Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Performance Analysis of Distinct Secured Authentication Protocols Used in the Resource Constrained Platform


Affiliations
1 School of Computer Science and Information Technology, Dr. GRD College of Science, India
2 Department of Computer Science, Chikkanna Government Arts College, India
     

   Subscribe/Renew Journal


Most of the e-commerce and m-commerce applications in the current e-business world, has adopted asymmetric key cryptography technique in their authentication protocol to provide an efficient authentication of the involved parties. This paper exhibits the performance analysis of distinct authentication protocol which implements the public key cryptography like RSA, ECC and HECC. The comparison is made based on key generation, sign generation and sign verification processes. The results prove that the performance achieved through HECC based authentication protocol is better than the ECC- and RSA based authentication protocols.

Keywords

Authentication, Asymmetric Key Cryptography, RSA, ECC, HECC, Sign Generation, Sign Verification, Key Generation.
Subscription Login to verify subscription
User
Notifications
Font Size

Abstract Views: 162

PDF Views: 0




  • Performance Analysis of Distinct Secured Authentication Protocols Used in the Resource Constrained Platform

Abstract Views: 162  |  PDF Views: 0

Authors

S. Prasanna
School of Computer Science and Information Technology, Dr. GRD College of Science, India
M. Gobi
Department of Computer Science, Chikkanna Government Arts College, India

Abstract


Most of the e-commerce and m-commerce applications in the current e-business world, has adopted asymmetric key cryptography technique in their authentication protocol to provide an efficient authentication of the involved parties. This paper exhibits the performance analysis of distinct authentication protocol which implements the public key cryptography like RSA, ECC and HECC. The comparison is made based on key generation, sign generation and sign verification processes. The results prove that the performance achieved through HECC based authentication protocol is better than the ECC- and RSA based authentication protocols.

Keywords


Authentication, Asymmetric Key Cryptography, RSA, ECC, HECC, Sign Generation, Sign Verification, Key Generation.