International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 215 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article | Computer Science & Engineering | India | Volume 9 Issue 3, March 2020


End-End Authentication and Cryptography based on Mobile Number and Mac Address

S Shunmuga Sundaram


Abstract: In this process, End-End Authentication is to be performed. It purely based on Mobile Numbers and MAC Addresses of both Sender and Receiver. It has 3 stages for Authentication, In initial stage, Init-Key is to be created using SMob, RMob, SMacA and RMacA. In stage 2, Key-Mat should be generated randomly as well as Dynamically. In stage 3, Auth-Key is to be created using Key-Mat. For encryption and decryption, to use Auth-Key. It will be very useful for sending messages in secure manner because of End-to-End authentication is to be performed.


Keywords: SMob Sender's Mobile Number, RMob Receiver's Mobile Number, SMacA Sender's MAC Address, RMacA Receiver's MAC Address, Init-Key Initial Key, Key-Mat Key Matrix, Auth-Key Authentication Key


Edition: Volume 9 Issue 3, March 2020,


Pages: 631 - 634


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

S Shunmuga Sundaram, "End-End Authentication and Cryptography based on Mobile Number and Mac Address", International Journal of Science and Research (IJSR), Volume 9 Issue 3, March 2020, pp. 631-634, https://www.ijsr.net/get_abstract.php?paper_id=ART20203991

Similar Articles with Keyword 'Senders'

Downloads: 107

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1360 - 1364

A Review on Security Challenges and Attacks in Wireless Sensor Networks

Paramjit Kour | Lal Chand Panwar

Share this Article

Downloads: 107

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2704 - 2706

Review: Securing Broker-Less Public/Subscribe Systems Using Identity-Based Encryption

Minakshi B. Shingan | Sanchika A. Bajpai

Share this Article
Top