DocumentCode :
3635923
Title :
Elliptic curve cryptography based mutual authentication protocol for low computational complexity environment
Author :
Gy?z? G?dor;Norbert Giczi;S?ndor Imre
Author_Institution :
Department of Telecommunications, Budapest University of Technology and Economics, Magyar Tud?sok k?r?tja 2., Budapest, Hungary H-1117
fYear :
2010
fDate :
5/1/2010 12:00:00 AM
Firstpage :
331
Lastpage :
336
Abstract :
In the last few years RFID technology widespread. This technology can be found in each field of our daily life, e.g. supply-chain management, libraries, access management etc. For the sake of small computational capacity of RFID Tags, at first, only mathematical and logical operations and lightweight authentication methods could be used. However, thanks to the evolution of RFID technology, nowadays PKI infrastructure is also usable in this environment. In this paper we present our elliptic curve cryptography based mutual authentication protocol which proofs against the well-known attacks. We give a brief comparison with other EC based protocols in the point of view of security. Moreover, we show that our protocol is better than the others in case of performance, too.
Keywords :
"Elliptic curve cryptography","Authentication","Cryptographic protocols","Computational complexity","Radiofrequency identification","Technology management","Access protocols","Libraries","RFID tags","Security"
Publisher :
ieee
Conference_Titel :
Wireless Pervasive Computing (ISWPC), 2010 5th IEEE International Symposium on
Print_ISBN :
978-1-4244-6855-3
Type :
conf
DOI :
10.1109/ISWPC.2010.5483740
Filename :
5483740
Link To Document :
بازگشت