Research Article Open Access

Key Exchange Protocol in Elliptic Curve Cryptography with No Public Point

K. Kaabneh and H. Al-Bdour

Abstract

In recent years some cryptographic algorithms have gained popularity due to properties that make them suitable for use in constrained environment like mobile information appliances, where computing resources and power availability are limited. One of these cryptosystems is Elliptic curve which requires less computational power, memory and communication bandwidth compared to other cryptosystem. This makes the elliptic curve cryptography to gain wide acceptance as an alternative to conventional cryptosystems (DSA, RSA, AES, etc.). All existing protocols for elliptic curve cryptosystems that are used for either key exchange or for ciphering, assume that the curve E, the field Fq and a point P on the curve are all public. In this research we propose a modified protocol for elliptic curve key exchange based on elliptic curve over rings, assuming that only the curve E and Fq are public, keeping the base point P secret, which make attacking the cryptosystem harder by the eavesdropper. Also we provide imbedded authentication, so our protocol does not suffer from the man in the middle attack.

American Journal of Applied Sciences
Volume 2 No. 8, 2005, 1232-1235

DOI: https://doi.org/10.3844/ajassp.2005.1232.1235

Submitted On: 17 August 2005 Published On: 31 August 2005

How to Cite: Kaabneh, K. & Al-Bdour, H. (2005). Key Exchange Protocol in Elliptic Curve Cryptography with No Public Point. American Journal of Applied Sciences, 2(8), 1232-1235. https://doi.org/10.3844/ajassp.2005.1232.1235

  • 3,363 Views
  • 3,594 Downloads
  • 8 Citations

Download

Keywords

  • Elliptic curve
  • key exchange
  • man-in-middle
  • finite field