Overview of Elliptic Curve Cryptography on Mobile Devices
نویسنده
چکیده
As mobile devices become smaller and more prevalent in daily life, the need for a computationally cheap, but still secure, cryptosystem rises. Elliptic curve cryptography (ECC) allows for much smaller key sizes: a 163-bit key in ECC has equivalent strength to a 1024-bit key in RSA. Additionally, unlike RSA and other cryptosystems based on the discrete log problem, the best solution for ECC takes exponential time. The algorithm, based on one-way operation of adding and doubling within the field, is faster and more energy efficient than conventional cryptosystems. The combination of security and smaller computational demands is ideal for highly mobile, resource-starved environments. The mobile platform also offers a unique method for developing the seed values for ECC parameters.
منابع مشابه
The new protocol blind digital signature based on the discrete logarithm problem on elliptic curve
In recent years it has been trying that with regard to the question of computational complexity of discrete logarithm more strength and less in the elliptic curve than other hard issues, applications such as elliptic curve cryptography, a blind digital signature method, other methods such as encryption replacement DLP. In this paper, a new blind digital signature scheme based on elliptic curve...
متن کاملPerformance Based Comparison Study of RSA and Elliptic Curve Cryptography
Network is a collection of interconnected nodes which are spread over a large region. A node can be any device such as personal computer, mobile phone, tablet, WAP devices, pager, etc. Data is transmitted over channel of this network, which is prone to security threats such as loss of confidentiality, loss of integrity, fabrication attacks, etc. So, there is a need to secure this data transmiss...
متن کاملEfficient elliptic curve cryptosystems
Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...
متن کاملElliptic Curve Cryptography in Securing Networks by Mobile Authentication
This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices. It uses an Extended Password Key Exchange Protocols [2] and elliptic-curve-cryptosystem based trust delegation mechanism to generate a delegation pass code for mobile station authentication, and it can effectively defend all known attacks to mobile networks including the denial-of-service attac...
متن کاملAn Analysis of ZVP-Attack on ECC Cryptosystems
Elliptic curve cryptography (ECC) is an efficient public cryptosystem with a short key size. For this reason it is suitable for implementing on memory-constraint devices such as smart cards, mobile devices, etc. However, these devices leak information about their private key through side channels (power consumption, electromagnetic radiation, timing etc) during cryptographic processing. In this...
متن کامل