IKE and IKEv2 Authentication Using the Elliptic Curve Digital Signature Algorithm (ECDSA)
نویسندگان
چکیده
This document describes how the Elliptic Curve Digital Signature Algorithm (ECDSA) may be used as the authentication method within the Internet Key Exchange (IKE) and Internet Key Exchange version 2 (IKEv2) protocols. ECDSA may provide benefits including computational efficiency, small signature sizes, and minimal bandwidth compared to other available digital signature methods. This document adds ECDSA capability to IKE and IKEv2 without introducing any changes to existing IKE operation.
منابع مشابه
Using the Elliptic Curve Signature Algorithm (ECDSA) for XML Digital Signatures
This document specifies how to use Elliptic Curve Digital Signature Algorithm (ECDSA) with XML Signatures. The mechanism specified provides integrity, message authentication, and/or signer authentication services for data of any type, whether located within the XML that includes the signature or included by reference. Blake-Wilson, et al. Informational [Page 1] RFC 4050 ECDSA for XML Digital Si...
متن کاملGoldbach's Conjecture on ECDSA Protocols
In this paper, an algorithm on Goldbach’s conjecture is newly defined for computing a large even number as a sum of two primes or a sum of prime and composite. Using the conjecture, an ECDSA (Elliptic Curve Digital Signature Algorithm) protocol is newly proposed for authentication. The protocol describes the process of key generation, signature generation and signature verification as well as s...
متن کاملRFC 4050 ECDSA for XML Digital
This document specifies how to use Elliptic Curve Digital Signature Algorithm (ECDSA) with XML Signatures. The mechanism specified provides integrity, message authentication, and/or signer authentication services for data of any type, whether located within the XML that includes the signature or included by reference. Blake-Wilson, et al. Informational [Page 1] RFC 4050 ECDSA for XML Digital Si...
متن کاملECDSA - Application and Implementation Failures
Elliptic Curve Cryptography (ECC) is the newest member of public-key algorithms with practical relevance. It is based on the algebraic structure of elliptic curves over finite fields. Compared to RSA and Discrete Logarithm (DL) schemes, in many cases ECC has performance advantages with respect to fewer computations, and bandwidth advantages due to shorter signatures and keys. In addition, ECC p...
متن کاملHigh-speed implementation of an ECC-based wireless authentication protocol on an ARM microprocessor - Communications, IEE Proceedings-
The results of the implementation of elliptic curve cryptography (ECC) over the field G@) on an 80MHz, 32-bit ARM microprocessor are presented. A practical software library has been produced which supports variable length implementation of the elliptic curve digital signature algorithm (ECDSA). The ECDSA and a recently proposed ECC-based wireless authentication protocol are implemented using th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- RFC
دوره 4754 شماره
صفحات -
تاریخ انتشار 2007