Compare Authentication Algorithms for Mobile Systems in Order to Introduce the Successful Characteristics of these Algorithms against Attacks
Hits: 3903
- Research areas:
- Year:
- 2014
- Type of Publication:
- Article
- Keywords:
- e-Commerce, Mobile Devices, Mutual Authentication, Security, Session Key Agreement
- Authors:
- Shahriar Mohammadi; Hakimeh Ameri
- Journal:
- IJAIM
- Volume:
- 2
- Number:
- 4
- Pages:
- 131-140
- Month:
- January
- Abstract:
- Nowadays use of Ecommerce with mobile devices through the special capabilities, such as mobility and widely used become more popular. The security of transactions in these devices is a great challenge due to limited computing power and relatively weak processors. Mutual authentication and session key agreement can be very influential in term of security. Algorithms introduced in the 1990s had major drawbacks. In the 2000s, a new algorithm based on hash functions were introduced, which had a small computational load, but not a high security and mutual authentication cannot fully support. Algorithms introduced from 2010 onwards due to a combination of hash functions Salt and Nonce are safer. This paper examines the success of the algorithms introduced in this field since 2004 deals.
Full text: IJAIM_220_Final.pdf