Elliptic Curve Cryptography for Smart Phone OS

被引:0
|
作者
Desai, Sharmishta [1 ]
Bedi, R. K. [2 ]
Jagdale, B. N. [1 ]
Wadhai, V. M. [3 ]
机构
[1] MITCOE, IT Dept, Pune, Maharashtra, India
[2] MITCOE, Dept Comp, Pune, Maharashtra, India
[3] MITCOE, Pune, Maharashtra, India
关键词
ECC; RSA; DSA; ECDH; Cryptography;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile Technology is growing rapidly. Usages of smart phones are increased for critical financial applications. This leads to many security issues as well. Implementing security features into such critical financial applications can minimize the transaction risk .Traditionally RSA, DH public key cryptography algorithms has been used. However ECC has proven results for smaller key size requirement which is more useful for resource constrained devices that take less memory, less bandwidth and less power consumption. In our paper, we have proved ECC's strength with respect to RSA. This paper contributes on implementation of ECC over GF (2(m)) for smart phone OS which is used in mobile devices. Our experiment shows that ECC takes less computation time efforts than RSA when key size becomes greater than 512 bits which is advantageous on mobile or smart phones. In our implementation memory consumption is reduced as we are computing elliptic curve points dynamically when we need it and cipher text size is also reduced. We are avoiding cryptanalytic attack by eliminating same cipher text pattern generation. An experiment study is conducted on android OS which is one of the popular smart phone OS to show the effectiveness of proposed algorithm and also addressed cryptanalytic attack.
引用
收藏
页码:397 / +
页数:2
相关论文
共 50 条
  • [1] Elliptic curve cryptography on a Palm OS device
    Weimerskirch, A
    Paar, C
    Shantz, SC
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2001, 2119 : 502 - 513
  • [2] Elliptic curve cryptography on smart cards
    de-Miguel-de-Santos, M
    Sanchez-Avila, C
    Sanchez-Reillo, R
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2004, : 162 - 167
  • [3] Smart Card Fault Attacks on Elliptic Curve Cryptography
    Ling, Jie
    King, Brian
    2013 IEEE 56TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2013, : 1255 - 1258
  • [4] Elliptic curve cryptography on smart cards without coprocessors
    Woodbury, AD
    Bailey, DV
    Paar, C
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, 2000, 52 : 71 - 92
  • [5] Smart Grid Communication Under Elliptic Curve Cryptography
    Prabakaran, B.
    Sumithira, T. R.
    Nagaraj, V.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (02): : 2333 - 2347
  • [6] Implementation of an elliptic curve cryptography hardware accelerator for smart cards
    Lee, S
    Lee, Y
    Kim, Y
    Park, Y
    Jun, S
    Chung, K
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 607 - 610
  • [7] The state of elliptic curve cryptography
    Koblitz, N
    Menezes, A
    Vanstone, S
    DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 173 - 193
  • [8] Elliptic Curve Cryptography on PocketPCs
    Edoh, Kossi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (03): : 23 - 33
  • [9] Elliptic Curve Cryptography in Practice
    Bos, Joppe W.
    Halderman, J. Alex
    Heninger, Nadia
    Moore, Jonathan
    Naehrig, Michael
    Wustrow, Eric
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 : 157 - 175
  • [10] The State of Elliptic Curve Cryptography
    Neal Koblitz
    Alfred Menezes
    Scott Vanstone
    Designs, Codes and Cryptography, 2000, 19 : 173 - 193