SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume: 3 | Issue: 2 | Jan-Feb 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470
@ IJTSRD | Unique Reference Paper ID – IJTSRD21562 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 968
An Identity-Based Mutual Authentication with Key Agreement
B. V. S. Manikya Rao1, Y. Triveni2
1
Final M.Tech Student, 2Associate Professor
1,2Department of CSE, Sarada Institute of Science,
1,2Technology and Management (SISTAM), Srikakulam, Andhra Pradesh, India
ABSTRACT
Now days mobile networks are rapid development by performing the e-commerce transaction such as online shopping,
internet banking and e- payment. So that to provide secure communication, authentication and key agreement is important
issue in the mobile networks. Hence, schemes for authentication and key agreement have been studied widely. So that to
provide efficient and more secure techniques is necessary. In this paper we are proposed random prime order key agreement
protocol proposed for authentication and key agreement. Another technique is used to provide security of transferred data
using key xor data transpose technique. By using this technique, we provide moresecurityand more efficiencyfor transferring
data.
1. INTRODUCTION
During secure communication, authentication should be
performed to protect users and a secret session key should
be established for confidentiality. As the development of
cryptography, schemes for authentication and key
agreement develop accordingly. Early schemes arebased on
passwords. The first password authentication scheme to
authenticate a remote user over an insecure channel was
proposed by Lamport. Introducing public key cryptography
into cryptography, Diffie and Hellman proposed thefirstkey
agreement scheme. Many authentication andkey agreement
schemes based on traditional public key cryptography were
constructed. Despite the vulnerability and lackness of
authentication, Diffie and Hellman’s key agreement scheme
is the foundation for other schemes and most of key
agreement schemes use Diffie and Hellman’s technique.
Since the introduction of identity based cryptography by
Shamir , many identity-base cryptosystems were presented
in application. It is not until Boneh and Franklinproposed an
identity-base encryption scheme with bilinear pairings on
elliptic curves that identity-base cryptography develops
rapidly.
Cryptography is the study of “mathematical” systems
involving two kinds of security problems: privacy and
authentication. A privacy system prevents the extraction
information by unauthorized parties from messages
transmitted over a public channel, thus assuring the sender
of a message that it is being read only in conventional
cryptographic by the intended recipient. An authentication
system prevents the unauthorizedinjectionof messagesinto
a public channel, assuring the receiver of a message of the
legitimacy of its sender A channel is considered public if its
security is inadequate for the needs of its users. A channel
such as a telephone line may thereforebeconsideredprivate
by some users and public by others. Any channel may be
threatened with eavesdropping or injection or both,
depending on its use. In telephone communication, the
threat of injection is paramount, since the called party
cannot determine which phone is calling. Eavesdropping,
which requires the use of a wiretap, is technically more
difficult and legally hazardous. In radio, by comparison, the
situation is reversed. Eavesdropping is passive and involves
no legal hazard, while injection exposes the illegitimate
transmitter to discovery and prosecution. Having divided
our problems into those of privacy and authentication we
will sometimes further subdivide authentication into
message authentication,which istheproblemdefined above,
and user authentication, in which the only taskof thesystem
is to verify that an individual is who he claims to be.
2. Existing System
During secure communication, authentication should be
performed to protect users and a secret session key should
be established for confidentiality. As the development of
cryptography, schemes for authentication and key
agreement develop accordingly. Early schemes arebased on
passwords. The first password authentication scheme to
authenticate a remote user over an insecure channel was
proposed by Lamport. Introducing public key cryptography
into cryptography, Diffie and Hellman proposed thefirstkey
agreement scheme. Many authentication andkey agreement
schemes based on traditional public key cryptography were
constructed. Since Diffie and Hellman’s scheme lacks
authentication and it is vulnerable to Man-in-the middle
attack, then authentication with key agreement is necessary
and attractive in practical implementation. Despite the
vulnerability and laciness’ of authentication, Diffie and
Hellman’s key agreement scheme is the foundation for other
schemes and most of key agreement schemes use Diffie and
Hellman’s technique. Sincetheintroductionof identitybased
cryptography by Shamir, many identity-base cryptosystems
were presented in application. It is not until Boneh and
Franklin proposed an identity-base encryption schemewith
bilinear pairings on elliptic curves that identity-base
cryptography develops rapidly. Various identity-based
authentication and key agreement schemes are constructed
and made into application. Someauthenticationschemescan
be found in . However, these schemes do not provide mutual
authentication and key exchange between the client and the
server, which is required in mobile client-server
environment.
3. PROPOSED SYSTEM
The proposed system contains mainly two concepts for the
authentication, key agreement and security of transferring
data. By implementing those concepts we can perform
mutual authentication of users and key agreement in both
