To search, Click below search items.


All Published Papers Search Service


Security Analysis of Authentication Protocol for Mobile Devices Using Hyperelliptic Curve Cryptography


Turki Kordy, Prof.Fazal Noor and Dr.Oussama Benrhouma


Vol. 21  No. 10  pp. 91-100


Nowadays, most e-commerce applications are facing issues to secure a proper authentication level. Mobile devices are related to attack the problems in cloud computing, considering that the present authentication. In view of their computational power constraints, key size and memory capacity, RSA public-key cryptography is not suited for these systems. On the contrary, we find Hyperelliptic Curve Cryptosystem (HECC) is considered more suitable for securing communications in mobile and IoT transaction resources like storage, time, or power. This protocol uses Hyperelliptic curve asymmetric cryptography, and the findings show that it exceeds RSA in terms of performance. The experimental work will indicates that the suggested system performance is equivalent with that of RSA. For secure access in limited devices, the security analysis will use a mutual two-factor authentication mechanism for mobile devices based on a hyperelliptic curve digital signature method. Overall, this search tries to suggest a protocol that enables to achieve a considerable level of security.


Authentication, ECC, HECC, Privacy, RSA, Security