The Overview of Elliptic Curve Cryptography (ECC)

نویسندگان

چکیده

Abstract Elliptic Curve Cryptography (ECC) is one of the strongest and most efficient cryptographic techniques in modern cryptography. This paper gives following introduction: The introduction cryptography’s development; elliptic curve; principle ECC; horizontal comparison between ECC other types cryptography; breakthrough applications by using a method literature review. study’s findings indicate that this factor responsible for rapid historical development cryptography, from classical password to leap (ECC), as important cryptographies, stronger than cryptographies both terms security strength, because it uses an curve construct and, at same time, mathematical operations encrypt generate keys. At cryptography can continue improve speed intensity with improvement accelerators, scalar multiplication, order operation. ECDSA SM2 are very efficient, which further illustrates importance

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes

While symmetric-key schemes, which have been investigated extensively for sensor network security, can fulfill many security requirements, public-key schemes are more flexible, and provide a clean interface for security components. In contradiction of the popular belief that public key scheme is not practical for sensor networks, this technical report describes the ECC (Elliptic Curve Crytograp...

متن کامل

Elliptic Curve Cryptography (ECC) based Relational Database Watermarking

Database Watermarking methods are used for copyright protection of relational database. Many techniques have been developed for watermarking multimedia digital assets like audio, video, text, images etc. But these methods are usually not applicable with numerical database, because to insert a watermark into a data, small error is created in data, called mark. An error in relational data is usua...

متن کامل

AES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS

This memo describes the use of the Advanced Encryption Standard (AES) in the Counter and CBC-MAC Mode (CCM) of operation within Transport Layer Security (TLS) to provide confidentiality and data-origin authentication. The AES-CCM algorithm is amenable to compact implementations, making it suitable for constrained environments, while at the same time providing a high level of security. The ciphe...

متن کامل

Elliptic Curve Cryptography based Threshold Cryptography (ECC-TC) Implementation for MANETs

California State University, East Bay, Hayward, CA, USA Summary A Mobile Ad hoc Network (MANET) consists of multiple wireless mobile devices that form a network on the fly to allow communication with each other without any infrastructure. Due to its nature, providing security in this network is challenging. Threshold Cryptography (TC) provides a promise of securing this network. In this paper, ...

متن کامل

Overview of Elliptic Curve Cryptography on Mobile Devices

As mobile devices become smaller and more prevalent in daily life, the need for a computationally cheap, but still secure, cryptosystem rises. Elliptic curve cryptography (ECC) allows for much smaller key sizes: a 163-bit key in ECC has equivalent strength to a 1024-bit key in RSA. Additionally, unlike RSA and other cryptosystems based on the discrete log problem, the best solution for ECC take...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of physics

سال: 2022

ISSN: ['0022-3700', '1747-3721', '0368-3508', '1747-3713']

DOI: https://doi.org/10.1088/1742-6596/2386/1/012019