users.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Reference Paper ID – IJTSRD21562 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 969
The process of mutual authentication and key agreement as
follows.
Random prime order key agreement protocol:
1. The sender will generate private key randomly.
2. Calculate public key using this formula pub=g private%
P.
3. After calculating public key the senderrandomlychoose
SRand SV values.
4. Calculate Sa value by performing following steps.
i. C=(message.hashCode)%200000;
ii. C=C%200000;
iii. C3=C-(privatekey*SR);
iv. Sk=Gcd(C3)
v. Int k1=Inverse(sk,p-1);
vi. V=c3*k1;
vii. Sa=V%P;
5. Calculate SA by performing following steps.
SA = for(int i=1;i<=Sa;i++)
temp=(temp*SR)%P;
6. Send public key,SRand SAto Receiver.
7. The receiver also perform the step 1 to 5.
8. After that we can calculate RB value using following
steps.
RB = for(int i=1;i<=VB;i++)
temp=(temp*SR)%P;
9. The Receiver will send RBvalue to Sender.
10. The sender will receive the RB value and calculate
SA1and acknowledgment.
11. After calculating the sender will send to receiver .
12. The receiver will retrieve the both values and perform
the authentication status.
13. After that the sender will generate key by using
following equation.
Key=for(int i=1;i<=RV;i++)
temp=(temp*RB)%P;
14. The receiver will generate key by using following
equation.
Key=for(int i=1;i<=CA1;i++)
temp=(temp*RB)%P;
After generating shared key the sender will perform the
encryption process as follows
Key for data transpose technique:
1. The transferring message can be converted into 32 X 32
matrix format.
2. After generating matrix format we transpose into rows
and columns.
3. After transpose matrix that data can be converted into
Ascii values.
4. The transpose data AND key can be xor again convert
into binary format.
5. After that binary data can be converted into asciiformat
and that data can be sended to receiver.
6. The receiver will retrieve that cipher data and perform
the reverse process.
7. After completion of reverse process we can get original
message.
4. Rquirement Analysis
Software Requirements:
Functional requirements: It includes a set of usecasesthat
describe all the interactions the users will have with the
software.
Non-functionalrequirements: requirementswhich impose
constraints on the design or implementation (such as
performance engineering requirements, quality standards,
or design constraints).
Software Requirements for Present Project:
1. Operating System: Any Operating System
2. Run-Time: OS Compatible JVM
Hardware Requirements
1. VDU: Monitor/ LCD TFT / Projector
2. Input Devices: Keyboard and Mouse
3. RAM: 512 MB
4. Processor: P4 or above
5. Storage: 10 to 100 MB of HDD space.
5. SOFTWARE DEVELOPMENT LIFE CYCLE
The Systems Development Life Cycle (SDLC), or Software
Development Life Cycle in systems engineering, information
systems and software engineering, is the process of creating
or altering systems, and the models and methodologies that
people use to develop these systems.
In software engineering the SDLC concept underpins many
kinds of software development methodologies. These
methodologies form the framework for planning and
controlling the creation of an information system the
software development process.
Software Model or Architecture Analysis:
THE GENERAL MODEL
Software life cycle models describe phases of the software
cycle and the order in which those phases are executed.
There are tons of models, and many companies adopt their
own, but all have very similar patterns. The general, basic
model is shown below:
Figure 1 System Development Life Cycle
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Reference Paper ID – IJTSRD21562 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 970
Each phase producesdeliverablesrequiredbythenextphase
in the life cycle. Requirements are translated into design.
Code is produced during implementation that is driven by
the design. Testing verifies the deliverable of the
implementation phase against requirements
SPIRAL MODEL:
SPIRAL MODEL was defined by Barry Boehm in his 1988
article, A spiral Model of Software Development and
Enhancement. This model was not the first model to discuss
iterative development, but it was the first model to explain
why the iteration models
The steps for Spiral Model can be generalized as follows:
The new system requirements are defined in as much
details as possible. This usually involves interviewing a
number of users representingalltheexternalorinternal
users and other aspects of the existing system.
A preliminary design is created for the new system.
A first prototype of the new system is constructed from
the preliminary design. This is usually a scaled-down
system, and represents an approximation of the
characteristics of the final product.
A second prototype is evolved by a fourfold procedure:
1. Evaluating the first prototype in terms of its strengths,
weakness, and risks.
2. Defining the requirements of the second prototype.
3. Planning an designing the second prototype.
4. Constructing and testing the second prototype.
At the customer option, the entire project can be aborted if
the risk is deemed too great. Risk factors might involve
developmentcostoverruns,operatingcostmiscalculation,or
any other factor that could, in the customer’s judgment,
result in a less-than-satisfactory final product. The existing
prototype is evaluated in the same manner as was the
previous prototype, and if necessary, another prototype is
developed from it according to the fourfold procedure
outlined above.
The preceding steps are iterated until the customer is
satisfied that the refined prototype represents the final
product desired.
The final system is constructed, based on the refined
prototype. The final system is thoroughly evaluatedand
tested. Routine maintenance is carried on a continuing
basis to prevent large scale failures and to minimize
down time.
