Evaluation of Security Level of Cryptography HDEF - ECDH
نویسندگان
چکیده
منابع مشابه
Curve41417: Karatsuba Revisited
This paper introduces constant-time ARM Cortex-A8 ECDH software that (1) is faster than the fastest ECDH option in the latest version of OpenSSL but (2) achieves a security level above 2 using a prime above 2. For comparison, this OpenSSL ECDH option is not constant-time and has a security level of only 2. The new speeds are achieved in a quite different way from typical prime-field ECC softwar...
متن کاملOn Energy Efficiency of Elliptic Curve Cryptography for Wireless Sensor Networks
Energy efficiency is a primary concern in Wireless Sensor Networks (WSN). This is due to the fact that WSNs are powered battery, and hence the life of WSNs becomes limited by the battery life. Efforts to replace depleted batteries are not feasible if WSNs are often deployed with thousands of sensor nodes, possibly in inaccessible, hostile, hazardous, or remote territories. Though WSNs are energ...
متن کاملElliptic Curve Diffie-Hellman Protocol Implementation Using Picoblaze
Compared to other public key cryptography counterparts like Diffie-Hellman (DH) and Rivest Shamir Adleman (RSA), Elliptic Curve Cryptography (ECC) is known to provide equivalent level of security with lower number of bits used. Reduced bit usage implies less power and logic area are required to implement this cryptographic scheme. This is particularly important in wireless networks, where a hig...
متن کاملEfficient modified elliptic curve diffie-hellman algorithm for VoIP networks
Security in Voice over Internet Protocol (VoIP) network has turned to be the most challenging issue in recent years. VoIP packets are easy to eavesdrop on by hackers due to the use of Diffie-Hellman (DH) algorithm for single common key exchange between two end-users. As a result the confidentiality of voice data turns to be a challenging issue. There is a need for strong key management algorith...
متن کاملElliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)
Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document describes new key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol. In particular, it specifies the use of Elliptic Curve Diffie-Hellman (E...
متن کامل