z-logo
open-access-imgOpen Access
Key Exchange Protocol in Elliptic Curve Cryptography with No Public Point
Author(s) -
Khalid Kaabneh,
H. Al-Bdour
Publication year - 2005
Publication title -
american journal of applied sciences
Language(s) - English
Resource type - Journals
eISSN - 1554-3641
pISSN - 1546-9239
DOI - 10.3844/ajassp.2005.1232.1235
Subject(s) - key exchange , elliptic curve cryptography , public key cryptography , curve25519 , elliptic curve , protocol (science) , key (lock) , computer science , cryptography , computer security , mathematics , encryption , mathematical analysis , medicine , alternative medicine , pathology
In recent years some cryptographic algorithms have gained popularity due to properties that make them suitable for use in constrained environment like mobile information appliances, where computing resources and power availability are limited. One of these cryptosystems is Elliptic curve which requires less computational power, memory and communication bandwidth compared to other cryptosystem. This makes the elliptic curve cryptography to gain wide acceptance as an alternative to conventional cryptosystems (DSA, RSA, AES, etc.). All existing protocols for elliptic curve cryptosystems that are used for either key exchange or for ciphering, assume that the curve E, the field Fq and a point P on the curve are all public. In this research we propose a modified protocol for elliptic curve key exchange based on elliptic curve over rings, assuming that only the curve E and Fq are public, keeping the base point P secret, which make attacking the cryptosystem harder by the eavesdropper. Also we provide imbedded authentication, so our protocol does not suffer from the man in the middle attack

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here