A New Protocol Implementing Authentication Transformations for Multi-Located Parties

This paper discusses a new protocol implementing authentication in a multi-located environment that avoids Man-In-the-Middle (MIM) attack, replay attack and provides privacy, integrity of a message for multi-located parties. The protocol uses the concept that each party is associated with a subsidiary agent. Classical cryptography uses either public-private key pair or single secret shared key for encryption and decryption of a message. In a communication between two nodes, there is always a chance of MIM attack. In the new encryption scheme for multi located parties by Kak, it is impossible for a localized eavesdropper to get control of the entire conversation since the points of entry and exit of data can be far apart physically.

Provided by: Oklahoma State University Topic: Security Date Added: Feb 2011 Format: PDF

Find By Topic