Table 7 The bit lengths of the parameters used in the communication cost comparison.
From: Two secure authentication protocols for mitigating vulnerabilities in IoD
Parameter | Bit length (Bits) |
|---|---|
Timestamp | 32 |
Identity | 160 |
Random Numbers | 128 |
Hash Function | 160 |
Fuzzy Extractor Output | 128 |
Elliptic Curve Point | 320 |
Chaotic Map Output | 256 |
ECC Private Key | 160 |
ECC Public Key | 320 |
Challenge for PUF | 160 |
Output of PUF | 160 |
Symmetric Encryption/Decryption | 128 |