{"title":"基于椭圆曲线密码体制的认证密钥协商协议方案探讨","authors":"Dr.Sonali Nimbhorkar(Ridhorkar), L. Malik","doi":"10.1109/ICETET.2013.42","DOIUrl":null,"url":null,"abstract":"Wireless technology has become more persistent with wide demand of mobile devices such as personal digital assistance, smart phones and laptops. The elliptic curve cryptography(ECC) techniques provide greater security using fewer bits resulting in a protocol which requires low computational and communication overhead, therefore suitable for wireless communication system as well as wireless communication devices smart cards, PDAs and other handheld devices. These systems are prone to eavesdropping due to easy access to free space medium. In such cases, appropriate authenticity and cryptographic procedures need to be adopted for reliable and secure communication. Key agreement protocol based on elliptic curve cryptography suited for wireless network. This paper describes various schemes used for implementation of authenticated key agreement protocol in wireless network.","PeriodicalId":440967,"journal":{"name":"2013 6th International Conference on Emerging Trends in Engineering and Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Exploration of Schemes for Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptosystem\",\"authors\":\"Dr.Sonali Nimbhorkar(Ridhorkar), L. Malik\",\"doi\":\"10.1109/ICETET.2013.42\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless technology has become more persistent with wide demand of mobile devices such as personal digital assistance, smart phones and laptops. The elliptic curve cryptography(ECC) techniques provide greater security using fewer bits resulting in a protocol which requires low computational and communication overhead, therefore suitable for wireless communication system as well as wireless communication devices smart cards, PDAs and other handheld devices. These systems are prone to eavesdropping due to easy access to free space medium. In such cases, appropriate authenticity and cryptographic procedures need to be adopted for reliable and secure communication. Key agreement protocol based on elliptic curve cryptography suited for wireless network. This paper describes various schemes used for implementation of authenticated key agreement protocol in wireless network.\",\"PeriodicalId\":440967,\"journal\":{\"name\":\"2013 6th International Conference on Emerging Trends in Engineering and Technology\",\"volume\":\"51 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 6th International Conference on Emerging Trends in Engineering and Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICETET.2013.42\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 6th International Conference on Emerging Trends in Engineering and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETET.2013.42","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Exploration of Schemes for Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptosystem
Wireless technology has become more persistent with wide demand of mobile devices such as personal digital assistance, smart phones and laptops. The elliptic curve cryptography(ECC) techniques provide greater security using fewer bits resulting in a protocol which requires low computational and communication overhead, therefore suitable for wireless communication system as well as wireless communication devices smart cards, PDAs and other handheld devices. These systems are prone to eavesdropping due to easy access to free space medium. In such cases, appropriate authenticity and cryptographic procedures need to be adopted for reliable and secure communication. Key agreement protocol based on elliptic curve cryptography suited for wireless network. This paper describes various schemes used for implementation of authenticated key agreement protocol in wireless network.