End-End Authentication and Cryptography based on Mobile Number and Mac Address
Journal: International Journal of Science and Research (IJSR) (Vol.9, No. 3)Publication Date: 2020-03-05
Authors : S Shunmuga Sundaram;
Page : 631-634
Keywords : SMob : Sender's Mobile Number; RMob : Receiver's Mobile Number; SMacA : Sender's MAC Address;
Abstract
In this process, End-End Authentication is to be performed. It purely based on Mobile Numbers and MAC Addresses of both Sender and Receiver. It has 3 stages for Authentication, In initial stage, Init-Key is to be created using SMob, RMob, SMacA and RMacA. In stage 2, Key-Mat should be generated randomly as well as Dynamically. In stage 3, Auth-Key is to be created using Key-Mat. For encryption and decryption, to use Auth-Key. It will be very useful for sending messages in secure manner because of End-to-End authentication is to be performed.
Other Latest Articles
- Laser Diffraction Analysis Application on the Grain Size Analysis of Mati River Delta Sediments (Albania)
- FNAC and Histopathological Correlation of Benign Breast Lesions
- Indirect Sexism: Linguistic Representation of Women in Selected Egesa and Minto FM Call - In Shows
- The Sound of Om Theory
- Impact of MDA on Prevalence of Bancroftianfilariasis in 19 Villages of Hingnataluka of Nagpur District (Maharashtra)
Last modified: 2021-06-27 15:59:27