International Journal of Computer Science Issues
The growing trend of wireless networks and risks associated with them has led to the development of authentication and application of stronger cryptographic methods to maintain a more robust security. This paper examined and compared two types of developed authentication protocols to provide an alternative method using strong cryptographic methods. The common EAPTTLS method uses RSA algorithm for encryption and SHA-1 hash algorithm. In this paper, the new method called alternative EAPTTLS method uses Elliptic Curve Digital Signature Algorithm (ECDSA) and the Secure Hash Algorithm (SHA-256) to provide stronger security and higher efficiency.