Elliptic Curve Cryptography in Securing Networks by Mobile Authentication
نویسندگان
چکیده
منابع مشابه
Elliptic Curve Cryptography in Securing Networks by Mobile Authentication
This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices. It uses an Extended Password Key Exchange Protocols [2] and elliptic-curve-cryptosystem based trust delegation mechanism to generate a delegation pass code for mobile station authentication, and it can effectively defend all known attacks to mobile networks including the denial-of-service attac...
متن کاملElliptic Curve Cryptography for Securing Payment System
Mobile payment system has made it easy for people to do financial transaction. However, its security is still a concern. It needs to protect the data transferred between parties involved in the system. In this paper, we investigate the possibility use of elliptic curve cryptography to secure the data transferred in a payment system.
متن کاملElliptic Curve Cryptography Based Wireless Authentication Protocol
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower computational burden, lower communication bandwidth and storage requirements. However, Mangipudi et al showed that the protocol is vulnerable to the man-inthe-middle attack from the attacker within the system and proposed a...
متن کاملElliptic Curve Cryptography Coprocessor for Mobile Ad-Hoc Networks
This paper investigates the design of an Elliptic Curve Cryptography (ECC) co-processor in an embedded system. The goal of this work is to create a general purpose module to greatly augment a network node’s performance, thereby making it practical to implement secure ECC-based network protocols in potentially vulnerable ad-hoc networks. Specifically, the techniques presented here employ hybrid ...
متن کاملAchieving Authentication and Integrity using Elliptic Curve Cryptography Architecture
Communication security is one of the areas where research is highly required. The data used in communication is very sensitive and needs to be protected and made abstract from intruders of system. This research is all about securing the messages or data that is being communicated among two parties.The recent branch of Network security is Cryptography using Elliptic Curve Architectures which is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal on Cryptography and Information Security
سال: 2013
ISSN: 1839-8626
DOI: 10.5121/ijcis.2013.3304