Downloading: End-End Authentication and Cryptography based on Mobile Number and Mac Address
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064


Amazon Sale


To prevent Server Overload, Your Article PDF will be Downloaded in Next Seconds

End-End Authentication and Cryptography based on Mobile Number and Mac Address

S Shunmuga Sundaram

Abstract: In this process, End-End Authentication is to be performed. It purely based on Mobile Numbers and MAC Addresses of both Sender and Receiver. It has 3 stages for Authentication, In initial stage, Init-Key is to be created using SMob, RMob, SMacA and RMacA. In stage 2, Key-Mat should be generated randomly as well as Dynamically. In stage 3, Auth-Key is to be created using Key-Mat. For encryption and decryption, to use Auth-Key. It will be very useful for sending messages in secure manner because of End-to-End authentication is to be performed.

Keywords: SMob : Sender's Mobile Number, RMob : Receiver's Mobile Number, SMacA : Sender's MAC Address, RMacA : Receiver's MAC Address, Init-Key : Initial Key, Key-Mat : Key Matrix, Auth-Key : Authentication Key


Amazon Sale


Top