Affiliation:
1. ScaleDB Inc., USA
2. Girne American University, Cyprus
3. Sulaimani Polytechnic University, Iraq
Abstract
Security is utilized to keep the information safe. Online resources, e-commerce, internet banking and a lot of similar services are protected by use of well-known protocols such as Secure Socket Layer (SSL). This protocol makes use of the RSA key exchange protocol for authentication. New innovations and boost ups in the computational power of supercomputers today makes it quite easier than before to break through RSA and consequently decrypt the payload transferred over SSL. In this research demonstrates the use of SSL; how to utilize it in the best shape? We also discuss reasons of why we need to improve its strength. The proposed solution is to replace the RSA key exchange mechanism utilized in SSL with Elliptic Curve Cryptography (ECC).
Reference37 articles.
1. Allardyce, J., & Goyal, N. (2004). Elliptic Curve Cryptography. Texas A&M University.
2. Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis
3. Low Voltage Fault Attacks on the RSA Cryptosystem
4. Implementation of Elliptic Curve Cryptography in ‘C’.;K.Bhardwaj;International Journal on Emerging Technologies,2012
5. Boneh, D. (1999). Twenty Years of Attacks on the RSA Cryptosystem. American Mathematical Society (AMS).
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献