首页    期刊浏览 2024年11月27日 星期三
登录注册

文章基本信息

  • 标题:Study and Development of TB-CGA Based Address Generation for IPv6
  • 本地全文:下载
  • 作者:Priyanka Singh Baghel ; Prof. Satpal Singh ; Prof. Sumit Nema
  • 期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
  • 印刷版ISSN:2320-9798
  • 电子版ISSN:2320-9801
  • 出版年度:2019
  • 卷号:7
  • 期号:4
  • 页码:2457-2463
  • DOI:10.15680/IJIRCCE.2019. 0704039
  • 出版社:S&S Publications
  • 摘要:An authentication method that is used in IPv6 network to authenticate the address proof of the owner is CGA (Cryptographically Generated Address). The identification of address of the owner is authenticated by RSA public key that is of variable length.Secure hash algorithms (SHA-1) have been used in this literature to provide security. In this algorithm an output of 160 bits is generated. Among these 160 bits’ certain number of bits from the left-hand side has been selected as per our requirement in the Hash-1 and Hash-2 extension. The interface identifier part of a particular address is changed after a certain time using the method of CGA and brand-new address will be generated from the interface of the identifier.To use the method of CGA the node which is on sender’s side would have to choose the parameter of security SEC.Input will be 128-bit modifier, RSA public key which is not of fixed length i.e.; 64-bit subnet prefix and 8-bit impact result for the uniqueness of the location that is created. For providing the security we used Secure Hash Algorithm-1 (output is 160 bits). We have also used the security parameter (3 bit), which states the security level of CGA against the Brute force attack. The output of the Time Based CGA is secure in IPv6 address using CGA including the Hash 1, modifier identification and Interface identification.We introduced a handy and programmed path to opt parameter of security related to CGA calculation. . Thus, factors determining the time taken by CGA Algorithm is crucial to evaluate t. The Factors include Sec value, Hash function. RSA must be restored by a public key cryptosystem that provides parallel cryptographic strength but has a faster key generation, shorter key length and less expensive signature generation and verification. When it is attained, CGA-based Authentication can be computationally realizable for mobile environment.
  • 关键词:CGA algorithm; Time Based;Cryptographically Generated Address; SHA; Interfaceidentifier(IID);
国家哲学社会科学文献中心版权所有