z-logo
open-access-imgOpen Access
Lightweight and Secure Elliptical Curve Cryptography (ECC) Key Exchange for Mobile Phones
Author(s) -
Mashooq Ahmad Dar,
Aadil Askar,
Daliya Alyahya,
Sameer Ahmad Bhat
Publication year - 2021
Publication title -
international journal of interactive mobile technologies
Language(s) - English
Resource type - Journals
ISSN - 1865-7923
DOI - 10.3991/ijim.v15i23.26337
Subject(s) - computer science , elliptic curve cryptography , key exchange , cryptography , encryption , computer security , key (lock) , secure communication , mobile device , computer network , data exchange , public key cryptography , distributed computing , operating system , database
Open networks enable data communication between different types of mobile devices that showcase the need to enforce elevated security measures. Securing sensitive or confidential data in mobile phones is accomplished by implementing a diverse range of cryptographic techniques. While encryption algorithms, such as Rivest–Shamir–Adleman (RSA) may offer secure solutions that are often difficult to compromise, these in turn prerequisite high speed computational resources for effective operation. Elliptical curve cryptography (ECC) is well thought-out standard that offers a workable and feasible methods of encryption/decryption, whilst being applicable to resource constraint devices. This paper implements a novel key exchange mechanism that helps to secure exchange of data between the communicating mobile devices. The study aims to address the limitation of Elliptic Curve Deffie Hellman, which is susceptible to Man-in-the-Middle attack and proposes an enhanced Elliptic Curve Deffie Hellman (ECDH) technique for secure data communication in open networks. The study results reveal, how the implementation of ECDH allows exchange of keys between the two communicating devices with limited resources.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here