Security Analysis of Authentication Protocol for Mobile Devices Using Hyperelliptic Curve Cryptography

被引:1
|
作者
Kordy, Turki [1 ]
Noor, Fazal [1 ]
Benrhouma, Oussama [1 ]
机构
[1] Islamic Univ, Comp Sci Coll, Madinah, Saudi Arabia
关键词
Authentication; ECC; HECC; Privacy; RSA; Security;
D O I
10.22937/IJCSNS.2021.21.10.12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, most e-commerce applications are facing issues to secure a proper authentication level. Mobile devices are related to attack the problems in cloud computing, considering that the present authentication. In view of their computational power constraints, key size and memory capacity, RSA public-key cryptography is not suited for these systems. On the contrary, we find Hyperelliptic Curve Cryptosystem (HECC) is considered more suitable for securing communications in mobile and IoT transaction resources like storage, time, or power. This protocol uses Hyperelliptic curve asymmetric cryptography, and the findings show that it exceeds RSA in terms of performance. The experimental work will indicates that the suggested system performance is equivalent with that of RSA. For secure access in limited devices, the security analysis will use a mutual two-factor authentication mechanism for mobile devices based on a hyperelliptic curve digital signature method. Overall, this search tries to suggest a protocol that enables to achieve a considerable level of security.
引用
收藏
页码:91 / 100
页数:10
相关论文
共 50 条
  • [1] An Asymmetric Authentication Protocol for Mobile Devices Using Elliptic Curve Cryptography
    Ganesan, S. Prasanna
    [J]. 2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 4, 2010, : 107 - 109
  • [2] On the Security of a Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
    Wu, Hsiao-Ling
    Chang, Chin-Chen
    Chen, Long-Sheng
    [J]. PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY (ICIT 2018), 2018, : 88 - 91
  • [3] A Mutual Authentication Protocol for IoT Devices using Elliptic Curve Cryptography
    Tewari, Aakanksha
    Gupta, B. B.
    [J]. PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, : 716 - 720
  • [4] An Improved Level of Security for DNA Steganography Using Hyperelliptic Curve Cryptography
    Vijayakumar, P.
    Vijayalakshmi, V.
    Zayaraz, G.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (04) : 1221 - 1242
  • [5] A Secure Route Discovery Protocol for AODV Based Mobile Adhoc Networks Using Hyperelliptic Curve Cryptography
    Vijayakumar, P.
    Rajashree, R.
    Sandhya, P.
    [J]. EMERGING TRENDS IN ELECTRICAL, COMMUNICATIONS AND INFORMATION TECHNOLOGIES, 2017, 394 : 209 - 217
  • [6] An Improved Level of Security for DNA Steganography Using Hyperelliptic Curve Cryptography
    P. Vijayakumar
    V. Vijayalakshmi
    G. Zayaraz
    [J]. Wireless Personal Communications, 2016, 89 : 1221 - 1242
  • [7] A Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
    Reddy, Alavalapati Goutham
    Das, Ashok Kumar
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. IEEE ACCESS, 2016, 4 : 4394 - 4407
  • [8] An Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Mobile Networks
    Rajeswari, P. G.
    Thilagavathi, K.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (02): : 176 - 185
  • [9] A secure user authentication protocol using elliptic curve cryptography
    Kumari, Adesh
    Abbasi, M. Yahya
    Kumar, Vinod
    Khan, Akber Ali
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 521 - 530
  • [10] Enhanced Biometric Recognition for Secure Authentication Using Iris Preprocessing and Hyperelliptic Curve Cryptography
    Rajasekar, Vani
    Premalatha, J.
    Sathya, K.
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020