Jasmine Hau
2003-12-04 17:28:32 UTC
Hi, I am a student doing my research on ECC-based mutual
authentication and key agreement protocol targeted on smart card.
After the mutual authentication and key agreement protocol, a
session key will be established to encrypt the message sending between
the smart card and the server using symmetric cryptography such as AES
or 3-DES.
As we know,the ECC has the bandwidth savings, faster
implementations, lower power requirements and smaller hardware
processors. I wish to ask is it practical if we implement the ECC in
encryption and decryption instead of using symmetric key cryptography.
Is there any weaknessor vulnerable to attack??? Does the ECC just
suitable to generate the digital signature and encrypt the secret
session key only???
I will be very thankful if you can answer my question. Thank you
very much.
authentication and key agreement protocol targeted on smart card.
After the mutual authentication and key agreement protocol, a
session key will be established to encrypt the message sending between
the smart card and the server using symmetric cryptography such as AES
or 3-DES.
As we know,the ECC has the bandwidth savings, faster
implementations, lower power requirements and smaller hardware
processors. I wish to ask is it practical if we implement the ECC in
encryption and decryption instead of using symmetric key cryptography.
Is there any weaknessor vulnerable to attack??? Does the ECC just
suitable to generate the digital signature and encrypt the secret
session key only???
I will be very thankful if you can answer my question. Thank you
very much.