Академический Документы
Профессиональный Документы
Культура Документы
3.
communication
for
1.
2.
INTRODUCTION
1.
2.
3.
4.
5.
6.
LITERATURE REVIEW
3.
4.
A. Secure-TCP [3]:
However above problems were thoroughly
addressed by Toshiyuki Tsutsumi, Suguru
Yamaguchi in their paper Secure-TCP [12] but they
used Symmetric Key Block Cipher DES which is
outdated and inefficient. The paper proposed a
method in which the reserved flag bits in TCP header
are used and additional options which made the interoperability between Secure-TCP and current TCP
isnt well established and difficult and also overhead
of key negotiation and establishment is high in this
model.
B. IP-Sec [4]:
5.
IV.
2.
3.
4.
5.
2.
3.
Size
1
2
Option Data
ECC Flags
Bits size to be used in ECC
B. Key Exchange:
For key exchange discrete logarithmic problem
based EC-Diffie Hellman Key Exchange [9][10]. Client
computes a, b and p and thus decides the Elliptic
Curve to be used for secure TCP communication.
cQ
sQ
Check that Q O
G belongs to the E(Fp) curve
nQ = O
VI.
SECURITY ANALYSIS ON EC
CURVES[12][13][14]
VII.
2.
3.
4.
5.
2.
CONCLUSIONS
2.
3.
FUTURE WORKS