Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017 (2017), Article ID 1467614, 7 pages
https://doi.org/10.1155/2017/1467614
Research Article

A Comparative Evaluation of Algorithms in the Implementation of an Ultra-Secure Router-to-Router Key Exchange System

Telecommunications Engineering Program, School of Electrical and Computer Engineering, University of Oklahoma, Tulsa, OK 74135, USA

Correspondence should be addressed to Nishaal J. Parmar; ude.uo@ramrap.laahsin

Received 1 September 2016; Accepted 26 October 2016; Published 12 January 2017

Academic Editor: Vincente Martin

Copyright © 2017 Nishaal J. Parmar and Pramode K. Verma. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. W. Stallings, Cryptography and Network Security: Principles and Practice, Prentice Hall, 6th Edition, 2014, 2011, 2006, pp. 47-48, pp. 264–278, pp. 130–173, pp. 303-304.
  2. C. H. Bennet and G. Brassard, “Quantum cryptography: public key distribution and coin tossing,” in Proceedings of the IEEE International Conference on Computer System and Signal Processing, Bangalore, India, December 1984.
  3. V. Scarani, A. Acín, G. Ribordy, and N. Gisin, “Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations,” Physical Review Letters, vol. 92, no. 5, Article ID 057901, 4 pages, 2004. View at Publisher · View at Google Scholar · View at Scopus
  4. C. H. Bennett, “Quantum cryptography using any two nonorthogonal states,” Physical Review Letters, vol. 68, no. 21, pp. 3121–3124, 1992. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  5. S. Mandal, G. Macdonald, M. El Rifai et al., “Implementation of secure quantum protocol using multiple photons for communication,” https://arxiv.org/abs/1208.6198.
  6. Z. Zhao, T. Yang, Y.-A. Chen, A.-N. Zhang, and J.-W. Pan, “Experimental realization of entanglement concentration and a quantum repeater,” Physical Review Letters, vol. 90, no. 20, Article ID 207901, 2003. View at Google Scholar · View at Scopus
  7. J. Menn, “Key internet operator VeriSign hit by hackers,” Reuters, 2012. View at Google Scholar
  8. “The Case for Elliptic Curve Cryptography,” National Security Agency—Central Security Service, Jan 2009, http://web.archive.org/web/20150627183730/https://www.nsa.gov/business/programs/elliptic_curve.shtml.
  9. P. K. Verma and M. El Rifai, “An Ultra-secure Router-to-router Spontaneous Key Exchange System,” International Journal of Computer Network and Information Security, vol. 7, no. 7, pp. 1–9, 2015. View at Publisher · View at Google Scholar
  10. D. M. Gordon, “Discrete logarithms in GF(P) using the number field sieve,” SIAM Journal on Discrete Mathematics, vol. 6, no. 1, pp. 124–138, 1993. View at Publisher · View at Google Scholar · View at MathSciNet
  11. P. W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer,” SIAM Review, vol. 41, no. 2, pp. 303–332, 1999. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  12. D. Coppersmith, “Modifications to the number field sieve,” Journal of Cryptology, vol. 6, no. 3, pp. 169–180, 1993. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  13. A. Bogdanov, D. Khovratovich, and C. Rechberger, “Biclique cryptanalysis of the full AES,” in Advances in Cryptology—ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4–8, 2011. Proceedings, vol. 7073 of Lecture Notes in Computer Science, pp. 344–371, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar
  14. J. W. Bos, M. E. Kaihara, T. Kleinjung, A. K. Lenstra, and P. L. Montgomery, “On the security of 1024-bit RSA and 160-bit elliptic curve cryptography,” Tech. Rep. EPFL-REPORT-164549, 2009. View at Google Scholar
  15. M. Savari, M. Montazerolzohour, and Y. E. Thiam, “Comparison of ECC and RSA algorithm in multipurpose smart card application,” in Proceedings of the International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec '12), IEEE, 2012.
  16. K. Maletsky, “RSA vs ECC comparison for embedded systems,” Atmel, 2015, http://www.atmel.com/images/atmel-8951-cryptoauth-rsa-ecc-comparison-embedded-systems-whitepaper.pdf.