Mohammed Aijaz Ahmed

Work place: Department of Computer Science and Engineering, GITAM University, Vishakapatnam

E-mail: mohd_aijaz@yahoo.com

Website:

Research Interests: Computer Architecture and Organization, Information Security, Network Security, Data Structures and Algorithms, Mathematics of Computing, Discrete Mathematics, Mathematics

Biography

Md. Aijaz Ahmed received his B.E. Degree in Computer Science & Engineering from, M.B.E.S’ College of Engineering, Ambejogai, (M. S.), India in 2003; He has obtained M.E. in Computer Science & Engineering in 2007 from, M.G.M’s College of Engineering, S.R.T.M. University, Nanded,(M.S.), India. He is currently pursuing Ph.D. in Computer Science & Engineering from GITAM University Vishakapatnam, (A. P.), India. His area of interest includes Network Security and Cryptography, Discrete Mathematics, Automata.

Author Articles
Mutual Authentication and Session Key Establishment for Secure Communication using Generalized Digital Certificate

By Balaji V Durgawad Mohammed Aijaz Ahmed D. Rajya Lakshmi Sayed Abdul Sattar

DOI: https://doi.org/10.5815/ijcnis.2017.08.04, Pub. Date: 8 Aug. 2017

Public–key digital certificates are being used in public key infrastructure to provide authentication of the user’s public key. Public key digital certificates like X.509 are used to bind a public key to its user. This kind of certificates cannot be used for user authentication. Such use may lead to forgery of user’s identity. Lein et al proposed a authentication scheme based on Generalized Digital Certificates (GDC). A GDC consists of user’s public information like digital birth certificate, digital identity, etc. and the digital signature of trusted third party generated from that public information. The GDC based scheme provides user authentication and allows for session key establishment. The scheme is secure against forgery of user’s identity but it does not provide mutual authentication. The scheme proposed in this paper not only provides mutual authentication and session key but also it preserves the security strength of Lein et al’s GDC based scheme.

[...] Read more.
Other Articles