A Modified Otway-Rees Protocol to Overcome Triple MAB Vulnerability
Pranav Vyas

KDr. Pranav Vyas, Smt. Chandaben Mohanbhai Patel Institute of Computer Applications, Charotar University of Science and Technology, At & PO Changa, Ta. Petlad, Dist. Anand, Gujarat, India.
Manuscript received on April 20, 2020. | Revised Manuscript received on April 30, 2020. | Manuscript published on May 10, 2020. | PP: 496-500 | Volume-9 Issue-7, May 2020. | Retrieval Number: G5392059720/2020©BEIESP | DOI: 10.35940/ijitee.G5392.059720
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: With growth of internet and wireless networks all around the world, information security has taken a central stage to protect commercial and well as personal data. Key exchange algorithms play an important role in information security. In this paper we study the Otway-Rees protocol and its vulnerabilities and propose a modified Otway-Rees protocol to overcome them. We then evaluate performance of the protocol from various points of view such as execution time, encryption speed and power consumption by comparing the original and proposed protocols. We find that although the original protocol is faster, the difference in speed is not significant and the modified protocol protects against vulnerability resulting in the best choice between the two protocols. 
Keywords: Applied Cryptography, Key Exchange Protocol, Otway-Rees Protocol, Triple MAB Vulnerability.
Scope of the Article: Cryptography and Applied Mathematics