PERFORMANCE ANALYSIS OF DISTINCT SECURED AUTHENTICATION PROTOCOLS USED IN THE RESOURCE CONSTRAINED PLATFORM
Journal: ICTACT Journal on Communication Technology (IJCT) (Vol.5, No. 1)Publication Date: 2014-03-01
Authors : S. Prasanna; M. Gobi;
Page : 904-906
Keywords : Authentication; Asymmetric Key Cryptography; RSA; ECC; HECC; Sign Generation; Sign Verification; Key Generation;
Abstract
Most of the e-commerce and m-commerce applications in the current e-business world, has adopted asymmetric key cryptography technique in their authentication protocol to provide an efficient authentication of the involved parties. This paper exhibits the performance analysis of distinct authentication protocol which implements the public key cryptography like RSA, ECC and HECC. The comparison is made based on key generation, sign generation and sign verification processes. The results prove that the performance achieved through HECC based authentication protocol is better than the ECC- and RSA based authentication protocols.
Other Latest Articles
- NOISE SECURES SECRET DATA! BY ACT AS A REFERENCE FOR EMBEDDING
- AN ENERGY EFFICIENT FITNESS BASED ROUTING PROTOCOL IN WIRELESS SENSOR NETWORKS
- PRIORITIZED QUEUE WITH ROUND ROBIN SCHEDULER FOR BUFFERED CROSSBAR SWITCHES
- DCRS: A DYNAMIC CONTENTION RESOLUTION SCHEME FOR WIMAX NETWORKS
- FAILURE CORRECTION OF LINEAR ARRAY ANTENNA WITH MULTIPLE NULL PLACEMENT USING CUCKOO SEARCH ALGORITHM
Last modified: 2014-05-06 18:10:50