Identity-based elliptic curve signature algorithm in tripartite key exchange protocol

Author(s):  
Jia Zhao ◽  
Zhen Han
Author(s):  
Behnam Rahnama ◽  
Arif Sari ◽  
Marwan Yassin Ghafour

Security is utilized to keep the information safe. Online resources, e-commerce, internet banking and a lot of similar services are protected by use of well-known protocols such as Secure Socket Layer (SSL). This protocol makes use of the RSA key exchange protocol for authentication. New innovations and boost ups in the computational power of supercomputers today makes it quite easier than before to break through RSA and consequently decrypt the payload transferred over SSL. In this research demonstrates the use of SSL; how to utilize it in the best shape? We also discuss reasons of why we need to improve its strength. The proposed solution is to replace the RSA key exchange mechanism utilized in SSL with Elliptic Curve Cryptography (ECC).


Sign in / Sign up

Export Citation Format

Share Document