Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register. Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of INFLIBNET IR
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register. Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Shantharajah, S P"

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    Item
    Mutual Authentication Protocol For Safer Communication
    (INFLIBNET Centre, 2005-02-02) Shantharajah, S P; Duraiswamy, K
    With a network communication requires cryptography authentication for secure transmission. This paper takes two challenge-response protocols by which entities may authenticate their identities to one another in a mutual communication way. Here the two entities, each holding a share of a decryption exponent, collaborate to compute a signature under the corresponding public key. These may be used during session initiation, and at any other time that entity authentication is necessary. The authentication of an entity depends on the verification of the claimant’s binding with its key pair and the verification of the claimant’s digital signature on the random number challenge. The network defined mutually authenticated protocols are for entity authentication based on public key cryptography, which uses digital signatures and random number challenges. Authentication based on public key cryptography has an advantage over many other authentication schemes because no secret information has to be shared by the entities involved in the exchange. This paper analyzes the protocols, which minimizes cost, very simple and suggests security for mutually signing the signature schemes and provides proofs of security for the safer communication. This paper specifies the way of mutual communication and the method of processing that conversation between entities.

DSpace software copyright © 2002-2025 LYRASIS

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback