Application of Elliptic Curves Cryptography In Wireless Communications Security
نویسندگان
چکیده
This paper provides an overview of elliptic curves and their use in cryptography. The focus of the paper is on the performance advantages obtained in the wireless environments by using elliptic curve cryptography instead of traditional cryptosystems such as RSA. Specific applications to secure messaging and identity-based encryption are also discussed. keywords: elliptic curves, wireless, Digital, cryptography.
منابع مشابه
Efficient elliptic curve cryptosystems
Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملA secure multicast protocol based on pairings on elliptic curves
The aim of this paper is to introduce a protocol for multicast distribution of secrets providing perfect forward and backward secrecy. The protocol is based on pairings on elliptic curves and has low cost communications and key storage. It is shown how this protocol improves some alternatives existing for real time communications. Keywords—Information security, multicast communications, ellipti...
متن کاملOn the Use of Optimum Curves in Elliptic Curve Cryptography for Wireless Sensor Networks
Providing security in Wireless Sensor Networks (WSNs) is a considerable challenge due to the concomitant limitations in processing time, power, area and energy consumption in sensor nodes and the nature of wireless links. A variety of cryptographic methods are available for security establishment. Among them, Elliptic Curve Cryptography (ECC) is the best candidate to accomplish this challenge b...
متن کاملIsogenies of Elliptic Curves: A Computational Approach
The study of elliptic curves has historically been a subject of almost purely mathematical interest. However, Koblitz and Miller independently showed that elliptic curves can be used to implement cryptographic primitives [13], [17]. This thrust elliptic curves from the abstract realm of pure mathematics to the preeminently applied world of communications security. Public key cryptography in gen...
متن کامل