International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 108 | Views: 288

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016 | Popularity: 6.1 / 10


     

Multi-Server Authentication and Key Exchange

Muzammil M. Ahmad


Abstract: Multi-server authentication and key exchange is where the multiple servers contribute in the authentication process of clients, and granting the access to authenticated clients. Present protocols used for authentication purpose keeps the authentication information or secrete codes of all clients on a single server, which is very insecure from the prospect of security. In this paper I have proposed a multi-server authentication and key exchange process where client communicate with the main server by means of intermediate servers, intermediate servers are very useful for checking or verifying authenticity of clients. This protocol is simple and secure against present two server password-only authenticated key exchange protocols.


Keywords: Authentication, key exchange, personification, identity theft


Edition: Volume 5 Issue 5, May 2016


Pages: 1701 - 1703



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Muzammil M. Ahmad, "Multi-Server Authentication and Key Exchange", International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 1701-1703, https://www.ijsr.net/getabstract.php?paperid=NOV163614



Similar Articles

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Informative Article, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 1497 - 1500

Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels

Arnab Dey

Share this Article

Downloads: 5 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, India, Volume 12 Issue 9, September 2023

Pages: 2067 - 2069

Application of Personification Thinking to Achieve Higher Software Quality

Ravikiran Mallappa

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1415 - 1419

A Survey on Three-Party Password-Based Authenticated Key Exchange (3-PAKE) Protocols

Shivani Bhatia, Rekha Saraswat

Share this Article

Downloads: 106

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2369 - 2372

Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms

Jaskarandeep Punia, Rajesh Kumar Bawa

Share this Article

Downloads: 106

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 1758 - 1764

Data Transfer Based on Between the Node Coverge Area Using Diffe-Hellman Key Algorithm in Adhoc Network

T. Sankar, M. Prakash

Share this Article



Top