We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

An Approach for SMS Security using Authentication Functions

Published on March 2012 by Neetesh Saxena, Narendra S. Chaudhari
Communication Security
Foundation of Computer Science USA
COMNETCS - Number 1
March 2012
Authors: Neetesh Saxena, Narendra S. Chaudhari
025931df-4732-4e2c-a281-97e0357f16aa

Neetesh Saxena, Narendra S. Chaudhari . An Approach for SMS Security using Authentication Functions. Communication Security. COMNETCS, 1 (March 2012), 6-8.

@article{
author = { Neetesh Saxena, Narendra S. Chaudhari },
title = { An Approach for SMS Security using Authentication Functions },
journal = { Communication Security },
issue_date = { March 2012 },
volume = { COMNETCS },
number = { 1 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 6-8 },
numpages = 3,
url = { /specialissues/comnetcs/number1/5474-1002/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Communication Security
%A Neetesh Saxena
%A Narendra S. Chaudhari
%T An Approach for SMS Security using Authentication Functions
%J Communication Security
%@ 0975-8887
%V COMNETCS
%N 1
%P 6-8
%D 2012
%I International Journal of Computer Applications
Abstract

Asymmetric algorithm like Diffie-Hellman can be used to encrypt the SMS message in M-commerce or mobile banking system. Password key exchange protocol based on Diffie-Hellman key exchange algorithm allows users to exchange a secret key that can be used in message encryption. The security of this protocol can be increased by using the MAC (message authentication code) or hash function with the encryption. These functions act as an error detecting code or checksum. This paper throws a light on the comparative analysis of both the authentication functions separately in password key exchange protocol. By analyzing some of the security issues viz. (i) brute force attach and (ii) cryptanalysis, it can be very well shown that the MAC function is more secure than hash

References
  1. Steven M. Bellovin, Michael Merritt “Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise” (1993).
  2. Xun Yi and Kwok Yan Lam “Hash function based on block cipher” IEE 1997 Electronics Letters Online No: I9971336.
  3. Luo Zhong Zhao Zhongining Zhu Chongguang “The Unfavourable Effects of Hash Coding on CMAC Convergence and Compensatory Measure” Instilutc of Rcmotc Scnsing Applications .CAS Dept Image Processing.P 0.Box 9718 Beijing china.
  4. H.E. Michail, A.P. Kakarountas, G. Selimis, C.E. Goutis “Throughput Optimization of the Cipher Message Authentication Code” VLSI Design Laboratory, Dpt. of Electrical & Computer Engineering, University of Patras, Greece.
  5. C.J. Mitchell “Truncation attacks on MACs” IEE 2003 Electronics Letters Online No: 20030921DOI: 10.1049/el: 20030921
Index Terms

Computer Science
Information Sciences

Keywords

GSM SMS security authentication function public key cryptography