Rate the Article: Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography, IJSR, Call for Papers, Online Journal
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064

Downloads: 109 | Views: 460 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Mathematics | India | Volume 3 Issue 6, June 2014 | Rating: 6.4 / 10


Two-Party Authenticated Key Agreement Protocol in Elliptic Curve Cryptography

Vinod Kumar, Adesh Kumari


Abstract: In this paper; we are taken non singular elliptic curve which is depends on prime finite field. Accomplishment of existing public-key algorithms; comparable to Diffie-Hellman; using elliptic curves. In addition; the paper has been conventional two party authenticated key agreement protocol in elliptic curve cryptography (ECC). In this protocol; two users communicate to each other and generate secure session key. Furthermore; the paper shows the security analysis of this protocol on a secure communicated channel.


Keywords: Elliptic Curve Cryptography, Identity based Cryptosystem, Private Key generator Mutual Authentication


Edition: Volume 3 Issue 6, June 2014,


Pages: 587 - 589



Rate this Article


Select Rating (Lowest: 1, Highest: 10)

5

Your Comments (Only high quality comments will be accepted.)

Characters: 0

Your Full Name:


Your Valid Email Address:


Verification Code will appear in 2 Seconds ... Wait

Top