International Journal of Computer Science and Network
In this paper the authors implemented new methods of public keys exchange in the existing mutual authentication and key agreement protocol in wireless communication. The existing mutual authentication and key agreement protocol in wireless communications has been studied and the break points have been observed. They used \"CS attack\" to crypt-analyze the user's public key and obtain the private key. They overcame this break point by implementing DES encrypting algorithm along with NTRU encryption algorithm to improve the security.