SPIRAL LIFE CYCLE MODEL:
The spiral model is similar to the incremental model, with
more emphases placed on risk analysis.Thespiralmodel has
four phases: Planning, Risk Analysis, Engineering and
Evaluation. A software project repeatedly passes through
these phases in iterations (called Spirals in this model). The
baseline spiral,starting in the planning phase, requirements
are gathered and risk is assessed. Each subsequent spirals
builds on the baseline spiral. Requirements are gathered
during the planning phase. In the risk analysis phase, a
process is undertaken to identify risk and alternate
solutions. A prototype is produced at the end of therisk
analysis phase. Software is produced in the engineering
phase, along with testing atthe end of the phase. The
evaluation phase allows the customer to evaluatetheoutput
of the project to date before the project continuestothenext
spiral. In the spiralmodel,theangularcomponentrepresents
progress, and the radius of the spiral represents cost.
6. TESTING
Software testing can also be stated as the process of
validating and verifying that a software
program/application/product:
1. meets the business and technical requirements that
guided its design and development;
2. Works as expected; and
3. Can be implemented with the same characteristics.
TESTING METHODS
Software testing methods are traditionally divided into
white- and black-box testing.
White box testing
API testing (application programming interface) - testing of
the application using public
and private APIs
Code coverage - creating tests to satisfy some criteria of
code coverage (e.g., the test designer cancreate tests to
cause all statements in the program to be executed at
least once)
Fault injection methods - improving the coverage of a
test by introducing faults to test code paths Mutation
testing methods
Static testing - White box testing includes all static
testing
TEST COVERAGE
White box testing methods can also be used to evaluate the
completeness of a test suite that was created with black box
testing methods. This allows the software team to examine
parts of a system that are rarely tested and ensures that the
most important function points have been tested.
Two common forms of code coverage are:
Function coverage, which reports onfunctionsexecuted
Statement coverage, which reports on the number of
lines executed to complete the test
BLACK BOX TESTING
Black box testing treats the software as a "black box"—
without any knowledge of internal implementation. Black
box testing methods include: equivalence partitioning,
boundary value analysis, all-pairs testing, fuzz testing,
model-based testing, traceability matrix, exploratorytesting
and specification-based testing. Specification-based testing:
Specification-based testing aims to test the functionality of
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Reference Paper ID – IJTSRD21562 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 971
software according to the applicable requirements.Thus, the
tester inputs data into, and only sees the output from, the
test object. This level of testing usually requires thorough
test cases to be provided to the tester, who then can simply
verify that for a given input, the output value (or behavior),
either "is" or "is not" the same as the expected value
specified in the test case. Specification-based testing is
necessary, but it is insufficient to guard against certain risks.
7. CONCLUSION
This paper proposes random prime order key protocol and
key xor data transpose technique for mobile client server
environment. Compared with known our scheme is more
efficient and good properties against for various types of
attacks. This paper also provides more security of
transferring data. So that by implementing those techniques
we can improve efficiency given project and also provide
more security for transferring data.
8. REFERENCES
[1] L. Lamport. ”Password authentication with insecure
communication”, Communications of the ACM 24 (11)
770-772, (1981).
[2] W. Diffie, M. Hellman. ”New directions in
cryptography”. IEEE Trans Inf Theory.IT- 22(6):644-
654, (1976).
[3] A. Shamir.”Identity-based cryptosystemsandsignature
protocols”, in: Proceedings of the Advances in
Cryptology-Crypto84, Santa Barbara, USA, pp. 47-53,
(1984).
[4] D. Boneh, M. Franklin. ”Identity-basedencryption from
the Weil pairing”, SIAM J. Comput. 32(3) 586-
615,(2003) .
[5] M. L. Das, A. Saxena, V.P. Gulati, D.B. Phatak. ”A novel
remote user authentication scheme using bilinear
pairings”, Comput. Security 25 (3) 184-189, (2006).
[6] Y. M. Tseng, T. Y. Wu, J. D. Wu. ”A pairing-based user
authentication scheme for wireless clients with smart
cards”, Informatica 19 (2) 285-302, (2008).
[7] T. Goriparthi, M.L. Das, A. Saxena. ”An improved
bilinear pairing based remote user authentication
scheme”, Comput. Standard Interf. 31 (1) 181-185,
(2009).
[8] J. Yang, C. Chang. ”An ID-based remote mutual
authentication with key agreementprotocolformobile
devices on ellipticcurvecryptosystem”,Computersand
Security 138-143,(2009).
[9] E. Yoon, K. Yoo. ”Robust ID-based remote mutual
authentication with key agreementprotocolformobile
devices on ECC”, in: 2009 International Conference on
Computational Science and Engineering, Vancouver,
Canada, pp. 633-640, (2009).
[10] T. Wu, Y. Tseng. ”An efficient client authentication and
key agreement protocol for mobile client-server
environment”, Computer Networks. 54, 1520-
1530,(2010).
[11] T. H. Chen, Y. C. Chen, and W. K. Shih. ”An advanced ecc
id-based remote mutual authentication scheme for
mobile devices”, 2010 Symposia and Workshops on
Ubiquitous,Autonomic and Trusted Computing, pp.
116- 120, (2010).
[12] D. He, J. Chen, J. Hu. ”An ID-based client authentication
with key agreement protocol for mobile clientCserver
environment on ECC with provable security”.
InformationFusion 13 223-230, (2012).

