Elliptic Curve Cryptography for Smart Phone OS

被引:0
|
作者
Desai, Sharmishta [1 ]
Bedi, R. K. [2 ]
Jagdale, B. N. [1 ]
Wadhai, V. M. [3 ]
机构
[1] MITCOE, IT Dept, Pune, Maharashtra, India
[2] MITCOE, Dept Comp, Pune, Maharashtra, India
[3] MITCOE, Pune, Maharashtra, India
关键词
ECC; RSA; DSA; ECDH; Cryptography;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile Technology is growing rapidly. Usages of smart phones are increased for critical financial applications. This leads to many security issues as well. Implementing security features into such critical financial applications can minimize the transaction risk .Traditionally RSA, DH public key cryptography algorithms has been used. However ECC has proven results for smaller key size requirement which is more useful for resource constrained devices that take less memory, less bandwidth and less power consumption. In our paper, we have proved ECC's strength with respect to RSA. This paper contributes on implementation of ECC over GF (2(m)) for smart phone OS which is used in mobile devices. Our experiment shows that ECC takes less computation time efforts than RSA when key size becomes greater than 512 bits which is advantageous on mobile or smart phones. In our implementation memory consumption is reduced as we are computing elliptic curve points dynamically when we need it and cipher text size is also reduced. We are avoiding cryptanalytic attack by eliminating same cipher text pattern generation. An experiment study is conducted on android OS which is one of the popular smart phone OS to show the effectiveness of proposed algorithm and also addressed cryptanalytic attack.
引用
收藏
页码:397 / +
页数:2
相关论文
共 50 条
  • [31] Elliptic Curve Cryptography: A Dynamic Paradigm
    Som, Subhranil
    Majumder, Rana
    Dutta, Sandip
    2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 427 - 431
  • [32] Compiler assisted elliptic curve cryptography
    Barbosa, M.
    Moss, A.
    Page, D.
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: COOPIS, DOA, ODBASE, GADA, AND IS, PT 2, PROCEEDINGS, 2007, 4804 : 1785 - +
  • [33] A software library for elliptic curve cryptography
    Konstantinou, E
    Stamatiou, Y
    Zaroliagis, C
    ALGORITHMS-ESA 2002, PROCEEDINGS, 2002, 2461 : 625 - 636
  • [34] A reconfiguration hierarchy for elliptic curve cryptography
    Schaumont, P
    Verbauwhede, I
    CONFERENCE RECORD OF THE THIRTY-FIFTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1 AND 2, 2001, : 449 - 453
  • [35] Optimal Implementation of Elliptic Curve Cryptography
    Lv, Hongqiang
    Li, Hui
    Yi, Junkai
    Lu, Hao
    2013 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI), 2013, : 35 - 39
  • [36] Low power elliptic curve cryptography
    Keller, Maurice
    Marnane, William
    INTEGRATED CIRCUIT AND SYSTEM DESIGN: POWER AND TIMING MODELING, OPTIMIZATION AND SIMULATION, 2007, 4644 : 310 - +
  • [38] Security Improvement in Elliptic Curve Cryptography
    Abdullah, Kawther Esaa
    Ali, Nada Hussein M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (05) : 122 - 131
  • [39] A Critical Review on Elliptic Curve Cryptography
    Singh, Soram Ranbir
    Khan, Ajoy Kumar
    Singh, Takhellambam Sonamani
    2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), 2016, : 13 - 18
  • [40] On Elliptic Curve Cryptography implementations and evaluation
    Alimi, Nejmeddine
    Lahbib, Younes
    Machhout, Mohsen
    Tourki, Rached
    2016 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP), 2016, : 35 - 40