Journal Press India®

Enhancement in TLS Authentication with RIPEMD-160

Vol 2 , Issue 2 , April - June 2014 | Pages: 14-20 | Research Paper  

https://doi.org/10.51976/ijari.221403

| | |


Author Details ( * ) denotes Corresponding author

1. * Mian Ahmad Zeb, Department of Computer Science Engineering, Pukyong National University Daeyon Campus, Busan, Korean (mianahmadzeb@hotmail.com)

This paper describes one of the security feature authentication. The main goal of this research is to achieve authentication to identify legal user and minimize the chance of attacks. Internet is open to every body to access and share information on it. Unfortunately, the intruders are also there, to examine a web application and its infrastructure to develop his own design, find the potential weaknesses, and use these weaknesses to break or exploit the application for information steeling. There are different kinds of protocol and methods used for security but still threats to the information on internet. Through authentication process, we can control up to some extend the illegal usage of application. We proposed algorithm for authentication that is RIPEMD -160. RIPEMD-160 will capture overall secure authentication.

Keywords

Transport Layer Security; Threats; Authentication; RIPEMD-160


  1. Common Security Threats http://technet.microsoft.com/en-us/library/bb964031 (loband).aspx

  2. The Bank of New York Mellon “Transport Layer Security” Data Classification August 4, 2008

  3. How to Enable TLS Within Out of Band Management http://www.symantec.com/connect/articles/how-enable-tls-within-out-band-management-70-after-install

  4. Apache 2 with SSL/TLS: Step-by-Step, Part 3 http://www.securityfocus.com/infocus/1823

  5. Confidentiality Using Authentication http://www.acm.org/crossroads/xrds5-2/confide.html

  6. Authentication vs. Authorization http://www.duke.edu/~rob/kerberos/authvauth.html

  7. Kleptography http://en.wikipedia.org/wiki/Kleptography

  8. Marc Stevens “Fast Collision Attack on MD5” Dept of Mathematics and Comp Sc, Eindhoven University of Technology. Netherlands.

  9. Matthew Gast “Security:Which Layer?” Wireless LAN Security Interoperability Lab Page

  10. A. Jalal, Mian Ahmad Zeb “Security Enhancement for E-Learning Portal” CUSIT Peshawar, Pak. IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.3, March 2008

  11. William Stallings Book “Cryptography and Network Security”.

  12. Praveen Gauravaram and Adrian McCullagh and Ed Dawson “Attacks on MD5 and SHA-1: Is this the “Sword of Damocles” for Electronic Commerce” March 15, 2006

  13. RFC 2857

Abstract Views: 1
PDF Views: 112

Advanced Search

News/Events

Indira School of Bus...

Indira School of Mangement Studies PGDM, Pune Organizing Internatio...

Indira Institute of ...

Indira Institute of Management, Pune Organizing International Confe...

D. Y. Patil Internat...

D. Y. Patil International University, Akurdi-Pune Organizing Nation...

ISBM College of Engi...

ISBM College of Engineering, Pune Organizing International Conferen...

Periyar Maniammai In...

Department of Commerce Periyar Maniammai Institute of Science &...

Institute of Managem...

Vivekanand Education Society's Institute of Management Studies ...

Institute of Managem...

Deccan Education Society Institute of Management Development and Re...

S.B. Patil Institute...

Pimpri Chinchwad Education Trust's S.B. Patil Institute of Mana...

D. Y. Patil IMCAM, A...

D. Y. Patil Institute of Master of Computer Applications & Managem...

Vignana Jyothi Insti...

Vignana Jyothi Institute of Management International Conference on ...

By continuing to use this website, you consent to the use of cookies in accordance with our Cookie Policy.