Abstract

Today wireless communications is acting as a major role in networks. Through year-end 2006, the employee's ability to install unmanaged access points will result is more than 50% of enterprises exposing sensitive information through the wireless virtual private networks (VPN). It enables you to send the data between two computers across a shared or public network in a manner that emulates the properties of a private link. The basic requirements for VPN are User Authentication, Address Management, Data Compression, Data Encryption and Key Management. The private links are established in VPN using Point-to-Point Tunneling Protocol (PPTP) and Layer-Two-Tunneling Protocol (L2TP). These protocols are satisfies VPN requirements in five layers. In user authentication layer, multiple trusted authorities using Extensible Authentication Protocol (EAP) do the authentication process. In fourth layer the data encryption part using RC4 called Microsoft-Point-to-Point Encryption (MPPE) method. The aim of this paper, instead of multiple trusted authorities we focus single trusted authority using public key cryptography RSA in EAP and also we include AES-Rijndael stream cipher algorithm instead of RC4 for MPPE. We propose new type of hybrid encryption technique using AES-Rijndael for encryption and decryption and RSA used for key management.

Highlights

  • Over recent years, the market for wireless communications has enjoyed tremendous growth

  • The security of the communication is mainly based on the cryptographic algorithms

  • The portion of the connection in which the data is encapsulated is known as the tunnel and some portion of the connection is encrypted this data known as virtual private networks (VPN) connection

Read more

Summary

INTRODUCTION

The market for wireless communications has enjoyed tremendous growth. The algorithms like MARS, RC6, Rijndael, Serpent, fourth stage "AddRoundKey" transformation adds the Twofish for encryption and decryption performance, round key with the block of data. The Rijndael proposal for AES defined a cipher in encryption and decryption and platform-dependent which the block length and the key length can be performance for key setup. Encryption and decryption are of the following form, for some plaintext block M and ciphertext block C: C = Me mod n M = Cd mod n = (Me)d mod n = Med mod n Both sender and receiver must know the value of n. A key of length says, 128 bits are chosen This is used to encrypt the plain text using AESRijndael steam cipher algorithm. This protocol to reduce the user authentication and data encryption layers into a single protocol layer

Findings
DISCUSSION
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.