More Related Content

What's hot

DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver04
 
3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor AuthenticationFortytwo
 
A Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingA Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingIRJET Journal
 
Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2IAEME Publication
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerceNishant Pahad
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
Secure instant messanger service
Secure instant messanger serviceSecure instant messanger service
Secure instant messanger serviceAditya Gupta
 
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...IJNSA Journal
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_faHai Nguyen
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismAmit Singh
 
IRJET- HTTP Flooding Attack Detection using Data Mining Techniques
IRJET- HTTP Flooding Attack Detection using Data Mining TechniquesIRJET- HTTP Flooding Attack Detection using Data Mining Techniques
IRJET- HTTP Flooding Attack Detection using Data Mining TechniquesIRJET Journal
 
Enhancing the impregnability of linux servers
Enhancing the impregnability of linux serversEnhancing the impregnability of linux servers
Enhancing the impregnability of linux serversIJNSA Journal
 
Voice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchVoice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchIJMER
 
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKSEFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKScscpconf
 
Allot ServiceProtector - DDos Mitigation
Allot ServiceProtector - DDos MitigationAllot ServiceProtector - DDos Mitigation
Allot ServiceProtector - DDos MitigationAllot Communications
 

What's hot (20)

DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
Threshold cryptography
Threshold cryptographyThreshold cryptography
Threshold cryptography
 
Security
SecuritySecurity
Security
 
Skyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless SecuritySkyriver Communications – Fixed Wireless Security
Skyriver Communications – Fixed Wireless Security
 
3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication
 
A Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS BankingA Secure Protocol For End To End Security To SMS Banking
A Secure Protocol For End To End Security To SMS Banking
 
Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2Implementation of public key cryptography in kerberos with prevention 2
Implementation of public key cryptography in kerberos with prevention 2
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerce
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Secure instant messanger service
Secure instant messanger serviceSecure instant messanger service
Secure instant messanger service
 
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
ENHANCE RFID SECURITY AGAINST BRUTE FORCE ATTACK BASED ON PASSWORD STRENGTH A...
 
Web Security
Web SecurityWeb Security
Web Security
 
Securing corporate assets_with_2_fa
Securing corporate assets_with_2_faSecuring corporate assets_with_2_fa
Securing corporate assets_with_2_fa
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
 
Locking Down and Re-Using V2X Security - Lessons for Smart Cities
Locking Down and Re-Using V2X Security - Lessons for Smart CitiesLocking Down and Re-Using V2X Security - Lessons for Smart Cities
Locking Down and Re-Using V2X Security - Lessons for Smart Cities
 
IRJET- HTTP Flooding Attack Detection using Data Mining Techniques
IRJET- HTTP Flooding Attack Detection using Data Mining TechniquesIRJET- HTTP Flooding Attack Detection using Data Mining Techniques
IRJET- HTTP Flooding Attack Detection using Data Mining Techniques
 
Enhancing the impregnability of linux servers
Enhancing the impregnability of linux serversEnhancing the impregnability of linux servers
Enhancing the impregnability of linux servers
 
