Key establishment protocols in mobile communication

A variety of authenticated key establishment protocols for mobile applications had been proposed in recent years. One of the purposes of this research project is to examine and analyze some of the more prominent published authenticated key establishment protocols with regards to security and efficie...

全面介紹

Saved in:
書目詳細資料
主要作者: Teo, Chee Khiang.
其他作者: Tan, Chik How
格式: Theses and Dissertations
出版: 2008
主題:
在線閱讀:http://hdl.handle.net/10356/3547
標簽: 添加標簽
沒有標簽, 成為第一個標記此記錄!
機構: Nanyang Technological University
實物特徵
總結:A variety of authenticated key establishment protocols for mobile applications had been proposed in recent years. One of the purposes of this research project is to examine and analyze some of the more prominent published authenticated key establishment protocols with regards to security and efficiency. In this research project, a number of goals pertaining to security in authentication process are identified and the authenticated key establishment protocols are then evaluated using these goals. In addition, the authenticated key establishment protocols are also simulated using known cryptosystems such as RSA and AES. Data from these simulations are then used to compare the efficiency of the various protocols. The authenticated key establishment protocols are then compared and further analyzed, particularly with regards to mobile efficiency. Generally, the more secured a key establishment protocol is, the more computational complex it is.