Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server Based on Elliptic Curve Cryptography with the ElGamal-s Algorithm
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server Based on Elliptic Curve Cryptography with the ElGamal-s Algorithm

Authors: Konstantinos Chalkias, George Filiadis, George Stephanides

Abstract:

In this paper the authors propose a protocol, which uses Elliptic Curve Cryptography (ECC) based on the ElGamal-s algorithm, for sending small amounts of data via an authentication server. The innovation of this approach is that there is no need for a symmetric algorithm or a safe communication channel such as SSL. The reason that ECC has been chosen instead of RSA is that it provides a methodology for obtaining high-speed implementations of authentication protocols and encrypted mail techniques while using fewer bits for the keys. This means that ECC systems require smaller chip size and less power consumption. The proposed protocol has been implemented in Java to analyse its features and vulnerabilities in the real world.

Keywords: Elliptic Curve Cryptography, ElGamal, authentication protocol.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1072607

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2047

References:


[1] N. Koblitz, A. Menezes and S. Vanstone, The state of elliptic curve cryptography. Designs, Codes and Cryptography, 19 (2000), 173-193.
[2] N. Koblitz, Elliptic curve cryptosystems. Mathematics of Computation, 48 (1987), 203-209.
[3] V.Miller, Uses of elliptic curves in Cryptography. H.C.Williams, (ed.) Advances in Cryptology-CRYPTO 85, Proceedings, Lecture Notes in Computer Science, No 218 (1985), 417-426, Springer-Verlag.
[4] M. Aydos, E. Savas, and C. K. Koc , Implementing Network Security Protocols based on Elliptic Curve Cryptography, Proceedings of the Fourth Symposium on Computer Networks, pages 130-139, Istanbul, Turkey, May 20-21, 1999.
[5] L. C. Washington, Elliptic curves Number Theory and Cryptography, Chapman&Hall / CRC, 2003.
[6] M. Rosing, Implementing Elliptic Curve Cryptography, Manning, 1999.
[7] D. Hankerson , A.Menezes, and S.Vastone, Guide to Elliptic curve cryptography, Spinger-Verlag, 2003.
[8] C. Boyd and A. Mathuria, Protocols for authentication and Key Establishment, Springer-Verlag, 2003.