Elliptic Curve Cryptography for Smart Phone OS

被引:0
|
作者
Desai, Sharmishta [1 ]
Bedi, R. K. [2 ]
Jagdale, B. N. [1 ]
Wadhai, V. M. [3 ]
机构
[1] MITCOE, IT Dept, Pune, Maharashtra, India
[2] MITCOE, Dept Comp, Pune, Maharashtra, India
[3] MITCOE, Pune, Maharashtra, India
关键词
ECC; RSA; DSA; ECDH; Cryptography;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile Technology is growing rapidly. Usages of smart phones are increased for critical financial applications. This leads to many security issues as well. Implementing security features into such critical financial applications can minimize the transaction risk .Traditionally RSA, DH public key cryptography algorithms has been used. However ECC has proven results for smaller key size requirement which is more useful for resource constrained devices that take less memory, less bandwidth and less power consumption. In our paper, we have proved ECC's strength with respect to RSA. This paper contributes on implementation of ECC over GF (2(m)) for smart phone OS which is used in mobile devices. Our experiment shows that ECC takes less computation time efforts than RSA when key size becomes greater than 512 bits which is advantageous on mobile or smart phones. In our implementation memory consumption is reduced as we are computing elliptic curve points dynamically when we need it and cipher text size is also reduced. We are avoiding cryptanalytic attack by eliminating same cipher text pattern generation. An experiment study is conducted on android OS which is one of the popular smart phone OS to show the effectiveness of proposed algorithm and also addressed cryptanalytic attack.
引用
收藏
页码:397 / +
页数:2
相关论文
共 50 条
  • [21] CREATING AN ELLIPTIC CURVE ARITHMETIC UNIT FOR USE IN ELLIPTIC CURVE CRYPTOGRAPHY
    Fournaris, Apostolos P.
    Koufopavlou, Odysseas
    2008 IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION, PROCEEDINGS, 2008, : 1457 - 1464
  • [22] Design of elliptic curve cryptography in GSI
    Zhu, YQ
    Lin, X
    Wang, G
    CURRENT TRENDS IN HIGH PERFORMANCE COMPUTING AND ITS APPLICATIONS, PROCEEDINGS, 2005, : 623 - 628
  • [23] Elliptic Curve Cryptography in Java']Java
    Deligiannidis, Leonidas
    2015 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), 2015, : 193 - 193
  • [24] Issues in Elliptic Curve Cryptography Implementation
    Paryasto, Marisa W.
    Kuspriyanto
    Sutikno, Sarwono
    Sasongko, Arif
    INTERNETWORKING INDONESIA, 2009, 1 (01): : 29 - 33
  • [25] Hyper-and-elliptic-curve cryptography
    Bernstein, Daniel J.
    Lange, Tanja
    LMS JOURNAL OF COMPUTATION AND MATHEMATICS, 2014, 17 : 181 - 202
  • [26] Elliptic Curve Lightweight Cryptography: A Survey
    Andres Lara-Nino, Carlos
    Diaz-Perez, Arturo
    Morales-Sandoval, Miguel
    IEEE ACCESS, 2018, 6 : 72514 - 72550
  • [27] A New Approach to Elliptic Curve Cryptography
    Singh, L. Dolendro
    Debbarma, Tribid
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 78 - 82
  • [28] PARTIAL SIGNCRYPTION ELLIPTIC CURVE CRYPTOGRAPHY
    Elkamchouchi, Hassan M.
    Elhamshary, Amira S.
    2011 3RD INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT (ICCTD 2011), VOL 3, 2012, : 641 - 647
  • [29] Analysis of Elliptic Curve Cryptography & RSA
    Khan M.R.
    Upreti K.
    Alam M.I.
    Khan H.
    Siddiqui S.T.
    Haque M.
    Parashar J.
    Journal of ICT Standardization, 2023, 11 (04): : 355 - 378
  • [30] Elliptic curve cryptography on constraint environments
    de Santos, MD
    Sanchez-Avila, C
    Sanchez-Reillo, R
    38TH ANNUAL 2004 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2004, : 212 - 220