Title of article :
A Comparison Study on Key Exchange-Authentication protocol
Author/Authors :
Razieh Mokhtarnameh، نويسنده , , Nithiapidary Muthuvelu، نويسنده , , Sin Ban Ho، نويسنده , , Ian Chai، نويسنده ,
Issue Information :
روزنامه با شماره پیاپی سال 2010
Pages :
7
From page :
5
To page :
11
Abstract :
A key exchange protocol enables two parties to share a common key for encrypting a large amount of data. Authentication is an essential requirement prior to the key exchange process in order to prevent man-in-the-middle attack. It is important to understand the capabilities and performance of the existing key exchange protocols before employing the protocols in our applications. In this paper, we compare Secure Socket Layer, Secure Shell, and Identity-based key exchange protocols by quantifying the performance, complexity, and level of security of each protocol. Detailed experiments and observations are conducted to examine the protocols in terms of disk usage, computation time, and data transmission time. The analysis shows that the identity-based key exchange maintains similar security level as the other protocols, while conveying better performance.
Keywords :
Key exchange protocol , Security , Performance , complexity
Journal title :
International Journal of Computer Applications
Serial Year :
2010
Journal title :
International Journal of Computer Applications
Record number :
660130
Link To Document :
بازگشت