A Comparison Study on Key Exchange-Authentication protocol

  • Mokhtarnameh R
  • Muthuvelu N
  • Ho S
  • et al.
N/ACitations
Citations of this article
13Readers
Mendeley users who have this article in their library.

Abstract

A key exchange protocol enables two parties to share a common key for encrypting a large amount of data. Authentication is an essential requirement prior to the key exchange process in order to prevent man-in-the-middle attack. It is important to understand the capabilities and performance of the existing key exchange protocols before employing the protocols in our applications. In this paper, we compare Secure Socket Layer, Secure Shell, and Identity-based key exchange protocols by quantifying the performance, complexity, and level of security of each protocol. Detailed experiments and observations are conducted to examine the protocols in terms of disk usage, computation time, and data transmission time. The analysis shows that the identity-based key exchange maintains similar security level as the other protocols, while conveying better performance.

Cite

CITATION STYLE

APA

Mokhtarnameh, R., Muthuvelu, N., Ho, S. B., & Chai, I. (2010). A Comparison Study on Key Exchange-Authentication protocol. International Journal of Computer Applications, 7(5), 5–11. https://doi.org/10.5120/1161-1459

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free