ECC over RSA for Asymmetric Encryption: A Review

نویسندگان

  • Kamlesh Gupta
  • Sanjay Silakari
  • Victor Miller
چکیده

Cryptography is used to transmit the data securely in open network. This paper gives the survey of Elliptic Curve Cryptosystem (ECC) used in many applications. ECC is a when compared to RSA and discrete logarithm systems, is a better option for the future. For this reason ECC is such an excellent choice for doing asymmetric cryptography in portable devices right now. The smaller ECC keys it turn makes the cryptographic operations that must be performed by the communicating devices to be embedded into considerably smaller hardware, so that software applications may complete cryptographic operations with fewer processor cycles, and operations can be performed much faster, while still retaining equivalent security. This means, in turn, reduced power consumption, less space consumed on the printed circuit board, and software applications that run more rapidly make lower memory demands. In brief, for communication using smaller devices and asymmetric cryptosystem we need ECC. Key words— Encryption, RSA and ECC.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Impact of Asymmetric Encryption Algorithms in a VANET

Corresponding Author: Edward David Moreno DCOMP/UFS, Federal University of Sergipe, Aracaju/ SE, Brazil Email: [email protected] Abstract: This paper describes the impact of using asymmetric encryption algorithms, with emphasis on RSA, ECC and Multivariate Quadratic Quasigroup (MQQ) algorithms, in a scenario of Vehicular Ad hoc Network (VANET). In the research we used the simulator NS-3 with s...

متن کامل

SECURED ENCRYPTION - Concept and Challenge

This paper contains a complications related to access systems and their functionality. Several cryptographic algorithms were implemented using the public library Lib-Tom-Crypt and benchmarked on an ARM7-processor platform. The common coding schemes in use were ECC and RSA (asymmetric coding schemes), AES, 3DES and two fish (symmetric algorithms). The benchmark considered both code size and spee...

متن کامل

The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC

Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...

متن کامل

Multiplication Based Elliptic Curve Encryption Scheme with Optimized Scalar Multiplication (MECES)

Elliptic Curve Cryptography (ECC) fits well for an efficient and secure encryption scheme. It is efficient than the ubiquitous RSA based schemes because ECC utilizes smaller key sizes for equivalent security. This feature of ECC enables it to be applied to Wireless networks where there are constraints related to memory and computational power. The goal of this research is to develop an efficien...

متن کامل

1 Elliptic Curve Cryptosystem and its Applications

The goal of this research is to develop a basis for utilizing efficient encryption schemes in wireless communications and in devices with low computing power and resources. Elliptic Curve Cryptography (ECC) fits well for an efficient and secure encryption scheme. It is more efficient than the ubiquitous RSA based schemes because ECC utilizes smaller key sizes for equivalent security. A comparat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011