Please use this identifier to cite or link to this item:
|Title||Secure key Agreement for LAN Based on Multi-level Encryption Over GSM|
|Title in Arabic||الية توافق على مفتاح التشفير للشبكات المحلية ( lan ) على شبكات الهواتف الخلوية ( gsm ) باستخدام التشفير متعدد المراحل|
Encryption key transferring over a communication network is unsafe method, in the way it breaches the safety criteria once the key is discovered, this breaching conflicts with CIA triangle, specifically with confidentiality concept, where the data is already known by unauthorized party. Available encryption techniques might be one of the solutions which are offered to overcome the confidentiality concept of CIA triangle. However, the key transfer should be safe, and deny unauthorized parties to get the transferred key, except the parties that are authorized in the secured communication process. Securing the key data implemented with VPN, third part or key agreement before establish connection. Our research is based on transferring the key over a network which will not be used for the communication process. The main idea is to generate two secret keys, the first is used as a secret key to encrypt the second key in multi-level encryption process, the encrypted second key will be sent over GSM network. The second key will be decrypted then used as a secret key for the text transferring over LAN. The first key will be generated using Diffie-Helman algorithm. This key will be used as a secret key for encrypt the second key over multi-level encryption process, which is implemented by passing the first key as secret key and encrypting the second key in a predefined order of algorithms where is the start index related to the connection request time stamp, the resulted key will be sent over GSM. We have selected five encryption algorithms in the same order in the system. The selection of the first algorithm to start the multi-level encryption process is based on the connection time stamp. We have developed a pilot simulation for the solution, and got many improvements for the new solution which is summarized in: 1. reducing the required time of connection, instead of waiting for IO for knocking time and SMS sending receiving time we minimize the knocking for one request and the SMS for one time waiting .2. Financial connection establishment cost by decreasing 50%. Increasing the complexity of guessing the key and the algorithm to decrypt the sniffed data. In addition, controlling the key length by the algorithm settings.
|Publisher||الجامعة الإسلامية - غزة|
|Files in this item|