Authentication of Embedded Devices by Unknown

Authentication of Embedded Devices by Unknown

Author:Unknown
Language: eng
Format: epub
ISBN: 9783030607692
Publisher: Springer International Publishing


2.

Domain parameters and s ′ are stored in the server database corresponding with the device identifier (ID) and MAC address.

4.4.2 Verification Stage

In the verification stage, the following ten steps, depicted in Fig. 4.8, are carried out:Step 1. The server generates private key s randomly to use in ECDH, where s ← {1, …, n − 1}, and calculates public key such that S = sG (S is also regarded as a message for ECDSA).

Step 2. The server signs S through ECDSA such that:(i).

e = Hash-One(S)



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.