SECURITY ANALYSIS OF VARIOUS HASH ALGORITHMS FOR AUTHENTICATION UNDER HARDWARE CONSTRAINED ENVIRONMENT
Journal: INTERNATIONAL JOURNAL OF ENGINEERING TECHNOLOGIES AND MANAGEMENT RESEARCH (Vol.7, No. 6)Publication Date: 2020-06-30
Authors : Rashid Husain; Rabia Khan; Rajesh Kumar Tyagi;
Page : 131-140
Keywords : Security Algorithms; Remote Keyless Entry System (RKES); Authentication Protocols; MAC; Hash Algorithms such as SHA; MD5;
Abstract
Protecting passwords is now a big challenge because users want to do all types of work online via user-friendly devices such as mobile, tablets etc. Now, It is difficult to implement the secure heavy weight algorithms such as AES, RSA etc. in hardware constrained devices. It has been observed that users want all types of security services in an online public environment. Authentication is the first and foremost step to enhance security. Various applications are available for real time authentications such as keyless car entry and opening home-doors through security algorithms under remote keyless entry System (RKES). Now, it is the demand of the time to implement the lightweight security algorithms without compromising the security. In order to fulfill this challenge, this paper proposed a strong model for enhancing authentication security. In this work, strong authentication techniques are implemented with the light weight algorithms. This model received good comparison results.
Other Latest Articles
- A NEW ERA OF MEDICAL BY ARTIFICIAL INTELLIGENCE
- A NOTE ON QUADRATIC RICCATI DIFFERENTIAL EQUATION USING PADÉ APPROXIMANT
- THE RESTORATION OF THE REFORMED CHURCH OF AITON 2018–2020 CASE STUDY, CONDITION SURVEY BY FACILITY CONDITION INDEX
- REMEDIATION ABILITY OF MELON GRASS IN A CRUDE OIL POLLUTED SOIL IN A TROPICAL REGION
- ANALYSIS OF POWER TRANSFORMATOR CONDITIONS USING DGA METHOD USING ARTIFICIAL NEURAL NETWORK IN KRAKATAU ELECTRICAL POWER COMPANY
Last modified: 2020-11-11 19:17:24