Authenticated secret session key using elliptic curve digital signature algorithm

被引:2
|
作者
Mehibel, Nissa [1 ]
Hamadouche, M'hamed [1 ]
机构
[1] Univ Mhamed Bougara Boumerdes, LIMOSE Lab Fac Sci, Independence Ave 35000, Boumerdes, Algeria
关键词
authentication scheme; elliptic curve; elliptic curve discrete logarithm problem; man-in-the-middle attack; private key; public key; SECURE; EXCHANGE; PROTOCOL; ECC;
D O I
10.1002/spy2.148
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Elliptic curve Diffie-Hellman (ECDH) scheme is the basic key exchange used in elliptic curve cryptography. ECDH is a public key cryptosystem based on the discrete logarithm problem, but is vulnerable to man-in-the-middle attack because it does not authenticate the secret session key. The integration of the elliptic curve digital signature allows authenticating the secret session key of the ECDH scheme (A-ECDH). However, it is a technique (A-ECDH) that uses a single random variable and it has been shown in the literature that a single random variable does not make the system secure. Therefore, the use of two random variables has been suggested to secure an authentication scheme. In this paper, a new authentication scheme using the elliptic curve digital signature algorithm is proposed. The performance analysis of the proposed authentication protocol is performed. The comparative results from the perspective of security and computation time showed that the proposed authentication protocol is more efficient in terms of computation time compared to the related works and it provides all the security features.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] An anonymous two-factor authenticated key agreement scheme for session initiation protocol using elliptic curve cryptography
    Yanrong Lu
    Lixiang Li
    Haipeng Peng
    Yixian Yang
    Multimedia Tools and Applications, 2017, 76 : 1801 - 1815
  • [22] Secure Communication in Smart Meters using Elliptic Curve Cryptography and Digital Signature Algorithm
    Shukla, Saurabh
    Thakur, Subhasis
    Breslin, John G.
    PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 261 - 266
  • [23] An authenticated key exchange protocol in elliptic curve cryptography
    Reddy, P. Vasudeva
    Padmavathamma, M.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (05): : 697 - 705
  • [24] SECRET SHARING AND SHARED DIGITAL SIGNATURE USING ELLIPTIC CURVES
    Litcanu, Razvan
    Palasca, Silvia
    ANALELE STIINTIFICE ALE UNIVERSITATII AL I CUZA DIN IASI-SERIE NOUA-MATEMATICA, 2009, 55 (01): : 131 - 144
  • [25] An Efficient Double Parameter Elliptic Curve Digital Signature Algorithm for Blockchain
    Liu, Shuang-Gen
    Chen, Wan-Qi
    Liu, Jia-Lu
    IEEE ACCESS, 2021, 9 : 77058 - 77066
  • [26] Improved Deterministic Usage of the Elliptic Curve Digital Signature Algorithm with Scrypt
    Tran, Dang Ninh
    Vu, Ba Linh
    Tien, Xuan Nguyen
    2023 IEEE STATISTICAL SIGNAL PROCESSING WORKSHOP, SSP, 2023, : 611 - 615
  • [27] The insecurity of the elliptic curve digital signature algorithm with partially known nonces
    Nguyen, PQ
    Shparlinski, IE
    DESIGNS CODES AND CRYPTOGRAPHY, 2003, 30 (02) : 201 - 217
  • [28] Demystifying Threshold Elliptic Curve Digital Signature Algorithm for MultiParty Applications
    Kachouh, Bachar
    Sliman, Layth
    Samhat, Abed Ellatif
    Barkaoui, Kamel
    PROCEEDINGS OF 2023 AUSTRALIAN COMPUTER SCIENCE WEEK, ACSW 2023, 2023, : 112 - 121
  • [29] FPGA Implementation of Elliptic Curve Digital Signature Algorithm Based on PUFs
    Zhang, Hao
    Liu, Xuankai
    Li, Bing
    2024 9TH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, ICSIP, 2024, : 520 - 525
  • [30] A secure digital signature algorithm based on elliptic curve and chaotic mappings
    Fei, P
    Qiu, SS
    Min, L
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2005, 24 (05) : 585 - 597