PERFORMANCE ANALYSIS OF DISTINCT SECURED AUTHENTICATION PROTOCOLS USED IN THE RESOURCE CONSTRAINED PLATFORM

ICTACT Journal on Communication Technology ( Volume: 5 , Issue: 1 )

Abstract

vioft2nntf2t|tblJournal|Abstract_paper|0xf4ff588c15000000f0fa020001000f00
Most of the e-commerce and m-commerce applications in the current e-business world, has adopted asymmetric key cryptography technique in their authentication protocol to provide an efficient authentication of the involved parties. This paper exhibits the performance analysis of distinct authentication protocol which implements the public key cryptography like RSA, ECC and HECC. The comparison is made based on key generation, sign generation and sign verification processes. The results prove that the performance achieved through HECC based authentication protocol is better than the ECC- and RSA based authentication protocols.

Authors

S. Prasanna1, M. Gobi2
Dr. GRD College of Science, India1, Chikkanna Government Arts College, India2

Keywords

Authentication, Asymmetric Key Cryptography, RSA, ECC, HECC, Sign Generation, Sign Verification, Key Generation

Published By
ICTACT
Published In
ICTACT Journal on Communication Technology
( Volume: 5 , Issue: 1 )
Date of Publication
March 2014
Pages
904 - 906
Page Views
885
Full Text Views
4

ICT Academy is an initiative of the Government of India in collaboration with the state Governments and Industries. ICT Academy is a not-for-profit society, the first of its kind pioneer venture under the Public-Private-Partnership (PPP) model

Contact Us

ICT Academy
Module No E6 -03, 6th floor Block - E
IIT Madras Research Park
Kanagam Road, Taramani,
Chennai 600 113,
Tamil Nadu, India

For Journal Subscription: journalsales@ictacademy.in

For further Queries and Assistance, write to us at: ictacademy.journal@ictacademy.in