ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications using Applied Cryptography

Journal: GRD Journal for Engineering (Vol.3, No. 07)

Publication Date:

Authors : ; ; ; ;

Page : 62-66

Keywords : AKE; MFAKE Protocol; Cryptography;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Authenticated key exchange is one of the most important applications in applied cryptography, the user interacts with a server to set up a session key to pre-registered information, authentication factor, like password or biometrics of the user is stored. Single-factor AKE is widely used in practice. Higher security concerns call for MFAKE schemes, e.g. combining passwords, biometrics and device simultaneously. Casually designed schemes, security is even weakened in the sense that leakage of one authentication factor will defeat the whole MFAKE protocol. An inevitable by-product arises that the usability of the protocol often drops greatly. To summarize, the existing multi-factor protocols did not provide enough security and efficiency simultaneously. It proposes a very efficient MFAKE protocol. It defines the security model and gives the according to security analysis. It also implements our proposed method as textual, graphical, biometric and device password to access the user accounts. The theoretic comparisons and the experimental results show that this scheme achieves both security and usability operating conditions is demonstrated through simulation results using MATLAB/Simulink followed by an experimental validation. Citation: Azhagarasan. T, P. A. College of Engineering and Tech, Pollachi, India; Jeeva. V ,P. A. College of Engineering and Tech, Pollachi, India; Nareen Kumar. S ,P. A. College of Engineering and Tech, Pollachi, India; Anand N ,P. A. College of Engineering and Tech, Pollachi, India. "Multi-Factor Authenticated Key Exchange Scheme for Mobile Communications using Applied Cryptography." Global Research and Development Journal For Engineering : 62 - 66.

Last modified: 2018-05-22 03:14:03