Table 7 The bit lengths of the parameters used in the communication cost comparison.

From: Two secure authentication protocols for mitigating vulnerabilities in IoD

Parameter

Bit length (Bits)

Timestamp

32

Identity

160

Random Numbers

128

Hash Function

160

Fuzzy Extractor Output

128

Elliptic Curve Point

320

Chaotic Map Output

256

ECC Private Key

160

ECC Public Key

320

Challenge for PUF

160

Output of PUF

160

Symmetric Encryption/Decryption

128