The Overview of Elliptic Curve Cryptography (ECC)
نویسندگان
چکیده
Abstract Elliptic Curve Cryptography (ECC) is one of the strongest and most efficient cryptographic techniques in modern cryptography. This paper gives following introduction: The introduction cryptography’s development; elliptic curve; principle ECC; horizontal comparison between ECC other types cryptography; breakthrough applications by using a method literature review. study’s findings indicate that this factor responsible for rapid historical development cryptography, from classical password to leap (ECC), as important cryptographies, stronger than cryptographies both terms security strength, because it uses an curve construct and, at same time, mathematical operations encrypt generate keys. At cryptography can continue improve speed intensity with improvement accelerators, scalar multiplication, order operation. ECDSA SM2 are very efficient, which further illustrates importance
منابع مشابه
WM-ECC: an Elliptic Curve Cryptography Suite on Sensor Motes
While symmetric-key schemes, which have been investigated extensively for sensor network security, can fulfill many security requirements, public-key schemes are more flexible, and provide a clean interface for security components. In contradiction of the popular belief that public key scheme is not practical for sensor networks, this technical report describes the ECC (Elliptic Curve Crytograp...
متن کاملElliptic Curve Cryptography (ECC) based Relational Database Watermarking
Database Watermarking methods are used for copyright protection of relational database. Many techniques have been developed for watermarking multimedia digital assets like audio, video, text, images etc. But these methods are usually not applicable with numerical database, because to insert a watermark into a data, small error is created in data, called mark. An error in relational data is usua...
متن کاملAES-CCM Elliptic Curve Cryptography (ECC) Cipher Suites for TLS
This memo describes the use of the Advanced Encryption Standard (AES) in the Counter and CBC-MAC Mode (CCM) of operation within Transport Layer Security (TLS) to provide confidentiality and data-origin authentication. The AES-CCM algorithm is amenable to compact implementations, making it suitable for constrained environments, while at the same time providing a high level of security. The ciphe...
متن کاملElliptic Curve Cryptography based Threshold Cryptography (ECC-TC) Implementation for MANETs
California State University, East Bay, Hayward, CA, USA Summary A Mobile Ad hoc Network (MANET) consists of multiple wireless mobile devices that form a network on the fly to allow communication with each other without any infrastructure. Due to its nature, providing security in this network is challenging. Threshold Cryptography (TC) provides a promise of securing this network. In this paper, ...
متن کاملOverview of Elliptic Curve Cryptography on Mobile Devices
As mobile devices become smaller and more prevalent in daily life, the need for a computationally cheap, but still secure, cryptosystem rises. Elliptic curve cryptography (ECC) allows for much smaller key sizes: a 163-bit key in ECC has equivalent strength to a 1024-bit key in RSA. Additionally, unlike RSA and other cryptosystems based on the discrete log problem, the best solution for ECC take...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of physics
سال: 2022
ISSN: ['0022-3700', '1747-3721', '0368-3508', '1747-3713']
DOI: https://doi.org/10.1088/1742-6596/2386/1/012019