Loading

Cryptographic Key Exchange Authentication using Two Servers PAKE
G.K. Karthika1, Raju Dara2, Yamini Devi. N3
1Ms. G.K. Karthika, Assistant Professor, Department of Information Technology, Vignana Bharathi Institute of Technology, Hyderabad (Telangana), India.
2Dr. Raju Dara, Professor, Department of Computer Science & Engineering, Vignana Bharathi Institute of Technology, Hyderabad (Telangana), India.
3Ms. Yamini Devi N, Department of Computer Science & Engineering, Vignana Bharathi Institute of Technology, Hyderabad (Telangana), India.
Manuscript received on 16 August 2019 | Revised Manuscript received on 28 August 2019 | Manuscript Published on 06 September 2019 | PP: 650-653 | Volume-8 Issue- 6S, August 2019 | Retrieval Number: F11290886S19/19©BEIESP | DOI: 10.35940/ijeat.F1129.0886S19
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The key trade procedure is well thought-out significant fractions of cryptographic method towards defend protected end-to-end communications. All existing techniques need two servers to be active to authenticate but this technique can authenticate even one server is up and other server is down due to attack as active server authenticate user by taking his parts. In this paper, design an idea Password-authenticated key exchange (PAKE) method to verify clients by utilizing two servers, first client secret phrase will be splitted into two sections and afterward mystery key will be produced for each part and after that by utilizing key and splitted secret phrase will be encoded utilizing Elgamal Encryption. Each encoded part and key will be send to every server. Every server will have its very own key and in the event that aggressor traded off one server, at that point he won’t ready to login till he got client information of second server, by utilizing this strategy no assailant can bargain the two servers.
Keywords: Cryptography, El Gamal Encryption, Password Authenticated Key Exchange (PAKE.
Scope of the Article: Authentication, Authorization, Accounting