Public Key Based Protocols–EC Crypto

Pawani Porambage, An Braeken, Corinna Schmitt

Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

1 Citation (Scopus)

Abstract

Elliptic curve cryptography (ECC) is extensively applied in various security protocols for authentication and key management. ECC is a public key or asymmetric key cryptographic approach which is based on elliptic curve theory. ECC was introduced to minimize computational costs while providing equal and faster layers of security than other familiar operations (such as modular exponentiation) and with smaller keys. The technique of ECC has numerous applications in authentication protocols concerning RFIDs, digital signatures, wireless sensor networks, smart cards, and other authentication techniques. In this chapter, we describe the utilization of ECC for designing security protocols in terms of authentication, key establishment, signcryption, and secure group communication.
Original languageEnglish
Title of host publicationIoT Security: Advances in Authentication
PublisherJohn Wiley & Sons, Ltd
Pages85-99
Number of pages15
ISBN (Electronic)9781119527978
ISBN (Print)9781119527923
DOIs
Publication statusPublished - Feb 2020

Bibliographical note

Publisher Copyright:
© 2020 John Wiley & Sons Ltd. All rights reserved.

Fingerprint

Dive into the research topics of 'Public Key Based Protocols–EC Crypto'. Together they form a unique fingerprint.

Cite this