CFP last date
20 May 2024
Reseach Article

A Novel Methodology for Secure Communications and Prevention of Forgery Attacks

by M. V. Kishore, G. Pandit Samuel, N. Aditya Sundar, M. Enayath Ali, Y. Lalitha Varma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 96 - Number 22
Year of Publication: 2014
Authors: M. V. Kishore, G. Pandit Samuel, N. Aditya Sundar, M. Enayath Ali, Y. Lalitha Varma
10.5120/16924-6762

M. V. Kishore, G. Pandit Samuel, N. Aditya Sundar, M. Enayath Ali, Y. Lalitha Varma . A Novel Methodology for Secure Communications and Prevention of Forgery Attacks. International Journal of Computer Applications. 96, 22 ( June 2014), 5-12. DOI=10.5120/16924-6762

@article{ 10.5120/16924-6762,
author = { M. V. Kishore, G. Pandit Samuel, N. Aditya Sundar, M. Enayath Ali, Y. Lalitha Varma },
title = { A Novel Methodology for Secure Communications and Prevention of Forgery Attacks },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 96 },
number = { 22 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 5-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume96/number22/16924-6762/ },
doi = { 10.5120/16924-6762 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:22:26.720877+05:30
%A M. V. Kishore
%A G. Pandit Samuel
%A N. Aditya Sundar
%A M. Enayath Ali
%A Y. Lalitha Varma
%T A Novel Methodology for Secure Communications and Prevention of Forgery Attacks
%J International Journal of Computer Applications
%@ 0975-8887
%V 96
%N 22
%P 5-12
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today almost all organizations in the world are network-centric paradigm and to safeguard the data in a world where technology is advancing, systems are changing rapidly and information flows freely requires efficient secure channel at the endpoint. Security is the heart of IT revolution and more specifically user authentication and key establishment are the rudimentary services in secure communications. Though many systems, schemes bank on public key digital certificate user authentication and key establishment, failed in getting authenticated due to some forgery attacks. Public key Digital certificate though gained popularity in the public key infrastructure (PKI) in providing authentication to user public key, itself cannot be used to safeguard an authenticate user. In this paper, we propose a novel approach using GDC for user authentication and key establishment. A GDC is a kind of Digital Certificate which contains user's public information and Digital signature which is issued and signed by the trusted Certificate Authority. The advantage of GDC is that, unlike the public key Digital Certificate, it does not contain user's public key. So, the digital signature can never be revealed to the verifier and this is where a digital signature of GDC becomes a security factor that can be used for user authentication. Using this phenomenon, we have implemented a Discrete Logarithm Protocol which satisfies in achieving user authentication and secret key establishment. In addition to this, by using the shared-secret key, we have also exchanged the data between the entities through AES (Advanced Encryption Standard) Cryptographic algorithm.

References
  1. L. Harn and J. Ren, "Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications", IEEE trans. on Wireless Communications, vol. 10,pp. 2372-2379,2011.
  2. Bismin. V. Sherif and Andrews Jose, "Secure Communication using Generalized Digital Certificate", International Journal of Computer Applications Technology and Research, Volume 2-Issue 4,396-399,2013.
  3. Network Working Group, "Internet X. 509 Public key Infrastructure Certificate and crl profile, RFC:2459," Jan 1999.
  4. D. Chaum and H. van Antwerpen, "Undeniable Signatures," Advances in Cryptology-Crpyto'89, Lecture Notes in Computer Science, vol. 435, pp. 212-217, 1989.
  5. R. Rivest, A. Shamir, L. Adleman, "A method for obtaining Digital Signatures and Public-Key Cryptosystems," Commun. Assoc. Comp. Mach. , Vol. 21, no. 2, pp. 120-126, 1978.
  6. T. A. ElGamal, "A public-key cryptosystem and a signature scheme based on discrete logarithms," IEEE. Trans. Inf. Theory, vol. 30, no. 24,pp. 469-42, 1985.
  7. L. Harn and Y. Xu, "Design of generalized ElGamal type digital signature schemes based on discrete logarithm, "Electron. Lett. , vol. 30, no. 24. pp. 2025-2026, 1994.
  8. en. wikipedia. org/wiki/Discrete-logarithm
Index Terms

Computer Science
Information Sciences

Keywords

Generalized digital certificate user authentication key establishment shared-secret key forgery attacks data exchange(encryption and decryption).