An Authentication Protocol for Mobile Devices
Using Hyperelliptic Curve Cryptography
S. Ganesan. International Journal on Network Security, 2 (1):
4(January 2011)
Abstract
At present, most of e-commerce applications are
developed using asymmetric cryptography to guarantee the
authentication of the involved parties. On the other hand, a
growing demand for mobile devices has geared a shift towards
mobile e-commerce applications. This paper highlights that
the existing authentication protocols, based on RSA
asymmetric cryptography, are not appropriate for such
devices due to their limitations in computing power, memory
capacity, key sizes and cryptographic support. Therefore, an
efficient protocol for resource constrained platforms that
achieve a level of security similar to the one achieved by the
protocols in use today is designed and implemented. This
protocol is based solely on Hyperelliptic curve asymmetric
cryptography and the results prove that the performance
achieved is good compared to RSA.
%0 Journal Article
%1 ganesan2011authentication
%A Ganesan, S. Prasanna
%D 2011
%E Das, Dr. Vinu V
%J International Journal on Network Security
%K J2ME PDA RSA SET SSL TLS key_generation sign_generation
%N 1
%P 4
%T An Authentication Protocol for Mobile Devices
Using Hyperelliptic Curve Cryptography
%U http://doi.searchdl.org/01.IJNS.2.1.40
%V 2
%X At present, most of e-commerce applications are
developed using asymmetric cryptography to guarantee the
authentication of the involved parties. On the other hand, a
growing demand for mobile devices has geared a shift towards
mobile e-commerce applications. This paper highlights that
the existing authentication protocols, based on RSA
asymmetric cryptography, are not appropriate for such
devices due to their limitations in computing power, memory
capacity, key sizes and cryptographic support. Therefore, an
efficient protocol for resource constrained platforms that
achieve a level of security similar to the one achieved by the
protocols in use today is designed and implemented. This
protocol is based solely on Hyperelliptic curve asymmetric
cryptography and the results prove that the performance
achieved is good compared to RSA.
@article{ganesan2011authentication,
abstract = {At present, most of e-commerce applications are
developed using asymmetric cryptography to guarantee the
authentication of the involved parties. On the other hand, a
growing demand for mobile devices has geared a shift towards
mobile e-commerce applications. This paper highlights that
the existing authentication protocols, based on RSA
asymmetric cryptography, are not appropriate for such
devices due to their limitations in computing power, memory
capacity, key sizes and cryptographic support. Therefore, an
efficient protocol for resource constrained platforms that
achieve a level of security similar to the one achieved by the
protocols in use today is designed and implemented. This
protocol is based solely on Hyperelliptic curve asymmetric
cryptography and the results prove that the performance
achieved is good compared to RSA.},
added-at = {2012-09-25T07:54:13.000+0200},
author = {Ganesan, S. Prasanna},
biburl = {https://www.bibsonomy.org/bibtex/281966684c8d377c6d470880d9d15ec7f/ideseditor},
editor = {Das, Dr. Vinu V},
interhash = {109e78f5232b8726d912af8f8ca2a31e},
intrahash = {81966684c8d377c6d470880d9d15ec7f},
journal = {International Journal on Network Security},
keywords = {J2ME PDA RSA SET SSL TLS key_generation sign_generation},
month = {January},
number = 1,
pages = 4,
timestamp = {2012-09-25T07:54:14.000+0200},
title = {An Authentication Protocol for Mobile Devices
Using Hyperelliptic Curve Cryptography},
url = {http://doi.searchdl.org/01.IJNS.2.1.40},
volume = 2,
year = 2011
}