An Innovative Kind of Security Protocol Using Fusion Encryption in Virtual Private Networking

نویسنده

  • R. Seshadri
چکیده

As a business grows, it might expand to multiple branches across the country and around the world. To maintain things running ably, the people functioning in those locations require fast, secure and consistent way to share information across computer networks. In addition, mobile employees like sales people require evenly secure and reliable approach to connect to their business's computer network from remote locations. One popular technology to accomplish these goals is a virtual private network. A VPN is a private network that uses a public network usually the Internet to connect remote sites or users together. It enables us to transmit the data between two computers across a shared or public network in a manner that follows the properties of a private link. The basic requirements for VPN are User Authentication, Address Management, Data Compression, Data Encryption and Key Management. The private links are launched in VPN using Point-to-Point Tunneling Protocol (PPTP) and Layer-TwoTunneling Protocol (L2TP). These protocols satisfy VPN requirements in five layers. In user authentication layer, several trusted authorities using Extensible Authentication Protocol (EAP) do the authentication process. In fourth layer the data encryption part using RC4 called Microsoft-Point-toPoint Encryption (MPPE) scheme. The aim of this paper, instead of multiple trusted authorities we focus single trusted authority using public key cryptography RSA in EAP and also we include AES stream cipher algorithm instead of RC4 for MPPE. We propose new type of fusion encryption technique using AES for encryption and decryption and RSA used for key management.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RSPAE: RFID Search Protocol based on Authenticated Encryption

Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use an encryption technique that is referred to as authenticated encryption in order to boost the ...

متن کامل

Applying SoftEther for Networking Education

This paper presents the use of SoftEther in supporting networking education. SoftEther is a tool to create a tunnel-based Virtual Private Network (VPN). Unlike Layer 2 tunneling protocol (L2TP) or Point to Point Tunneling Protocol (PPTP), SoftEther uses an upper layer protocol (Secured Socket Layer) to emulate a lower layer interface (Ethernet). This scheme is more flexible and easier to config...

متن کامل

Proposing an effective approach for Network security and multimedia documents classically using encryption and watermarking

Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012