Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server Based on Elliptic Curve Cryptography with the ElGamal-s Algorithm

In this paper the authors propose a protocol, which uses Elliptic Curve Cryptography (ECC) based on the ElGamal-s algorithm, for sending small amounts of data via an authentication server. The innovation of this approach is that there is no need for a symmetric algorithm or a safe communication channel such as SSL. The reason that ECC has been chosen instead of RSA is that it provides a methodology for obtaining high-speed implementations of authentication protocols and encrypted mail techniques while using fewer bits for the keys. This means that ECC systems require smaller chip size and less power consumption. The proposed protocol has been implemented in Java to analyse its features and vulnerabilities in the real world.





References:
[1] N. Koblitz, A. Menezes and S. Vanstone, The state of elliptic curve
cryptography. Designs, Codes and Cryptography, 19 (2000), 173-193.
[2] N. Koblitz, Elliptic curve cryptosystems. Mathematics of Computation,
48 (1987), 203-209.
[3] V.Miller, Uses of elliptic curves in Cryptography. H.C.Williams, (ed.)
Advances in Cryptology-CRYPTO 85, Proceedings, Lecture Notes in
Computer Science, No 218 (1985), 417-426, Springer-Verlag.
[4] M. Aydos, E. Savas, and C. K. Koc , Implementing Network Security
Protocols based on Elliptic Curve Cryptography, Proceedings of the
Fourth Symposium on Computer Networks, pages 130-139, Istanbul,
Turkey, May 20-21, 1999.
[5] L. C. Washington, Elliptic curves Number Theory and Cryptography,
Chapman&Hall / CRC, 2003.
[6] M. Rosing, Implementing Elliptic Curve Cryptography, Manning, 1999.
[7] D. Hankerson , A.Menezes, and S.Vastone, Guide to Elliptic curve
cryptography, Spinger-Verlag, 2003.
[8] C. Boyd and A. Mathuria, Protocols for authentication and Key
Establishment, Springer-Verlag, 2003.