Voice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A ResearchVoice over IP (VOIP) Security Research- A Research
Voice over IP (VOIP) Security Research- A Research
 
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKSEFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
 
Allot ServiceProtector - DDos Mitigation
Allot ServiceProtector - DDos MitigationAllot ServiceProtector - DDos Mitigation
Allot ServiceProtector - DDos Mitigation
 

Similar to An Identity-Based Mutual Authentication with Key Agreement

Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyIdentity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyCSCJournals
 
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET Journal
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyIJERA Editor
 
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...IOSR Journals
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy ExamLisa Olive
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...IJwest
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerTELKOMNIKA JOURNAL
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerPutra Wanda
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codesMd. Hasibur Rashid
 
A NOVEL PARADIGM IN AUTHENTICATION SYSTEM USING SWIFI ENCRYPTION /DECRYPTION ...
A NOVEL PARADIGM IN AUTHENTICATION SYSTEM USING SWIFI ENCRYPTION /DECRYPTION ...A NOVEL PARADIGM IN AUTHENTICATION SYSTEM USING SWIFI ENCRYPTION /DECRYPTION ...
A NOVEL PARADIGM IN AUTHENTICATION SYSTEM USING SWIFI ENCRYPTION /DECRYPTION ...IJNSA Journal
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identityWAFAA AL SALMAN
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Network Security
Network SecurityNetwork Security
Network SecurityBeth Hall
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communicationmanish kumar
 
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...Omlis
 
A novel paradigm in authentication system
A novel paradigm in authentication systemA novel paradigm in authentication system
A novel paradigm in authentication systemIJNSA Journal
 

Similar to An Identity-Based Mutual Authentication with Key Agreement (20)

Identity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key CryptographyIdentity-Based Key Management in MANETs Using Public Key Cryptography
Identity-Based Key Management in MANETs Using Public Key Cryptography
 
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...
 
kasodhan2019.pdf
kasodhan2019.pdfkasodhan2019.pdf
kasodhan2019.pdf
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
 
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
Diffie-Hellman Algorithm and Anonymous Micropayments Authentication in Mobile...
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
A Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile SystemA Review Study on Secure Authentication in Mobile System
A Review Study on Secure Authentication in Mobile System
 
Cybersecurity Slides
Cybersecurity  SlidesCybersecurity  Slides
Cybersecurity Slides
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
 
Efficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant MessengerEfficient Data Security for Mobile Instant Messenger
Efficient Data Security for Mobile Instant Messenger
 
E voting authentication with qr-codes
E voting authentication with qr-codesE voting authentication with qr-codes
E voting authentication with qr-codes
 
A NOVEL PARADIGM IN AUTHENTICATION SYSTEM USING SWIFI ENCRYPTION /DECRYPTION ...
A NOVEL PARADIGM IN AUTHENTICATION SYSTEM USING SWIFI ENCRYPTION /DECRYPTION ...A NOVEL PARADIGM IN AUTHENTICATION SYSTEM USING SWIFI ENCRYPTION /DECRYPTION ...
A NOVEL PARADIGM IN AUTHENTICATION SYSTEM USING SWIFI ENCRYPTION /DECRYPTION ...
 
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKINGIMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
IMPLEMENTATION OF METHODS FOR TRANSACTION IN SECURE ONLINE BANKING
 
Kerberos-PKI-Federated identity
Kerberos-PKI-Federated identityKerberos-PKI-Federated identity
Kerberos-PKI-Federated identity
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Network Security
Network SecurityNetwork Security
Network Security
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communication
 
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
Reconsidering Public Key Infrastructure and its Place in Your Enterprise Stra...
 
A novel paradigm in authentication system
A novel paradigm in authentication systemA novel paradigm in authentication system
A novel paradigm in authentication system
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 

