An Efficient Protocol for Resource Constrained Platforms Using ECC
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 1
Abstract
At present, most of e-commerce applications are developed using asymmetric cryptography to guarantee the authentication of the involved parties. On the other hand, a growing demand for mobile devices has geared a shift towards mobile e-commerce applications. This paper highlights that the existing authentication protocols, based on RSA asymmetric cryptography, are not appropriate for such devices due to their limitations in computing power, memory capacity, key sizes and cryptographic support. Therefore, an efficient protocol for resource constrained platforms that achieve a level of security similar to the one achieved by the protocols in use today is designed and implemented. This protocol is based solely on Elliptic curve asymmetric cryptography and the results prove that the performance achieved is good compared to RSA.
Authors and Affiliations
Mrs. S. Prasanna Ganesan
REMOTE SENSING IMAGE COMPRESSION USING 3D-SPIHT ALGORITHM AND 3D-OWT
Remote Sensing is the gathering of information about a place from a distance. Such information can occur by sensors or satellite, without making any direct contact with that object. We present a new technique for the com...
Q-Value Based Particle Swarm Optimization for Reinforcement Neuro-Fuzzy System Design
This paper proposes a combination of particle swarm optimization (PSO) and Q-value based safe reinforcement learning scheme for neuro-fuzzy systems (NFS). The proposed Q-value based particle swarm optimization (QPSO) ful...
ACO Based Feature Subset Selection for Multiple k-Nearest Neighbor Classifiers
The k-nearest neighbor (k-NN) is one of the most popular algorithms used for classification in various fields of pattern recognition & data mining problems. In k-nearest neighbor classification, the result of a new i...
Multimodal Authentication For High End Security
In earlier days Traditional authentication method in computer systems are based on knowledge and token based. Unfortunately lot of drawbacks are in these systems. Passwords often be forgotten, disclosed or changed. A rel...
Structured System Test Suite Generation Process for Multi-Agent System
In recent years, Agent-Oriented Software Engineering (AOSE) methodologies are proposed to develop complex distributed systems based upon the agent paradigm. The implementation for such systems has usually the form of Mul...