and storage of mobile phone/smart card, etc. In AMA, most computational efforts are moved to wire network side without increasing communication effort in the air. 3. Scalability AMA can support mobile commerce with large value if asymmetric signature is used. At that time, capabilities of mobile phone/smart card will be improved. VI. Conclusion A large portion of electronic commerce occurring in the mobile data network belong to the category of micropayments, such as ringing tone download, news subscription, etc. Although the amount of each single transaction in micropayments is small, the number of users and transactions is large. So, it is very useful for both the users and also the merchants. Credential centre (CC) and Clearing and settlement centre (CS) will have the possibility to leak information. Acknowledgements The Proposed algorithm with enhancement has come into shape in the form of algorithm. After shaping up of proposed algorithm, implementation has been tested. Credential center, Clearing and settlement center are performance bottlenecks of the whole system. The key management of Credential center is also an important issue for secure mobile micropayments. These are common problems of authentication mechanism based on symmetric key cryptography and should be improved in future work. REFERENCES [1] Zhi-Yuan Hu, Yao-Wei Liu, Xiao Hu, Jian Hua Li, “Anonymous micropayments authentication(AMA) in mobile data network”,IEEE INFOCOM 2004. [2] Vishal Garg, Rishu,” Improved Diffie-Hellman algorithm for network secuiryt enhancement”, IJCTA,vol 3(4),1327-1331 [3] Eun-Jun Yoon and Kee-Young Yoo, “ An Efficient Diffie-Hellman-MAC Key Exchange Scheme”, 2009 Fourth International conference on Innovative computing, Information and Control. [4] Emmanuel Bresson, Olivier Chevassut, David Pointcheva, Jean-Jacques Quisquater, “Authenticated Group Diffie-Hellman Key Exchange”, Computer and Communication Security- proc of ACM CSS’01, Philadelphia, Pennsylvania, USA, Pages 255-264, ACM Press, November 5-8, 2001. [5] Mario Cagaljm, Srdjan Capkun and Jean-Pierre Hubaux,” Key agreement in peer-to-peer wireless networks”, Ecole Polytechnique F´ed´erale de Lausanne (EPFL), CH-1015 Lausanne. [6] T. Pedersen “Electronic payments of small amounts” In Fourth Cambridge Workshop on Security Protocols. Springer Verlag, Lecture Notes in Computer Science, April 1996. [7] P.M. Hallam-Baker. Micro Payment Transfer Protocol (MPTP) Version Novermber 1995. Http://www.w3.org/TR/WD-mptp-951122. [8] M. Peirce, “Multi-party Micropayments for Mobile Communications”, PhD Thesis, Trinity College Dublin, Ireland, Oct. 2000 [9] G. Horn and B. Preneel, “Authentication and payment in future mobile systems” Computer Security - ESORICS'98, Lecture Notes in Computer Science 1485, 1998, pp. 277-293. [10] Mihir Bellare and Phillip Rogaway “Entity Authentication and key distribution” Extended abstract in Advances in Cryptology – CRYPTO 93, Lecture Notes in Computer Science Vol. 773, D. Stinson ed, Springer-Verlag, 1994.