PERFORMANCE ANALYSIS OF DISTINCT SECURED AUTHENTICATION PROTOCOLS USED IN THE RESOURCE CONSTRAINED PLATFORM
Abstract
vioft2nntf2t|tblJournal|Abstract_paper|0xf4ff588c15000000f0fa020001000f00
Most of the e-commerce and m-commerce applications in the current e-business world, has adopted asymmetric key cryptography technique in their authentication protocol to provide an efficient authentication of the involved parties. This paper exhibits the performance analysis of distinct authentication protocol which implements the public key cryptography like RSA, ECC and HECC. The comparison is made based on key generation, sign generation and sign verification processes. The results prove that the performance achieved through HECC based authentication protocol is better than the ECC- and RSA based authentication protocols.

Authors
S. Prasanna1, M. Gobi2
Dr. GRD College of Science, India1, Chikkanna Government Arts College, India2

Keywords
Authentication, Asymmetric Key Cryptography, RSA, ECC, HECC, Sign Generation, Sign Verification, Key Generation
Yearly Full Views
JanuaryFebruaryMarchAprilMayJuneJulyAugustSeptemberOctoberNovemberDecember
000000000000
Published By :
ICTACT
Published In :
ICTACT Journal on Communication Technology
( Volume: 5 , Issue: 1 , Pages: 904 - 906 )
Date of Publication :
March 2014
Page Views :
289
Full Text Views :

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.