Mobility

A Light-Weight Mutual Authentication and Key-Exchange Protocol Based on Elliptical Curve Cryptogaphy for Energy-Constrained Devices

Free registration required

Executive Summary

Wireless devices are characterized by low computational power and memory. Hence security protocols dealing with these devices have to be designed to give minimal computational and memory load. The authors present an efficient authentication and key exchange protocol for low-end wireless clients and high end servers, which is overall nearly three times as fast as comparable protocols. The basic idea of the protocol is to use symmetric key encryption in place of public key encryption wherever possible.

  • Format: PDF
  • Size: 104.9 KB