On Assurance of Information Security using Elliptic Curves Cryptosystems
نویسندگان
چکیده
منابع مشابه
Information Security on Elliptic Curves
The aim of this paper is to provide an overview for the research that has been done so far on elliptic curves cryptography role in information security area. The elliptic curves cryptosystem is the newest public-key cryptographic system and represents a mathematically richer procedure then the traditional cryptosystem based on public-key, like RSA, Diffie-Hellman, ElGamal and Digital Signature ...
متن کاملEfficient elliptic curve cryptosystems
Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...
متن کاملAnalysis of ECIES and Other Cryptosystems Based on Elliptic Curves
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. Regarding the encryption procedure, the schemes currently used are known as hybrid cryptosystems, as they use both symmetric and asymmetric techniques. Among those hybrid cryptosystems based on ECC, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the b...
متن کاملInformation Assurance and Security
Information assurance contains all the elements of information security (confidentiality) but also includes elements of availability, and integrity. Information assurance provides a view of information protection that includes defensive measures in all three states — processing, storage, and transmission. To defend information and data there are three fundamental countermeasure categories: 1. t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Internet Technology and Secured Transaction
سال: 2012
ISSN: 2046-3723
DOI: 10.20533/jitst.2046.3723.2012.0003