Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server based on Elliptic Curve Cryptography with the ElGamal's Algorithm

被引:0
作者
Chalkias, Konstantinos [1 ]
Filiadis, George [1 ]
Stephanides, George [1 ]
机构
[1] Univ Macedonia, Dept Appl Informat, GR-54006 Thessaloniki, Greece
来源
PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 7 | 2005年 / 7卷
关键词
Elliptic Curve Cryptography (ECC); ElGamal; authentication protocol;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In this paper the authors propose a protocol, which uses Elliptic Curve Cryptography (ECC) based on the ElGamal's algorithm, for sending small amounts of data via an authentication server. The innovation of this approach is that there is no need for a symmetric algorithm or a safe communication channel such as SSL. The reason that ECC has been chosen instead of RSA is that it provides a methodology for obtaining high-speed implementations of authentication protocols and encrypted mail techniques while using fewer bits for the keys. This means that ECC systems require smaller chip size and less power consumption. The proposed protocol has been implemented in Java to analyse its features and vulnerabilities in the real world.
引用
收藏
页码:137 / 142
页数:6
相关论文
共 8 条
[1]  
Aydos, 1999, P 4 S COMP NETW IST, P130
[2]  
BOYD C, 2003, PROTOCOLS AUTHENTICA
[3]  
HANKERSON D, 2003, GUIDE ELLIPTIC CURVE
[4]  
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5
[5]   The state of elliptic curve cryptography [J].
Koblitz, N ;
Menezes, A ;
Vanstone, S .
DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) :173-193
[6]   USE OF ELLIPTIC-CURVES IN CRYPTOGRAPHY [J].
MILLER, VS .
LECTURE NOTES IN COMPUTER SCIENCE, 1986, 218 :417-426
[7]  
ROSING M, 1999, IMPLEMENTING ELLIPTI
[8]  
Washington LC., 2003, Elliptic curves: number theory and cryptography