Abstract
Today wireless communications is acting as a major role in networks. Through year-end 2006, the employee's ability to install unmanaged access points will result is more than 50% of enterprises exposing sensitive information through the wireless virtual private networks (VPN). It enables you to send the data between two computers across a shared or public network in a manner that emulates the properties of a private link. The basic requirements for VPN are User Authentication, Address Management, Data Compression, Data Encryption and Key Management. The private links are established in VPN using Point-to-Point Tunneling Protocol (PPTP) and Layer-Two-Tunneling Protocol (L2TP). These protocols are satisfies VPN requirements in five layers. In user authentication layer, multiple trusted authorities using Extensible Authentication Protocol (EAP) do the authentication process. In fourth layer the data encryption part using RC4 called Microsoft-Point-to-Point Encryption (MPPE) method. The aim of this paper, instead of multiple trusted authorities we focus single trusted authority using public key cryptography RSA in EAP and also we include AES-Rijndael stream cipher algorithm instead of RC4 for MPPE. We propose new type of hybrid encryption technique using AES-Rijndael for encryption and decryption and RSA used for key management.
Highlights
Over recent years, the market for wireless communications has enjoyed tremendous growth
The security of the communication is mainly based on the cryptographic algorithms
The portion of the connection in which the data is encapsulated is known as the tunnel and some portion of the connection is encrypted this data known as virtual private networks (VPN) connection
Summary
The market for wireless communications has enjoyed tremendous growth. The algorithms like MARS, RC6, Rijndael, Serpent, fourth stage "AddRoundKey" transformation adds the Twofish for encryption and decryption performance, round key with the block of data. The Rijndael proposal for AES defined a cipher in encryption and decryption and platform-dependent which the block length and the key length can be performance for key setup. Encryption and decryption are of the following form, for some plaintext block M and ciphertext block C: C = Me mod n M = Cd mod n = (Me)d mod n = Med mod n Both sender and receiver must know the value of n. A key of length says, 128 bits are chosen This is used to encrypt the plain text using AESRijndael steam cipher algorithm. This protocol to reduce the user authentication and data encryption layers into a single protocol layer
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.