International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-2, July 2019 412 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Retrieval Number: B1503078219/19©BEIESP DOI: 10.35940/ijrte.B1503.078219 Abstract: Cryptography as a stream is very important for communication security. Cryptography provides many goals for communication security and authentication is one of them. Routing is an integral part of computer networks and router security is extremely important because routing provides suitable path to the traffic generated in the network. Authentication is very important for routing protocols. In this paper we discuss security flaws in routing authentication and provide a unique solution which is never presented to overcome this problem. We also discuss the security analysis of the proposed method which proves that the proposed method is robust in various aspects. The proposed method provides many advantages and the method is so simple that anybody can use it. Index Terms: AES (Advance Encryption Standard), Dynamic Routing, Exterior Gateway Protocol (EGP), Hash Functions, Interior Gateway Protocol (IGP), MD 5 hash I. INTRODUCTION In the fast and modern world where data communication is a necessity of life, cryptography plays a key role by providing data communication security. Cryptography is a collection of algorithms, procedures and techniques required for communication security. Cryptanalysis is opposite to cryptography because it deals with breaking the codes by various means. Cryptography and cryptanalysis are jointly knows as cryptology. Cryptography provides data security through some objectives and they are known as cryptography goals as shown in figure 1 [1-2]. Confidentiality is the first goal which makes sure that only authorized receiver can access the data. Many encryption algorithms are there to provide confidentiality. Data integrity is second in the list and it is responsible for the prevention of any unauthorized alteration or modification of data. Hash functions are used to validate data integrity. Authentication is the third goal and we talk about it in detail in the later section of this paper. At the basic level, authentication is a service which makes sure that communication is in between legitimate entities. Passwords, thumb impression etc are used for it. Non repudiation is the fourth goal and it makes sure that a participating entity, in a communication process, can’t deny previously made commitments. Digital signatures are used for it. Revised Manuscript Received on July 06, 2019. Varun Shukla, Department of Electronics & Communication, PSIT, Kanpur, India. Atul Chaturvedi, Department of Mathematics, PSIT, Kanpur, India. Neelam Srivastava, Department of Electronics & Communication, REC, Kannauj, India. Figure 1. Showing cryptographic goals required for secure communication. For communication process, routing is the core part. Routing can be classified as static routing and dynamic routing [3]. In static routing, routers are configured by network administrator. Usually static routing is preferred for small networks requiring only two or three routers. One promising application of static routing is to define an exit point when no existing routers are left. It can also be used as a backup and the CPU overheads are very low. The drawback is that the administrator can do mistakes when numbers of routers are high. On the other side, in dynamic routing (also known as adaptive routing), as the name suggests, a router can transfer data to a route based on present conditions. Many protocols are there in this category and we will discuss them in a later section of this paper. A dynamically configured network adapts changes very quickly because each router declares their presence to the other routers present on the network. The rest of this paper organized as follows: In section 2, we talk about authentication and dynamic routing protocols in brief. In section 3, we discuss security flaws with some existing solutions. In section 4, we provide proposed solution. Section 5 is all about the security analysis of the proposed method. Section 6 takes care of the advantages of the proposed method. Paper ends with conclusion and future scope which is in section 7. II. AUTHENTICATION & DYNAMIC ROUTING PROTOCOLS In a peer to peer or in group communication, it is essential that participating entities must recognize each other via some specific procedure. Broadly, authentication can be classified in entity authentication and data origin authentication [1]. Authentication Aspects of Dynamic Routing Protocols: Associated Problem & Proposed Solution Varun Shukla, Atul Chaturvedi, Neelam Srivastava Cryptographic goals Confidentiality: Encryption algorithms Data integrity: Hash functions Authentication: Passwords Non repudiation: Digital signatures