1,131
Views
0
CrossRef citations to date
0
Altmetric
Articles

Lightweight authentication scheme based on Elliptic Curve El Gamal

, , &
Pages 231-261 | Received 26 Mar 2023, Accepted 04 Nov 2023, Published online: 14 Nov 2023

Figures & data

Figure 1. Taxonomy of elliptic curves (Lara-Nino et al., Citation2018).

Figure 1. Taxonomy of elliptic curves (Lara-Nino et al., Citation2018).

Figure 2. Operations in elliptic curve cryptography divided by four levels.

Figure 2. Operations in elliptic curve cryptography divided by four levels.

Figure 3. Proposed model for generating encoding parameters.

Figure 3. Proposed model for generating encoding parameters.

Figure 4. ECEG based on authentication scheme using encoding parameters.

Figure 4. ECEG based on authentication scheme using encoding parameters.

Table 1. ASCII-map table.

Figure 5. Implementation phases of enhanced ECEG.

Figure 5. Implementation phases of enhanced ECEG.

Figure 6. The results of analysing the proposed protocol using the SCYTHER tool.

Figure 6. The results of analysing the proposed protocol using the SCYTHER tool.

Table 2. Key size of RSA and ECC (Mahto & Yadav, Citation2017).

Figure 7. The time complexity comparison of RSA and enhanced ECEG algorithms with 8-bit input.

Figure 7. The time complexity comparison of RSA and enhanced ECEG algorithms with 8-bit input.

Figure 8. The time complexity comparison of RSA and enhanced ECEG algorithms with 64-bit input.

Figure 8. The time complexity comparison of RSA and enhanced ECEG algorithms with 64-bit input.

Figure 9. The time complexity comparison of RSA and enhanced ECEG algorithms with 64-bit input.

Figure 9. The time complexity comparison of RSA and enhanced ECEG algorithms with 64-bit input.

Table 3. Time complexity analysis of RSA and enhanced ECEG algorithms with 8-bit input (in seconds).

Table 4. Time complexity analysis of RSA and enhanced ECEG algorithms with 64-bit input (in seconds).

Table 5. Time complexity analysis of RSA and enhanced ECEG algorithms with 256-bit input (in seconds).

Figure 10. ECC (Mahto & Yadav, Citation2017) versus enhanced ECEG with 8 bit computation time.

Figure 10. ECC (Mahto & Yadav, Citation2017) versus enhanced ECEG with 8 bit computation time.

Figure 11. ECC (Mahto & Yadav, Citation2017) versus enhanced ECEG with 64-bit computation time.

Figure 11. ECC (Mahto & Yadav, Citation2017) versus enhanced ECEG with 64-bit computation time.

Figure 12. ECC (Mahto & Yadav, Citation2017) versus enhanced ECEG with 256-bit computation time.

Figure 12. ECC (Mahto & Yadav, Citation2017) versus enhanced ECEG with 256-bit computation time.

Table 6. Enhanced ECEG and ECC (Mahto & Yadav, Citation2017) with 8-, 64-, and 256-bit time complexity (in seconds).

Table 7. Time and space complexity of authentication.

Table 8. Comparison of space and time complexity.

Supplemental material

Lightweight Authentication Scheme Based on Elliptic Curve El Gamal v2 23 09 23.tex

Download Latex File (93.6 KB)