An Identity-Based Mutual Authentication with Key Agreement

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume: 3 | Issue: 2 | Jan-Feb 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 - 6470 @ IJTSRD | Unique Reference Paper ID – IJTSRD21562 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 968 An Identity-Based Mutual Authentication with Key Agreement B. V. S. Manikya Rao1, Y. Triveni2 1 Final M.Tech Student, 2Associate Professor 1,2Department of CSE, Sarada Institute of Science, 1,2Technology and Management (SISTAM), Srikakulam, Andhra Pradesh, India ABSTRACT Now days mobile networks are rapid development by performing the e-commerce transaction such as online shopping, internet banking and e- payment. So that to provide secure communication, authentication and key agreement is important issue in the mobile networks. Hence, schemes for authentication and key agreement have been studied widely. So that to provide efficient and more secure techniques is necessary. In this paper we are proposed random prime order key agreement protocol proposed for authentication and key agreement. Another technique is used to provide security of transferred data using key xor data transpose technique. By using this technique, we provide moresecurityand more efficiencyfor transferring data. 1. INTRODUCTION During secure communication, authentication should be performed to protect users and a secret session key should be established for confidentiality. As the development of cryptography, schemes for authentication and key agreement develop accordingly. Early schemes arebased on passwords. The first password authentication scheme to authenticate a remote user over an insecure channel was proposed by Lamport. Introducing public key cryptography into cryptography, Diffie and Hellman proposed thefirstkey agreement scheme. Many authentication andkey agreement schemes based on traditional public key cryptography were constructed. Despite the vulnerability and lackness of authentication, Diffie and Hellman’s key agreement scheme is the foundation for other schemes and most of key agreement schemes use Diffie and Hellman’s technique. Since the introduction of identity based cryptography by Shamir , many identity-base cryptosystems were presented in application. It is not until Boneh and Franklinproposed an identity-base encryption scheme with bilinear pairings on elliptic curves that identity-base cryptography develops rapidly. Cryptography is the study of “mathematical” systems involving two kinds of security problems: privacy and authentication. A privacy system prevents the extraction information by unauthorized parties from messages transmitted over a public channel, thus assuring the sender of a message that it is being read only in conventional cryptographic by the intended recipient. An authentication system prevents the unauthorizedinjectionof messagesinto a public channel, assuring the receiver of a message of the legitimacy of its sender A channel is considered public if its security is inadequate for the needs of its users. A channel such as a telephone line may thereforebeconsideredprivate by some users and public by others. Any channel may be threatened with eavesdropping or injection or both, depending on its use. In telephone communication, the threat of injection is paramount, since the called party cannot determine which phone is calling. Eavesdropping, which requires the use of a wiretap, is technically more difficult and legally hazardous. In radio, by comparison, the situation is reversed. Eavesdropping is passive and involves no legal hazard, while injection exposes the illegitimate transmitter to discovery and prosecution. Having divided our problems into those of privacy and authentication we will sometimes further subdivide authentication into message authentication,which istheproblemdefined above, and user authentication, in which the only taskof thesystem is to verify that an individual is who he claims to be. 2. Existing System During secure communication, authentication should be performed to protect users and a secret session key should be established for confidentiality. As the development of cryptography, schemes for authentication and key agreement develop accordingly. Early schemes arebased on passwords. The first password authentication scheme to authenticate a remote user over an insecure channel was proposed by Lamport. Introducing public key cryptography into cryptography, Diffie and Hellman proposed thefirstkey agreement scheme. Many authentication andkey agreement schemes based on traditional public key cryptography were constructed. Since Diffie and Hellman’s scheme lacks authentication and it is vulnerable to Man-in-the middle attack, then authentication with key agreement is necessary and attractive in practical implementation. Despite the vulnerability and laciness’ of authentication, Diffie and Hellman’s key agreement scheme is the foundation for other schemes and most of key agreement schemes use Diffie and Hellman’s technique. Sincetheintroductionof identitybased cryptography by Shamir, many identity-base cryptosystems were presented in application. It is not until Boneh and Franklin proposed an identity-base encryption schemewith bilinear pairings on elliptic curves that identity-base cryptography develops rapidly. Various identity-based authentication and key agreement schemes are constructed and made into application. Someauthenticationschemescan be found in . However, these schemes do not provide mutual authentication and key exchange between the client and the server, which is required in mobile client-server environment. 3. PROPOSED SYSTEM The proposed system contains mainly two concepts for the authentication, key agreement and security of transferring data. By implementing those concepts we can perform mutual authentication of users and key agreement in both users.
