International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 7 - Number 5 |
Year of Publication: 2010 |
Authors: Razieh Mokhtarnameh, Nithiapidary Muthuvelu, Sin Ban Ho, Ian Chai |
10.5120/1161-1459 |
Razieh Mokhtarnameh, Nithiapidary Muthuvelu, Sin Ban Ho, Ian Chai . Article:A Comparison Study on Key Exchange-Authentication protocol. International Journal of Computer Applications. 7, 5 ( September 2010), 5-11. DOI=10.5120/1161-1459
A key exchange protocol enables two parties to share a common key for encrypting a large amount of data. Authentication is an essential requirement prior to the key exchange process in order to prevent man-in-the-middle attack. It is important to understand the capabilities and performance of the existing key exchange protocols before employing the protocols in our applications. In this paper, we compare Secure Socket Layer, Secure Shell, and Identity-based key exchange protocols by quantifying the performance, complexity, and level of security of each protocol. Detailed experiments and observations are conducted to examine the protocols in terms of disk usage, computation time, and data transmission time. The analysis shows that the identity-based key exchange maintains similar security level as the other protocols, while conveying better performance.