期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2019
卷号:7
期号:4
页码:2457-2463
DOI:10.15680/IJIRCCE.2019. 0704039
出版社:S&S Publications
摘要:An authentication method that is used in IPv6 network to authenticate the address proof of the owner is
CGA (Cryptographically Generated Address). The identification of address of the owner is authenticated by RSA
public key that is of variable length.Secure hash algorithms (SHA-1) have been used in this literature to provide
security. In this algorithm an output of 160 bits is generated. Among these 160 bits’ certain number of bits from the
left-hand side has been selected as per our requirement in the Hash-1 and Hash-2 extension. The interface identifier part
of a particular address is changed after a certain time using the method of CGA and brand-new address will be
generated from the interface of the identifier.To use the method of CGA the node which is on sender’s side would have
to choose the parameter of security SEC.Input will be 128-bit modifier, RSA public key which is not of fixed length
i.e.; 64-bit subnet prefix and 8-bit impact result for the uniqueness of the location that is created. For providing the
security we used Secure Hash Algorithm-1 (output is 160 bits). We have also used the security parameter (3 bit), which
states the security level of CGA against the Brute force attack. The output of the Time Based CGA is secure in IPv6
address using CGA including the Hash 1, modifier identification and Interface identification.We introduced a handy
and programmed path to opt parameter of security related to CGA calculation. . Thus, factors determining the time
taken by CGA Algorithm is crucial to evaluate t. The Factors include Sec value, Hash function. RSA must be restored
by a public key cryptosystem that provides parallel cryptographic strength but has a faster key generation, shorter key
length and less expensive signature generation and verification. When it is attained, CGA-based Authentication can be
computationally realizable for mobile environment.
关键词:CGA algorithm; Time Based;Cryptographically Generated Address; SHA; Interfaceidentifier(IID);