A Novel Message Integrity Code Based Authentication Protocol
|International Journal of Engineering Trends and Technology (IJETT)||
|© 2014 by IJETT Journal|
|Year of Publication : 2014|
|Authors : ChittiRameshkumar, RameshKumar behara
ChittiRameshkumar, RameshKumar behara"A Novel Message Integrity Code Based Authentication Protocol", International Journal of Engineering Trends and Technology (IJETT), V17(6),251-255 Nov 2014. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Now a day’s wireless local area network rapidly increase of mobile device and more efficient of link setup mechanism. For the rapidly increase of WLAN we are also provide security of transferring data. For this purpose so many authentication protocol are proposed and one of the protocol is 802.11i. Through experiments we observe that the authentication delay of 802.11i is intolerable under some scenarios, and we point that the main reason resulting in such inefficiency is due to its design from the framework perspective which introduces too many messages. In this paper we are proposed protocol for generating low cast id based authentication protocol for authentication users and transferring data through network we are using message integrity code (MIC) protocol. By providing those approaches we can moreefficiency, simplicity and more security for the data transmission.
1. D. Beaver, “Secure Multi-party Protocols and Zero-Knowledge Proof SystemsTolerating a Faulty Minority”, J. Cryptology (1991) 4: 75-122.
2. M. Bellare, R. Canetti and H. Krawczyk, “A modular approach to the designand analysis of authentication and key-exchange protocols”, 30th STOC, 1998.
3. M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway, “Relations Among Notionsof Security for Public-Key Encryption Schemes”, Advances in Cryptology- CRYPTO’98 Proceedings, Lecture Notes in Computer Science Vol. 1462, H.Krawczyk, ed., Springer-Verlag, 1998, pp. 26–45.
4. M. Bellare, E. Petrank, C. Rackoff and P. Rogaway, “Authenticated key exchangein the public key model,” manuscript 1995–96.
5. M. Bellare and P. Rogaway, “Entity authentication and key distribution”, Advancesin Cryptology, - CRYPTO’93, Lecture Notes in Computer Science Vol.773, D. Stinson ed, Springer-Verlag, 1994, pp. 232-249.
6. M. Bellare and P. Rogaway, “Provably secure session key distribution– the threeparty case,” Annual Symposium on the Theory of Computing (STOC), 1995.
7. R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva and M. Yung,“Systematic design of two-party authentication protocols,” IEEE Journal onSelected Areas in Communications (special issue on Secure Communications),11(5):679–693, June 1993. (Preliminary version: Crypto’91.)
8. S. Blake-Wilson, D. Johnson and A. Menezes, “Key exchange protocols andtheir security analysis,” Proceedings of the sixth IMA International Conferenceon Cryptography and Coding, 1997.
9. S. Blake-Wilson and A. Menezes, “Entity authentication and key transport protocolsemploying asymmetric techniques”, Security Protocols Workshop, 1997.
10. M. Burrows, M. Abadi and R. Needham, “A logic for authentication,” DECSystems Research Center Technical Report 39, February 1990. Earlier versionsin Proceedings of the Second Conference on Theoretical Aspects of Reasoningabout Knowledge, 1988, and Proceedings of the Twelfth ACMSymposium onOperating Systems Principles, 1989.