SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS

The number of security attacks against network is increasing dramatically with time. To protect the model against these attacks; techniques like passwords, cryptography, and biometrics are used. Even multiple passwords are not preferred due to low entropies. The biometric is a very costly technique;...

Full description

Bibliographic Details
Main Authors: M. L. SINGH, AJAY KAKKAR, P. K. BANSAL
Format: Article
Language:English
Published: Taylor's University 2012-08-01
Series:Journal of Engineering Science and Technology
Subjects:
Online Access:http://jestec.taylors.edu.my/Vol%207%20Issue%204%20August%2012/Vol_7_4_505-516_AJAY%20KAKKAR.pdf
Description
Summary:The number of security attacks against network is increasing dramatically with time. To protect the model against these attacks; techniques like passwords, cryptography, and biometrics are used. Even multiple passwords are not preferred due to low entropies. The biometric is a very costly technique; moreover they may produce harmful effects to the body. Cryptography is used to avoid unauthorized access of data. It includes quite simple encryption algorithm and keys generated from the data. This paper deals with the parameters such as number of users, failure rate of various keys, recovery mechanism, encryption, transmission, decryption and latency time, etc; required for secure transmission of data. The proposed algorithm shows that all the stages are mutually independent from each other. It also provides the facility to use compression and re-encryption techniques.
ISSN:1823-4690