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Reference Paper ID – IJTSRD21562 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 969 The process of mutual authentication and key agreement as follows. Random prime order key agreement protocol: 1. The sender will generate private key randomly. 2. Calculate public key using this formula pub=g private% P. 3. After calculating public key the senderrandomlychoose SRand SV values. 4. Calculate Sa value by performing following steps. i. C=(message.hashCode)%200000; ii. C=C%200000; iii. C3=C-(privatekey*SR); iv. Sk=Gcd(C3) v. Int k1=Inverse(sk,p-1); vi. V=c3*k1; vii. Sa=V%P; 5. Calculate SA by performing following steps. SA = for(int i=1;i<=Sa;i++) temp=(temp*SR)%P; 6. Send public key,SRand SAto Receiver. 7. The receiver also perform the step 1 to 5. 8. After that we can calculate RB value using following steps. RB = for(int i=1;i<=VB;i++) temp=(temp*SR)%P; 9. The Receiver will send RBvalue to Sender. 10. The sender will receive the RB value and calculate SA1and acknowledgment. 11. After calculating the sender will send to receiver . 12. The receiver will retrieve the both values and perform the authentication status. 13. After that the sender will generate key by using following equation. Key=for(int i=1;i<=RV;i++) temp=(temp*RB)%P; 14. The receiver will generate key by using following equation. Key=for(int i=1;i<=CA1;i++) temp=(temp*RB)%P; After generating shared key the sender will perform the encryption process as follows Key for data transpose technique: 1. The transferring message can be converted into 32 X 32 matrix format. 2. After generating matrix format we transpose into rows and columns. 3. After transpose matrix that data can be converted into Ascii values. 4. The transpose data AND key can be xor again convert into binary format. 5. After that binary data can be converted into asciiformat and that data can be sended to receiver. 6. The receiver will retrieve that cipher data and perform the reverse process. 7. After completion of reverse process we can get original message. 4. Rquirement Analysis Software Requirements: Functional requirements: It includes a set of usecasesthat describe all the interactions the users will have with the software. Non-functionalrequirements: requirementswhich impose constraints on the design or implementation (such as performance engineering requirements, quality standards, or design constraints). Software Requirements for Present Project: 1. Operating System: Any Operating System 2. Run-Time: OS Compatible JVM Hardware Requirements 1. VDU: Monitor/ LCD TFT / Projector 2. Input Devices: Keyboard and Mouse 3. RAM: 512 MB 4. Processor: P4 or above 5. Storage: 10 to 100 MB of HDD space. 5. SOFTWARE DEVELOPMENT LIFE CYCLE The Systems Development Life Cycle (SDLC), or Software Development Life Cycle in systems engineering, information systems and software engineering, is the process of creating or altering systems, and the models and methodologies that people use to develop these systems. In software engineering the SDLC concept underpins many kinds of software development methodologies. These methodologies form the framework for planning and controlling the creation of an information system the software development process. Software Model or Architecture Analysis: THE GENERAL MODEL Software life cycle models describe phases of the software cycle and the order in which those phases are executed. There are tons of models, and many companies adopt their own, but all have very similar patterns. The general, basic model is shown below: Figure 1 System Development Life Cycle
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Reference Paper ID – IJTSRD21562 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 970 Each phase producesdeliverablesrequiredbythenextphase in the life cycle. Requirements are translated into design. Code is produced during implementation that is driven by the design. Testing verifies the deliverable of the implementation phase against requirements SPIRAL MODEL: SPIRAL MODEL was defined by Barry Boehm in his 1988 article, A spiral Model of Software Development and Enhancement. This model was not the first model to discuss iterative development, but it was the first model to explain why the iteration models The steps for Spiral Model can be generalized as follows: The new system requirements are defined in as much details as possible. This usually involves interviewing a number of users representingalltheexternalorinternal users and other aspects of the existing system. A preliminary design is created for the new system. A first prototype of the new system is constructed from the preliminary design. This is usually a scaled-down system, and represents an approximation of the characteristics of the final product. A second prototype is evolved by a fourfold procedure: 1. Evaluating the first prototype in terms of its strengths, weakness, and risks. 2. Defining the requirements of the second prototype. 3. Planning an designing the second prototype. 