Generation of Variable Session Keys Based on Piggybacking Strategy

Since the dawn of computer networks, protecting information from unauthorized users becomes like a battle field for the researchers and the attackers. Whenever any new solutions have been designed by the researchers to achieve the confidentiality and integrity towards the shared information, a new problem is always arisen by the attackers who are always ready to find out the loopholes. One of the solutions is to achieve and make difficult for the attacker by changing the keys frequently during the message transmission. In this regard, Automatic Variable Key (AVK) is an alternative approach to fulfill the requirements of such key variations. Therefore, in this article we have analyzed such approaches and given the contributions by proposing a new method to generate the keys which can enhance the security issues by increasing the randomness among the set of auto generated keys.

[1]  Whitfield Diffie,et al.  Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.

[2]  Abdus Salam APPLICATION OF AVK AND SELECTIVE ENCRYPTION IN IMPROVING PERFORMANCE OF QUANTUM CRYPTOGRAPHY AND NETWORKS , 2006 .

[3]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[4]  Subhasish Banerjee,et al.  Two New Schemes to Generate Automatic Variable Key (AVK) to achieve the Perfect Security in Insecure Communication Channel , 2015, ICARCSET '15.

[5]  Hans Eberle,et al.  A High-Speed DES Implementation for Network Applications , 1992, CRYPTO.

[6]  Chandan Tilak Bhunia,et al.  New Approach towards Generation of Automatic Variable Key to Achieve Perfect Security , 2013, 2013 10th International Conference on Information Technology: New Generations.

[7]  P. Chakrabarti,et al.  A novel approach towards realizing optimum data transfer and Automatic Variable Key(AVK) in cryptography , 2008 .

[8]  Subhasish Banerjee,et al.  An Improved Biometric-based Multi-server Authentication Scheme Using Smart Card , 2015 .

[9]  Chandan Tilak Bhunia,et al.  Various New Methods of Implementing AVK , 2013 .

[10]  Chandan Tilak Bhunia,et al.  New Techniques for Generating of Automatic Variable Key in Achieving Perfect Security , 2014 .

[11]  Min-Shiang Hwang,et al.  A new strong-password authentication scheme using one-way hash functions , 2006 .

[12]  Subhasish Banerjee,et al.  Cryptanalysis and Security Enhancement of an Efficient and Secure Dynamic ID Based Remote User Authentication Scheme for Multi-Server Environments , 2015, ICARCSET '15.

[13]  Subhasish Banerjee,et al.  Generation of Automatic Variable Key to Make Secure Communication , 2016 .

[14]  Subhasish Banerjee,et al.  A Novel Approach to Achieve the Perfect Security through AVK over Insecure Communication Channel , 2017 .

[15]  Min-Shiang Hwang,et al.  A new remote user authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..

[16]  Chandan Tilak Bhunia,et al.  Generation of Automatic Variable Key under Various Approaches in Cryptography System , 2013 .

[17]  Eli Biham,et al.  A Fast New DES Implementation in Software , 1997, FSE.