Cryptography Implementation in IP Datagram

Download Now
Provided by: International Journal Of Engineering And Computer Science
Topic: Security
Format: PDF
The IP packets prepared to sent across the network have a digital signature and public key attached to it which allows to check on each hop along the route to verify the authenticity of packets. For this the authors use ECC (Elliptic Curve Cryptography). In this paper, they present a software solution of cryptography for PLA (Packet Level Authentication) using the combination of koblitz curves to increase throughput and implicit certificates to decrease storage and computation overhead.
Download Now

Find By Topic