4. Constructing and testing the second prototype. At the customer option, the entire project can be aborted if the risk is deemed too great. Risk factors might involve developmentcostoverruns,operatingcostmiscalculation,or any other factor that could, in the customer’s judgment, result in a less-than-satisfactory final product. The existing prototype is evaluated in the same manner as was the previous prototype, and if necessary, another prototype is developed from it according to the fourfold procedure outlined above. The preceding steps are iterated until the customer is satisfied that the refined prototype represents the final product desired. The final system is constructed, based on the refined prototype. The final system is thoroughly evaluatedand tested. Routine maintenance is carried on a continuing basis to prevent large scale failures and to minimize down time. SPIRAL LIFE CYCLE MODEL: The spiral model is similar to the incremental model, with more emphases placed on risk analysis.Thespiralmodel has four phases: Planning, Risk Analysis, Engineering and Evaluation. A software project repeatedly passes through these phases in iterations (called Spirals in this model). The baseline spiral,starting in the planning phase, requirements are gathered and risk is assessed. Each subsequent spirals builds on the baseline spiral. Requirements are gathered during the planning phase. In the risk analysis phase, a process is undertaken to identify risk and alternate solutions. A prototype is produced at the end of therisk analysis phase. Software is produced in the engineering phase, along with testing atthe end of the phase. The evaluation phase allows the customer to evaluatetheoutput of the project to date before the project continuestothenext spiral. In the spiralmodel,theangularcomponentrepresents progress, and the radius of the spiral represents cost. 6. TESTING Software testing can also be stated as the process of validating and verifying that a software program/application/product: 1. meets the business and technical requirements that guided its design and development; 2. Works as expected; and 3. Can be implemented with the same characteristics. TESTING METHODS Software testing methods are traditionally divided into white- and black-box testing. White box testing API testing (application programming interface) - testing of the application using public and private APIs Code coverage - creating tests to satisfy some criteria of code coverage (e.g., the test designer cancreate tests to cause all statements in the program to be executed at least once) Fault injection methods - improving the coverage of a test by introducing faults to test code paths Mutation testing methods Static testing - White box testing includes all static testing TEST COVERAGE White box testing methods can also be used to evaluate the completeness of a test suite that was created with black box testing methods. This allows the software team to examine parts of a system that are rarely tested and ensures that the most important function points have been tested. Two common forms of code coverage are: Function coverage, which reports onfunctionsexecuted Statement coverage, which reports on the number of lines executed to complete the test BLACK BOX TESTING Black box testing treats the software as a "black box"— without any knowledge of internal implementation. Black box testing methods include: equivalence partitioning, boundary value analysis, all-pairs testing, fuzz testing, model-based testing, traceability matrix, exploratorytesting and specification-based testing. Specification-based testing: Specification-based testing aims to test the functionality of
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Reference Paper ID – IJTSRD21562 | Volume – 3 | Issue – 2 | Jan-Feb 2019 Page: 971 software according to the applicable requirements.Thus, the tester inputs data into, and only sees the output from, the test object. This level of testing usually requires thorough test cases to be provided to the tester, who then can simply verify that for a given input, the output value (or behavior), either "is" or "is not" the same as the expected value specified in the test case. Specification-based testing is necessary, but it is insufficient to guard against certain risks. 7. CONCLUSION This paper proposes random prime order key protocol and key xor data transpose technique for mobile client server environment. Compared with known our scheme is more efficient and good properties against for various types of attacks. This paper also provides more security of transferring data. So that by implementing those techniques we can improve efficiency given project and also provide more security for transferring data. 8. REFERENCES [1] L. Lamport. ”Password authentication with insecure communication”, Communications of the ACM 24 (11) 770-772, (1981). [2] W. Diffie, M. Hellman. ”New directions in cryptography”. IEEE Trans Inf Theory.IT- 22(6):644- 654, (1976). [3] A. Shamir.”Identity-based cryptosystemsandsignature protocols”, in: Proceedings of the Advances in Cryptology-Crypto84, Santa Barbara, USA, pp. 47-53, (1984). [4] D. Boneh, M. Franklin. ”Identity-basedencryption from the Weil pairing”, SIAM J. Comput. 32(3) 586- 615,(2003) . [5] M. L. Das, A. Saxena, V.P. Gulati, D.B. Phatak. ”A novel remote user authentication scheme using bilinear pairings”, Comput. Security 25 (3) 184-189, (2006). [6] Y. M. Tseng, T. Y. Wu, J. D. Wu. ”A pairing-based user authentication scheme for wireless clients with smart cards”, Informatica 19 (2) 285-302, (2008). [7] T. Goriparthi, M.L. Das, A. Saxena. ”An improved bilinear pairing based remote user authentication scheme”, Comput. Standard Interf. 31 (1) 181-185, (2009). [8] J. Yang, C. Chang. ”An ID-based remote mutual authentication with key agreementprotocolformobile devices on ellipticcurvecryptosystem”,Computersand Security 138-143,(2009). [9] E. Yoon, K. Yoo. ”Robust ID-based remote mutual authentication with key agreementprotocolformobile devices on ECC”, in: 2009 International Conference on Computational Science and Engineering, Vancouver, Canada, pp. 633-640, (2009). [10] T. Wu, Y. Tseng. ”An efficient client authentication and key agreement protocol for mobile client-server environment”, Computer Networks. 54, 1520- 1530,(2010). [11] T. H. Chen, Y. C. Chen, and W. K. Shih. ”An advanced ecc id-based remote mutual authentication scheme for mobile devices”, 2010 Symposia and Workshops on Ubiquitous,Autonomic and Trusted Computing, pp. 116- 120, (2010). [12] D. He, J. Chen, J. Hu. ”An ID-based client authentication with key agreement protocol for mobile clientCserver environment on ECC with provable security”. InformationFusion 13 223-230, (2012).