A New Protocol Implementing Authentication Transformations for Multi-Located Parties

Free registration required

Executive Summary

This paper discusses a new protocol implementing authentication in a multi-located environment that avoids Man-In-the-Middle (MIM) attack, replay attack and provides privacy, integrity of a message for multi-located parties. The protocol uses the concept that each party is associated with a subsidiary agent. Classical cryptography uses either public-private key pair or single secret shared key for encryption and decryption of a message. In a communication between two nodes, there is always a chance of MIM attack. In the new encryption scheme for multi located parties by Kak, it is impossible for a localized eavesdropper to get control of the entire conversation since the points of entry and exit of data can be far apart physically.

  • Format: PDF
  • Size: 156.12 KB