Downloads: 217 | Views: 330 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article | Computer Science & Engineering | India | Volume 9 Issue 3, March 2020 | Popularity: 6.3 / 10
End-End Authentication and Cryptography based on Mobile Number and Mac Address
S Shunmuga Sundaram
Abstract: In this process, End-End Authentication is to be performed. It purely based on Mobile Numbers and MAC Addresses of both Sender and Receiver. It has 3 stages for Authentication, In initial stage, Init-Key is to be created using SMob, RMob, SMacA and RMacA. In stage 2, Key-Mat should be generated randomly as well as Dynamically. In stage 3, Auth-Key is to be created using Key-Mat. For encryption and decryption, to use Auth-Key. It will be very useful for sending messages in secure manner because of End-to-End authentication is to be performed.
Keywords: SMob Sender's Mobile Number, RMob Receiver's Mobile Number, SMacA Sender's MAC Address, RMacA Receiver's MAC Address, Init-Key Initial Key, Key-Mat Key Matrix, Auth-Key Authentication Key
Edition: Volume 9 Issue 3, March 2020
Pages: 631 - 634
Make Sure to Disable the Pop-Up Blocker of Web Browser