ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Survey on AMUA Protocol Based On Cryptographic Algorithm

Journal: International Research Journal of Advanced Engineering and Science (IRJAES) (Vol.1, No. 4)

Publication Date:

Authors : ; ;

Page : 114-116

Keywords : Cryptography; AMUA protocol; authentication; multi-server architectures.;

Source : Downloadexternal Find it from : Google Scholarexternal


Cryptography is the principle and study of techniques for secure communication that is for providing data integrity, authentication, data confidentiality etc….More precisely cryptography is about building and inspecting protocols that provide secure communication between two users. The cryptographic algorithms can be broadly divided into two based on their keys. They are private key cryptographic algorithms which uses the similar secret key for encryption and decryption and public key cryptographic algorithms which uses different keys for encryption and decryption. The mobile devices become rapidly appearing everywhere and popular due to the expeditious advances in wireless communication technologies. Therefore authentication protocol is used between two entities for transfer of authenticated data. One such protocol is the AMUA (Anonymous Mobile User Authentication Protocol) that can provide security of various mobile applications. This paper presents a comprehensive survey of various AMUA protocols based on the cryptographic algorithms used.

Last modified: 2016-12-24 14:18:12