We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Simulation Analysis of Session Key Exchange Protocols based on Key Parameters

by Pranav Vyas, Bhushan Trivedi, Atul Patel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 1
Year of Publication: 2013
Authors: Pranav Vyas, Bhushan Trivedi, Atul Patel
10.5120/11547-6820

Pranav Vyas, Bhushan Trivedi, Atul Patel . Simulation Analysis of Session Key Exchange Protocols based on Key Parameters. International Journal of Computer Applications. 68, 1 ( April 2013), 46-52. DOI=10.5120/11547-6820

@article{ 10.5120/11547-6820,
author = { Pranav Vyas, Bhushan Trivedi, Atul Patel },
title = { Simulation Analysis of Session Key Exchange Protocols based on Key Parameters },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 1 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 46-52 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number1/11547-6820/ },
doi = { 10.5120/11547-6820 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:26:42.421925+05:30
%A Pranav Vyas
%A Bhushan Trivedi
%A Atul Patel
%T Simulation Analysis of Session Key Exchange Protocols based on Key Parameters
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 1
%P 46-52
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

As the internet grows rapidly, role of security of information of users gain more importance than ever. Key exchange protocols are important in this regard. In this paper we evaluate performance of well known key exchange algorithms. In this paper we analyze their encryption speed and their power consumption on different platforms. We analyze algorithms on both traditional PC and mobile phones. Experiment result shows that protocols which are less computationally intensive and less power consuming but not very secure. We select the protocol which is most suitable for mobile computers.

References
  1. Diffie, W. , Oorschot, P. C. , & Wiener, M. J. (1992). "Authentication and authenticated key exchanges. Designs, Codes and Cryptography", 2(2), 107-125
  2. Blake-Wilson, S. , & Menezes, A. (1999). "Unknown key-share attacks on the station-to-station (STS) protocol". In Public Key Cryptography (pp. 634-634). Springer Berlin/Heidelberg
  3. Vyas, P. J. , & Trivedi, B. H. (2012). "Analysis of Key Exchange Protocols using Session Keys. " International Journal of Applied Information Systems.
  4. Vyas, P. , & Trivedi, B. (2012) "An Analysis Of Session Key Exchange Protocols. " International Journal of Engineering Research and Applications.
  5. Prasithsangaree, P. , & Krishnamurthy, P. (2003). "Analysis of energy consumption of RC4 and AES algorithms in wireless LANs". Global Telecommunications Conference.
  6. Elminaam, D. S. A. , Kader, H. M. A. , & Hadhoud, M. M. (2008). "Performance Evaluation of Symmetric Encryption Algorithms". IJCSNS International Journal of Computer Science and Network Security.
  7. Nadeem, A. , & Javed, M. Y. (2005). "A performance comparison of data encryption algorithms". In Information and communication technologies.
  8. Wander, A. S. , Gura, N. , Eberle, H. , Gupta, V. , & Shantz, S. C. (2005). "Energy analysis of public-key cryptography for wireless sensor networks". Third IEEE International Conference on Pervasive Computing and Communications.
  9. Zhu, J. , & Wang, X. (2011). "Model and Protocol for Energy-Efficient Routing over Mobile Ad Hoc Networks". IEEE Transactions on Mobile Computing.
  10. Manfredi, V. , Hancock, R. , & Kurose, J. (2009) "Evaluating the Control Overhead of Routing Protocols in Dynamic Ad Hoc Networks," Annual Conference of the International Technology Alliance.
  11. Viredaz, M. A. , & Wallach, D. A. (2001). "Power evaluation of a handheld computer: a case study". Compaq Western Research Lab, Tech. Rep, 1.
Index Terms

Computer Science
Information Sciences

Keywords

Key Exchange Protocols Performance Evaluation Control Overhead Power Consumption