A Survey on AMUA Protocol Based On Cryptographic Algorithm
Journal: International Research Journal of Advanced Engineering and Science (Vol.1, No. 4)Publication Date: 2016-10-09
Authors : Sumeena P S; Alpha Vijayan;
Page : 114-116
Keywords : Cryptography; AMUA protocol; authentication; multi-server architectures.;
Abstract
Cryptography is the principle and study of techniques for secure communication that is for providing data integrity, authentication, data confidentiality etc….More precisely cryptography is about building and inspecting protocols that provide secure communication between two users. The cryptographic algorithms can be broadly divided into two based on their keys. They are private key cryptographic algorithms which uses the similar secret key for encryption and decryption and public key cryptographic algorithms which uses different keys for encryption and decryption. The mobile devices become rapidly appearing everywhere and popular due to the expeditious advances in wireless communication technologies. Therefore authentication protocol is used between two entities for transfer of authenticated data. One such protocol is the AMUA (Anonymous Mobile User Authentication Protocol) that can provide security of various mobile applications. This paper presents a comprehensive survey of various AMUA protocols based on the cryptographic algorithms used.
Other Latest Articles
Last modified: 2016-12-24 14:18:12