International Journal of Electrical and Computer Engineering (IJECE) Vol. 6, No. 4, August 2016, pp. 1785~1791 ISSN: 2088-8708, DOI: 10.11591/ijece.v6i4.9674 1785 Journal homepage: http://iaesjournal.com/online/index.php/IJECE Two Way Mechanism to Enhance Confidentiality and Accuracy of Shared Information Manash Pratim Dutta, Subhasish Banerjee, Swarnendu Kumar Chakraborty, Chandan Tilak Bhunia Department of Computer Science & Engineering, National Institute of Technology, Arunachal Pradesh, India Article Info ABSTRACT Article history: Received Dec 9, 2015 Revised Feb 18, 2016 Accepted Mar 2, 2016 As such internet and information technology have influenced the human life significantly thus the current technology cannot solely assure the security of shared information. Hence, to fulfil such requirements mass amount of research have been undertaken by various researchers among which one of the mechanisms is the use of dynamic key rather than static one. In this regard, we have proposed a method of key generation to provide the dynamic keys. The scheme not only can change the key but also provide the error control mechanism. At the end of this paper, a comparison with the existing techniques has also been made to prove the efficiency of the proposed scheme. Keyword: Dynamic key Error control Randomness Security Copyright © 2016 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Manash Pratim Dutta, Department of Computer Science & Engineering, National Institute of Technology, Arunachal Pradesh, Yupia, India 791110. Email: manashpdutta@gmail.com 1. INTRODUCTION With the rapid development of computer networks and micro electromechanical devices (smart phone, pad etc.), it becomes feasible to access the different services from different service provider servers at anytime and anywhere in the world within a fraction of second. Due to the large number of users, accessing the services at a time, it creates a huge traffic and load overhead in the communication networks. As a result, the chances of noises are growing exponentially. This may occur due to load overhead or interference by the unwanted users. Therefore, to improve the throughput and security of the shared information, mass amount of research in the field of advanced error control [1],[2] and security in shared information have been undertaken by many researchers. In 1981, Lamport [3] proposed first conventional authentication system to verify the legitimacy among the users in which the remote server maintained a password table. However, due to the system overhead, smart cards based authentication schemes [4]-[6] have been widely adopted. In addition, since the number of service provider servers for users are usually more than one, remote user authentication schemes used for multi-server architecture rather than single server circumstance is considered [7],[8]. To improve the security to next higher level, a biometric based recognization has also been incorporated as another parameter of authentication [9],[10]. But, main common factor in all those mechanisms is key must be secured enough. Meanwhile, assuring such necessity is not feasible any more with the same key; does not matter how long it is. Hence, one of the solutions is why not making the keys dynamic in nature those change in every fraction of time. But, to provide such option, either both the parties must have to agree upon a bunch of keys or they must have to share a new key by encrypting with the previous one. However, in first case, the cost of negotiating such bunch of keys and protecting the same will be too high similarly in the other case, if any one of the keys is compromised then the entire rest of the keys