Tuesday, July 10, 2018

Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained NetworkEnvironment

Elliptic Curve based Authenticated Session Key Establishment Protocol for High Security Applications in Constrained NetworkEnvironment
K R Chandrasekhara Pillai1 and M P Sebastian2
1Dept.of Computer Science and Engineering, N S S College of Engineering, India.
2Indian Institute of Management Kozhikode,Calicut - 673570, Kerala, India

ABSTRACT

The existing authenticated session key establishment protocols are either vulnerable to dictionary attack on identity privacy of a client or the methods adopted to resist this attack are found to be computationally inefficient. This paper proposes a new authenticated key establishment protocol which uses elliptic curve based DDH problem. The protocol provides identity privacy of the client in addition to the other security properties needed for a session key establishment protocol. In comparison with the existing protocols, the proposed protocol offers equivalent security with less parameters resulting in lower computational load, communication bandwidth cost, power consumption and memory requirement.

KEYWORDS

Elliptic Curve Cryptography, Authentication, Session Key Establishment, Network Security & Identity Privacy

No comments:

Post a Comment

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#computer #cloudsecurity #malware #firewall #bigdata #informationsecurity #cloudcomputing #dataprotection #networking #cloudstorage #cybercr...