Key establishment protocols in mobile communication

A variety of authenticated key establishment protocols for mobile applications had been proposed in recent years. One of the purposes of this research project is to examine and analyze some of the more prominent published authenticated key establishment protocols with regards to security and efficie...

Full description

Saved in:
Bibliographic Details
Main Author: Teo, Chee Khiang.
Other Authors: Tan, Chik How
Format: Theses and Dissertations
Published: 2008
Subjects:
Online Access:http://hdl.handle.net/10356/3547
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
id sg-ntu-dr.10356-3547
record_format dspace
spelling sg-ntu-dr.10356-35472023-07-04T15:45:47Z Key establishment protocols in mobile communication Teo, Chee Khiang. Tan, Chik How School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering::Wireless communication systems A variety of authenticated key establishment protocols for mobile applications had been proposed in recent years. One of the purposes of this research project is to examine and analyze some of the more prominent published authenticated key establishment protocols with regards to security and efficiency. In this research project, a number of goals pertaining to security in authentication process are identified and the authenticated key establishment protocols are then evaluated using these goals. In addition, the authenticated key establishment protocols are also simulated using known cryptosystems such as RSA and AES. Data from these simulations are then used to compare the efficiency of the various protocols. The authenticated key establishment protocols are then compared and further analyzed, particularly with regards to mobile efficiency. Generally, the more secured a key establishment protocol is, the more computational complex it is. Master of Science (Communication Software and Networks) 2008-09-17T09:32:05Z 2008-09-17T09:32:05Z 2003 2003 Thesis http://hdl.handle.net/10356/3547 Nanyang Technological University application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
topic DRNTU::Engineering::Electrical and electronic engineering::Wireless communication systems
spellingShingle DRNTU::Engineering::Electrical and electronic engineering::Wireless communication systems
Teo, Chee Khiang.
Key establishment protocols in mobile communication
description A variety of authenticated key establishment protocols for mobile applications had been proposed in recent years. One of the purposes of this research project is to examine and analyze some of the more prominent published authenticated key establishment protocols with regards to security and efficiency. In this research project, a number of goals pertaining to security in authentication process are identified and the authenticated key establishment protocols are then evaluated using these goals. In addition, the authenticated key establishment protocols are also simulated using known cryptosystems such as RSA and AES. Data from these simulations are then used to compare the efficiency of the various protocols. The authenticated key establishment protocols are then compared and further analyzed, particularly with regards to mobile efficiency. Generally, the more secured a key establishment protocol is, the more computational complex it is.
author2 Tan, Chik How
author_facet Tan, Chik How
Teo, Chee Khiang.
format Theses and Dissertations
author Teo, Chee Khiang.
author_sort Teo, Chee Khiang.
title Key establishment protocols in mobile communication
title_short Key establishment protocols in mobile communication
title_full Key establishment protocols in mobile communication
title_fullStr Key establishment protocols in mobile communication
title_full_unstemmed Key establishment protocols in mobile communication
title_sort key establishment protocols in mobile communication
publishDate 2008
url http://hdl.handle.net/10356/3547
_version_ 1772825928114634752