Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Active learning in E-learning: a case study to teach elliptic curve cryptosystem, its fast computational algorithms and authentication protocols for resource constraint RFID-sensor integrated mobile devices

Active learning in E-learning: a case study to teach elliptic curve cryptosystem, its fast computational algorithms and authentication protocols for resource constraint RFID-sensor integrated mobile devices

For access to this article, please select a purchase option:

Buy chapter PDF
$16.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
E-learning Methodologies: Fundamentals, technologies and applications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Elliptic curve cryptosystem (ECC) is a public key-based cryptosystem. All algorithms in ECC are based on point addition and point doubling arithmetic operations. This explains the active learning process and its usages in teaching elliptic curve cryptography-based contents to undergraduate and graduate students. Here, the emphasis is given to mathematical contents that make the cryptography concepts easy to understand. Mathematical concepts mainly include point addition and doubling with examples. Further, technical observations are made while teaching these contents. For example, to reduce computation cost, there is a need for fast computations method in point addition and doubling operations. Thus, the fast computational algorithms are important to understand with examples for reducing the cost in ECC arithmetic operations. These algorithms reduce the number of steps required to perform cryptography operations by reducing compute addition and doubling operations. Group authentication is one of the major application domains of ECC. This work presents the ECC-based authentication protocols that provide authentication using encryption/decryption, digital signature, and other cryptography primitives. In observations, it is found that the proposed approach is much better quantitatively and quantitatively compared to traditional teaching.

Chapter Contents:

  • 13.1 Introduction
  • 13.2 Related work
  • 13.3 The methodology of active learning process
  • 13.4 Introduction to elliptic curve cryptography
  • 13.4.1 Elliptic curve operations
  • 13.4.1.1 Point addition
  • 13.4.1.2 Point doubling
  • 13.4.2 Fast point multiplication algorithms
  • 13.4.2.1 Double and add algorithm
  • 13.4.2.2 𝒲-Windowed algorithm
  • 13.4.2.3 Fixed-base doubling and addition method
  • 13.5 Elliptic curve cryptography (ECC)-based authentication protocols
  • 13.6 Experimental results
  • 13.7 Conclusion
  • References

Inspec keywords: digital signatures; digital arithmetic; computer aided instruction; telecommunication security; mobile computing; public key cryptography; cryptographic protocols; wireless sensor networks; teaching; radiofrequency identification

Other keywords: cryptography primitives; compute addition; doubling operations; computation cost; undergraduate students; mathematical contents; cryptography concepts; traditional teaching; cryptography operations; fast computational algorithms; ECC arithmetic operations; active learning process; elliptic curve cryptosystem; elliptic curve cryptography-based contents; public key-based cryptosystem; group authentication; resource constraint RFID-sensor; E-learning; point addition; fast computations method; mathematical concepts; ECC-based authentication protocols

Subjects: Wireless sensor networks; Computer-aided instruction; Data security; Protocols; Digital arithmetic methods; RFID systems; Cryptography; Education and training; Mobile radio systems

Preview this chapter:
Zoom in
Zoomout

Active learning in E-learning: a case study to teach elliptic curve cryptosystem, its fast computational algorithms and authentication protocols for resource constraint RFID-sensor integrated mobile devices, Page 1 of 2

| /docserver/preview/fulltext/books/pc/pbpc040e/PBPC040E_ch13-1.gif /docserver/preview/fulltext/books/pc/pbpc040e/PBPC040E_ch13-2.gif

Related content

content/books/10.1049/pbpc040e_ch13
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address