References in periodicals archive ?
For MSP430, we used our lightweight implementation of elliptic curve primitives and ECDH algorithm.
(ii) ECDSA is used to prevent man-in-the-middle attack that ECDH suffers from, to realize the mutual authentication.
At the end of the authentication scheme there is a key establishment part which extends the security strength of the standard ECDH key agreement by using mutually authenticated keying materials (i.e., [Cert.sub.U] and s).
FA stores the [ID.sub.HA] and aP received from MU for further communication, selects a random number b, and computes the bP value on E using ECDH. FA then sends [ID.sub.FA], A, [c.sub.1], [c.sub.2], aP, bP, and [N'.sub.MU] to HA.
Figure 4 represents the simulation results for ECDH based key management scheme [6].
The Communication and computation of tree based ECDH depends on trees height, balance of key tree, location of joining tree and leaving nodes.
(Tomado de [8] ECC-160 RSA-1024 ECC-224 RSA-2048 Operaciones/seg 271.3 114.3 195.5 17.8 Velocidad 2.4:1 2.4:1 11:1 11:1 (1) ECDH y ECDSA son variantes de los algoritmos de intercambio de claves Diffie Hellman y DSA incorporando grupos de curvas elipticas.
[10] Yoon EJ, Yoo KY., "Cryptanalysis of DS-SIP authentication scheme using ECDH [C]," in Proc.
propose a session key establishment scheme for clustered sensor networks that is based on elliptic curve Diffie-Hellman (ECDH) key exchange and hash chain.
The ATECC508A provides protected key storage as well as hardware acceleration of Elliptic Curve Cryptography (ECC) cipher suites including mutual authentication (ECDSA) and Diffie-Hellman key agreement (ECDH).