Authenticated secret session key using elliptic curve digital signature algorithm

被引:2
|
作者
Mehibel, Nissa [1 ]
Hamadouche, M'hamed [1 ]
机构
[1] Univ Mhamed Bougara Boumerdes, LIMOSE Lab Fac Sci, Independence Ave 35000, Boumerdes, Algeria
关键词
authentication scheme; elliptic curve; elliptic curve discrete logarithm problem; man-in-the-middle attack; private key; public key; SECURE; EXCHANGE; PROTOCOL; ECC;
D O I
10.1002/spy2.148
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Elliptic curve Diffie-Hellman (ECDH) scheme is the basic key exchange used in elliptic curve cryptography. ECDH is a public key cryptosystem based on the discrete logarithm problem, but is vulnerable to man-in-the-middle attack because it does not authenticate the secret session key. The integration of the elliptic curve digital signature allows authenticating the secret session key of the ECDH scheme (A-ECDH). However, it is a technique (A-ECDH) that uses a single random variable and it has been shown in the literature that a single random variable does not make the system secure. Therefore, the use of two random variables has been suggested to secure an authentication scheme. In this paper, a new authentication scheme using the elliptic curve digital signature algorithm is proposed. The performance analysis of the proposed authentication protocol is performed. The comparative results from the perspective of security and computation time showed that the proposed authentication protocol is more efficient in terms of computation time compared to the related works and it provides all the security features.
引用
收藏
页数:15
相关论文
共 50 条
  • [41] A robust threshold elliptic curve digital signature providing a new verifiable secret sharing scheme
    Ibrahim, MH
    Ali, IA
    Ibrahim, II
    El-sawi, AH
    Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 276 - 280
  • [42] Hardware implementation of Elliptic Curve Digital Signature Algorithm (ECDSA) on Koblitz Curves
    Nabil, Ghanmy
    Naziha, Khlif
    Lamia, Fourati
    Lotfi, Kamoun
    PROCEEDINGS OF THE 2012 8TH INTERNATIONAL SYMPOSIUM ON COMMUNICATION SYSTEMS, NETWORKS & DIGITAL SIGNAL PROCESSING (CSNDSP), 2012,
  • [43] Design of Hyper Elliptic Curve Digital Signature
    Deng Jian-zhi
    Cheng Xiao-hui
    Gui Qiong
    ITCS: 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, PROCEEDINGS, VOL 2, PROCEEDINGS, 2009, : 45 - 47
  • [44] Elliptic curve blind digital signature schemes
    You, L
    Yang, YX
    Wen, QY
    CHINESE JOURNAL OF ELECTRONICS, 2003, 12 (03): : 411 - 414
  • [45] Generalized Elliptic Curve Digital Signature Chain based Authentication and Key Agreement Scheme
    Zhang Li-hua
    Zhang Li-ping
    Bai Er-fei
    PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 1503 - +
  • [46] Using the Digital Signature of a Fingerprint by an Elliptic Curve Cryptosystem for Enhanced Authentication
    Shankar, T. N.
    Sahoo, G.
    Niranjan, S.
    INFORMATION SECURITY JOURNAL, 2012, 21 (05): : 243 - 255
  • [47] A new algorithm for a public key cryptosystem using elliptic curve
    Mehibel, Nissa
    Hamadouche, M'hamed
    2017 EUROPEAN CONFERENCE ON ELECTRICAL ENGINEERING AND COMPUTER SCIENCE (EECS), 2017, : 17 - 22
  • [48] An elliptic curve based authenticated key agreement protocol for wireless security
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 767 - 777
  • [49] Elliptic curve based authenticated key agreement protocol for wireless security
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1096 - 1100
  • [50] Cryptanalysis of a Three-party Authenticated Key Exchange Protocol Using Elliptic Curve Cryptography
    Pu, Qiong
    Zhao, Xiuying
    Ding, Jianmin
    2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 7 - 10