Tuesday 23rd of April 2024
 

Enhanced Authentication Protocol EAP-TTLS using encrypted ECDSA


Nazanin Bahrami, Mohamad Ebrahim Shiri and Morteza Salari Akhgar

The growing trend of wireless networks and risks associated with them has led to the development of authentication and application of stronger cryptographic methods to maintain a more robust security. This article examined and compared two types of developed authentication protocols to provide an alternative method using strong cryptographic methods. The common EAP-TTLS method uses RSA algorithm for encryption and SHA-1 hash algorithm. In this article, the new method called alternative EAP-TTLS method uses Elliptic Curve Digital Signature Algorithm (ECDSA) and the secure hash algorithm (SHA-256) to provide stronger security and higher efficiency. This alternative method and the mechanism used in it is fully explained and compared with the common EAP-TTLS method. Results obtained indicate that the alternative algorithm provides strong security, high speed, and more applicability with the same level of memory usage compared to the common EAP-TTLS.

Keywords: authentication, cryptography, ECDSA, SHA-256

Download Full-Text


ABOUT THE AUTHORS

Nazanin Bahrami
Nazanin Bahrami received her Master`s Degree from the department of computer Engineering at the Islamic Azad university of Kish International Branch in 2013. She is a member of Iranian society of computer. Her research interests are about the network security and intrusion detection systems.

Mohamad Ebrahim Shiri
Mohammad Ebrahim Shiri is an assistant professor in the department of computer sciences at Amirkabir University of Technology of Tehran, Iran. He received his Ph.D. from the department of computer sciences at the University of Montreal, Canada in 1999. His current research interests include artificial intelligence, multi-agent systems, intelligent tutoring systems and distributed systems.

Morteza Salari Akhgar
Morteza Salari Akhgar has a Master`s Degree in software engineering. He is a researcher and author of several books on computer security.


IJCSI Published Papers Indexed By:

 

 

 

 
+++
About IJCSI

IJCSI is a refereed open access international journal for scientific papers dealing in all areas of computer science research...

Learn more »
Join Us
FAQs

Read the most frequently asked questions about IJCSI.

Frequently Asked Questions (FAQs) »
Get in touch

Phone: +230 911 5482
Email: info@ijcsi.org

More contact details »