An Asymmetric Authentication Protocol for Mobile Hand held Devices using ECC over Point Multiplication Method

A study conducted in [9] observes that this paper investigates the fast developing cryptography researchers and to increase the security development in the field of information security. ECC works with smaller keys to provide high security, high speed in a low bandwidth environment. The security level which is given by RSA, can be provided by ECC using smaller keys. In [10], ECC is a promising system for the next generation public key cryptosystem. Although ECC’s security has not been completely evaluated, it is expected to come into widespread use in various fields because of its compactness and high performance when it is hardware-implemented. ECC has been proven to involve

[1]  Chi-Chun Lo,et al.  Secure communication mechanisms for GSM networks , 1999, IEEE Trans. Consumer Electron..

[2]  M. Rahnema,et al.  Overview of the GSM system and protocol architecture , 1993, IEEE Communications Magazine.

[3]  R. Badlishah Ahmad,et al.  Performance Analysis of Encryption Algorithms' Text Length Size on Web Browsers , 2008 .

[4]  1 Elliptic Curve Cryptography 3 . 1 Elliptic Curve Cryptography , 2014 .

[5]  Hung-Yu Lin Security and authentication in PCS , 1999 .

[6]  Tzonelih Hwang,et al.  Private Authentication Techniques for the Global Mobility Network , 2005, Wirel. Pers. Commun..

[7]  Dapeng Wu,et al.  An Efficient Mobile Authentication Scheme for Wireless Networks , 2008, IEEE Transactions on Wireless Communications.

[8]  Lein Harn,et al.  Authentication protocols with nonrepudiation services in personal communication systems , 1999, IEEE Communications Letters.

[9]  Kiyomichi Araki,et al.  Overview of Elliptic Curve Cryptography , 1998, Public Key Cryptography.

[10]  S. Prasanna Ganesan An Authentication Protocol For Mobile Devices Using Hyperelliptic Curve Cryptography , 2010 .

[11]  Wei-Bin Lee,et al.  A new delegation-based authentication protocol for use in portable communication systems , 2005, IEEE Transactions on Wireless Communications.

[12]  M.Y. Javed,et al.  A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.

[13]  Marisa W. Paryasto,et al.  Issues in Elliptic Curve Cryptography Implementation , 2009 .

[14]  Yacov Yacobi,et al.  Privacy and Authentication on a Portable Communications System , 1993, IEEE J. Sel. Areas Commun..

[15]  Tzonelih Hwang,et al.  Enhanced delegation-based authentication protocol for PCSs , 2009, IEEE Transactions on Wireless Communications.