TY - GEN
T1 - Enhanced authentication and key agreement mechanism using PKI
AU - Prakasha, Krishna
AU - Gowda, Pratheeksha
AU - Acharya, Vasundhara
AU - Muniyal, Balachandra
AU - Khandelwal, Mayank
PY - 2018/1/1
Y1 - 2018/1/1
N2 - Entity Authentication and Key Agreement (AKA), is a critical cryptographic problem in wireless communication, where a mutual entity authentication plays a vital role in the establishment of the secure and authentic connection. The paper proposes an efficient authenticated key agreement scheme and increases the speed of authentication process more securely. The signaling overhead is minimized by creating the validity token at home agent of mobile equipment, which indicates if the certificate of the foreign agent is valid or invalid. An efficient way for the implementation of an enhanced version of the protocol is proposed. NTRU algorithm is applied to encrypt and decrypt the messages. NTRU algorithm is one of the efficient asymmetric key lattice-based cryptographic algorithm. NTRU has been proved to be the fastest and secure encryption algorithm. AES is used for symmetric key encryption. The result demonstrates that the proposed method is efficient.
AB - Entity Authentication and Key Agreement (AKA), is a critical cryptographic problem in wireless communication, where a mutual entity authentication plays a vital role in the establishment of the secure and authentic connection. The paper proposes an efficient authenticated key agreement scheme and increases the speed of authentication process more securely. The signaling overhead is minimized by creating the validity token at home agent of mobile equipment, which indicates if the certificate of the foreign agent is valid or invalid. An efficient way for the implementation of an enhanced version of the protocol is proposed. NTRU algorithm is applied to encrypt and decrypt the messages. NTRU algorithm is one of the efficient asymmetric key lattice-based cryptographic algorithm. NTRU has been proved to be the fastest and secure encryption algorithm. AES is used for symmetric key encryption. The result demonstrates that the proposed method is efficient.
UR - http://www.scopus.com/inward/record.url?scp=85072851447&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85072851447&partnerID=8YFLogxK
U2 - 10.1007/978-981-13-2907-4_4
DO - 10.1007/978-981-13-2907-4_4
M3 - Conference contribution
AN - SCOPUS:85072851447
SN - 9789811329067
T3 - Communications in Computer and Information Science
SP - 40
EP - 51
BT - Applications and Techniques in Information Security - 9th International Conference, ATIS 2018, Proceedings
A2 - Chen, Qingfeng
A2 - Wu, Jia
A2 - Zhang, Shichao
A2 - Yuan, Changan
A2 - Batten, Lynn
A2 - Li, Gang
PB - Springer Verlag
T2 - 9th International Conference on Applications and Techniques in Information Security, ATIS 2018
Y2 - 9 November 2018 through 11 November 2018
ER -