Open Access   Article

Message And File Transfering Using Key Exchange Protocol Over Secure Network Communication

Reshmi Vijayan1 , reedivya R S2

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-06 , Page no. 1-5, Jul-2018


Online published on Jul 31, 2018

Copyright © Reshmi Vijayan, Sreedivya R S . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library


IEEE Style Citation: Reshmi Vijayan, Sreedivya R S, “Message And File Transfering Using Key Exchange Protocol Over Secure Network Communication”, International Journal of Computer Sciences and Engineering, Vol.06, Issue.06, pp.1-5, 2018.

MLA Style Citation: Reshmi Vijayan, Sreedivya R S "Message And File Transfering Using Key Exchange Protocol Over Secure Network Communication." International Journal of Computer Sciences and Engineering 06.06 (2018): 1-5.

APA Style Citation: Reshmi Vijayan, Sreedivya R S, (2018). Message And File Transfering Using Key Exchange Protocol Over Secure Network Communication. International Journal of Computer Sciences and Engineering, 06(06), 1-5.



Authenticated Key Exchange (AKE) protocol allows to communicated each other using a generate session key for suitable and secure communication. The server side will generate a session key after giving approval by the client profile. Clients can view other clients of same group who is online at the time. During the message or file transfer both encryption and decryption takes place automatically using RSA algorithm with a symmetric key. Finally the administrator can also monitoring what all take place in the client side by using remote sensing capability. File transfer take place between the user and client with more security. For the communication purpose here it is using intranet so that it can be easily find out the IP address of the server and client. The proposed system will be give more important to the file transferring, remote sensing. The other speciality of the proposed system is key freshness that takes place periodically. The proposed system will be more secure for file transferring over the network communication.

Key-Words / Index Term

Authenticated Key Exchange (AKE) protocol, Encryption and Decryption,IP address,Group chats,File Transferring, Cyber Monitorning system


[1]. C. Fan, Y. Chan, and Z. Zhang, ”Robust remote authentication scheme withsmart cards,” Comput. Secur., vol. 24, no. 8, pp. 619- 628, Nov. 2005
[2].M. L. Das, A. Saxena, and V. P. Gulati, ”A dynamic ID-based remote userauthentication scheme,” IEEE Trans. Consum. Electron., Vol. 50, no. 2, pp.629631, 2004.
[3].S. Chaudhry, M. S. Farash, H. Naqvi, S. Kumari, and M. K. Khan, ”An enhanced privacy preserving remote user authentication scheme with provablesecurity”, Security Comm. Networks, 8:3782-3795, 2015
[4]. S. Chaudhry, H. Naqvi, K. Mahmood, H. F. Ahmad, and M. K. Khan, ”An Improved Remote User Authentication Scheme Using Elliptic Curve Cryptography”, Wireless Pers. Commun., DOI10.1007/s11277-016-3745-3, 2016.
[5].S. Chaudhry, ”A secure biometric based multi-server authentication scheme for social multimedia networks”, Multimed Tools Appl., 75:12705-12725, 2016.
[6].A. Irshad, M. Sher, O. Nawaz, S.Chaudhry, I. Khan, and S. Kumari, ”A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme”, Multimed Tools Appl., DOI 10.1007/s11042-016-39211,2016.
[7].F. Wen, and X. Li, ”An improved dynamic ID-based remote user authenticationwith key agreement scheme,” Computers and Electrical Engineering, 38(2):381387, 2012
[8].W. Juang, S. Chen, and H. Liaw, ”Robust and efficient password authenticated key agreement using smart cards,” IEEE Trans. Ind. Electron., vol. 15 no. 6,pp. 2551- 2556, Jun. 2008
[9].G. Yang, D. S. Wong, H. Wang and X. Deng, ”Two-factor mutual authentication based on smart cards and passwords,” Journal of Computer and SystemSciences, 74(7): 1160-1172, 2008
[10].M. Khan, S. Kim, and K. Alghathbar, ”Cryptanalysis and security enhancement of a more efficient and secure dynamic ID- based remote user authentication scheme,” Computer Communications, 34:305-309, 2011.
[11].E.Bresson, O.Chevassut, and D.Pointcheval, “Provably Secure Authenticated Group Diffie- Hellman Key Exchange,” ACM Trans. Information and systems Security, Vol.10, no.3, pp.255- 264, Aug.2007.
[12].J.Katz and M.Yung, “Scalable Protocols for Authenticated Group Key Exchange,” J.Cryptology, Vol.20, pp.85-113, 2007.
[13].W.G.Tzeng. “A Secure Fault-Tolerant Conference Key Agreement Protocol,” IEEE Trans.Computer, Vol.51, no.4, pp.373-379,Apr.2002.
[14].Johannes A.Buchmann, Introduction to cryptography, second ed, Springer Verlog NY,LLC, 2005
[15].K.H.Huang,Y.F.Chung,H.H.Lee,F.Lai and T.S.Chen, “ A Conference Key Agreement Protocol with Fault-Tolerant Capability”, Computer Standard and Interfaces, Vol.31, pp.401-405, Jan 2009.
[16].G.R.Blakley, “Safeguarding Cryptographic Keys”, Proc Am. Federation of Information Processing Soc. (AFIPS’79) Nat’l ComputerConf.,Vol.48,pp.313317,1979.
[17].A.Shamir,” How to share a Secret “,Comm ACM, Vol.22, no.11,pp.612-613,197922
[18].Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen and LimingFang ”Provably Secure Dynamic ID-based Anonymous Two-factor Authenticated Key Exchange Protocol with Extended Security Model”, IEEE Transactions on Information Forensics and Security, DOI 10.1109/TIFS.2017