Academic Journals Database
Disseminating quality controlled scientific knowledge

An Innovative Kind Of Security Protocol Using Fusion Encryption In Virtual Private Networking

Author(s): M.Sreedevi | R. Seshadri

Journal: International Journal of Distributed and Parallel Systems
ISSN 2229-3957

Volume: 3;
Issue: 1;
Start page: 195;
Date: 2012;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Wireless communication | security | authentication | Tunnel

As a business grows, it might expand to multiple branches across the country and around the world. To maintain things running ably, the people functioning in those locations require fast, secure and consistent way to share information across computer networks. In addition, mobile employees like salespeople require evenly secure and reliable approach to connect to their business's computer network from remote locations. One popular technology to accomplish these goals is a virtual private network. A VPNis a private network that uses a public network usually the Internet to connect remote sites or users together. It enables us to transmit the data between two computers across a shared or public network in a manner that follows the properties of a private link. The basic requirements for VPN are User Authentication, Address Management, Data Compression, Data Encryption and Key Management. The private links are launched in VPN using Point-to-Point Tunneling Protocol (PPTP) and Layer-TwoTunneling Protocol (L2TP). These protocols satisfy VPN requirements in five layers. In user authentication layer, several trusted authorities using Extensible Authentication Protocol (EAP) do the authentication process. In fourth layer the data encryption part using RC4 called Microsoft-Point-toPoint Encryption (MPPE) scheme. The aim of this paper, instead of multiple trusted authorities we focus single trusted authority using public key cryptography RSA in EAP and also we include AES stream cipher algorithm instead of RC4 for MPPE. We propose new type of fusion encryption technique using AES for encryption and decryption and RSA used for key management.

Tango Rapperswil
Tango Rapperswil

     Save time & money - Smart Internet Solutions